Cryptology: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(More headings and prerequisites)
imported>Sandy Harris
Line 4: Line 4:
*Random numbers
*Random numbers
*Statistical characteristics of language
*Statistical characteristics of language
*Computationally intractable problems
==Methods of proving information is correct or has been transferred==
==Methods of proving information is correct or has been transferred==
===Authentication===
===Authentication===

Revision as of 22:15, 4 August 2008

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

Please create the "Talk page". Just click this Talk page link and save the page.

Underlying principles

  • Information theory
  • Random numbers
  • Statistical characteristics of language
  • Computationally intractable problems

Methods of proving information is correct or has been transferred

Authentication

Sender authentication

Digital signatures
Key management
  • PKI
  • PGP

Server authentication

Nonrepudiation

Zero-knowledge proofs

Digital signatures

Confidentiality and integrity

Existence confidentiality

Traffic confidentiality

Message content confidentiality

Atomic and sequential integrity

Methods of concealing information

Cryptography

  • Ciphers and codes, including basic methods
  • Symmetric, asymmetric, and both
  • Key management protocols

Specific cipher implementations

Manual
  • Monoalphabetic substitutions
  • Polyalphabetic substitutions
    • Straddling methods
  • Transposition
  • Superencipherment
Mechanical/Electromechanical
  • Jefferson/Bazeries cylinder, strip ciphers
  • Vernam
  • Rotor and rotor-like: Hagelin, Enigma, Purple, SIGABA/Typex
Computer (general purpose and chip) implementations
  • General characteristics of military (KG vs KW, etc.)
  • Non-text/data: secure voice, video, fax
  • DES
  • PGP
  • AES

Steganography

  • Invisible ink methods?
  • Classic covert channel
  • Masking with graphics
  • Spread spectrum, frequency agility, {{seealso|electronic warfare))

Hybrid methods

Methods of obtaining partial or full information

See also: communications intelligence for things including traffic analysis and direction finding
  • Man-in-the-middle attack
  • Various general scenarios: brute force, chosen plaintext
  • Basic mathematical cryptanalysis: frequency analysis, index of coincidence, Kappa test
  • Advanced mathematical cryptanalysis
  • Red/black engineering and other COMSEC supporting measures
See also: communications intelligence