Cryptology: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(Heisenberg's cat's revenge)
m (Text replacement - "]]" to "")
 
(19 intermediate revisions by 6 users not shown)
Line 1: Line 1:
{{subpages}}
{{PropDel}}<br><br>{{subpages}}
==Underlying principles==
'''Cryptology''' (the science of secrets, from Greek language|Greek) is the general term that encompasses both cryptography (the study of techniques for keeping secrets) and cryptanalysis (codebreaking, acquiring secrets without authorisation).  The field has a long and interesting history, see History of cryptology.
*Information theory
*Random numbers
*Statistical characteristics of language
*Computationally intractable problems


==Methods of proving information is correct or has been transferred==
Cryptology provides the scientific background for a broad range of activities in signals intelligence and information security.
===Authentication===
 
====Sender authentication====
Based on Claude Shannon's definition of Information theory as the study of "communication in the presence of noise", Ron Rivest wrote: "Cryptology is about communication in the presence of adversaries"<ref>{{citation
=====Digital signatures=====
| url = http://people.csail.mit.edu/rivest/Rivest-Cryptography.pdf
=====Key management=====
| author = Ronald Rivest
*PKI
| title = Cryptology
*PGP
}}</ref>.
====Server authentication====
 
===Nonrepudiation===
==References==
===Zero-knowledge proofs===
{{reflist}}
===Digital signatures===
==Confidentiality and integrity==
===Existence confidentiality===
===Traffic confidentiality===
===Message content confidentiality===
===Atomic and sequential integrity===
==Methods of concealing information==
===Cryptography===
*Ciphers and codes, including basic methods
*Symmetric, asymmetric, and both
*Key management protocols
====Specific cipher implementations====
=====Manual=====
*Monoalphabetic substitutions
*Polyalphabetic substitutions
**Straddling methods
*Transposition
*Superencipherment
=====Mechanical/Electromechanical=====
*Jefferson/Bazeries cylinder, strip ciphers
*Vernam
*Rotor and rotor-like: Hagelin, Enigma, Purple, SIGABA/Typex
=====Computer (general purpose and chip) implementations=====
*General characteristics of military (KG vs KW, etc.)
*Non-text/data: secure voice, video, fax
*DES
*PGP
*AES
===Steganography===
*Invisible ink methods?
*Classic covert channel
*Masking with graphics
*Spread spectrum, frequency agility, {{seealso|electronic warfare))
===Hybrid methods===
==Methods of obtaining partial or full information==
{{seealso|communications intelligence}} for things including [[traffic analysis]] and [[direction finding]]
*Man-in-the-middle attack
*Various general scenarios: brute force, chosen plaintext
*Basic mathematical cryptanalysis: frequency analysis, index of coincidence, Kappa test
*Advanced mathematical cryptanalysis
*Red/black engineering and other COMSEC supporting measures {{seealso|communications intelligence}}
*"Practical cryptanalysis" (black bag job), [[radiofrequency MASINT#Unintentional Radiation MASINT]] (TEMPEST/Van Eck, etc.), acoustic cryptanalysis
*"rubber hose cryptanalysis"
**"This is the most powerful handgun in the world. I can't remember if I've fired five or six times. Feeling lucky, punk?" This is an example of quantum cryptanalysis, with the .44 Magnum chamber is loaded or not loaded, but Heisenberg requires one pull the trigger to find out.

Latest revision as of 16:46, 25 March 2024

This article may be deleted soon.
To oppose or discuss a nomination, please go to CZ:Proposed for deletion and follow the instructions.

For the monthly nomination lists, see
Category:Articles for deletion.


This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.
Please create the "Talk page". Just click this Talk page link and save the page.

Cryptology (the science of secrets, from Greek language|Greek) is the general term that encompasses both cryptography (the study of techniques for keeping secrets) and cryptanalysis (codebreaking, acquiring secrets without authorisation). The field has a long and interesting history, see History of cryptology.

Cryptology provides the scientific background for a broad range of activities in signals intelligence and information security.

Based on Claude Shannon's definition of Information theory as the study of "communication in the presence of noise", Ron Rivest wrote: "Cryptology is about communication in the presence of adversaries"[1].

References

  1. Ronald Rivest, Cryptology