Cryptology: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(Proposal for structuring articles in cryptology)
 
m (Text replacement - "]]" to "")
 
(23 intermediate revisions by 6 users not shown)
Line 1: Line 1:
{{subpages}}
{{PropDel}}<br><br>{{subpages}}
==Methods of proving information is correct or has been transferred==
'''Cryptology''' (the science of secrets, from Greek language|Greek) is the general term that encompasses both cryptography (the study of techniques for keeping secrets) and cryptanalysis (codebreaking, acquiring secrets without authorisation).  The field has a long and interesting history, see History of cryptology.
===Authentication===
 
====Sender authentication====
Cryptology provides the scientific background for a broad range of activities in signals intelligence and information security.
=====Digital signatures=====
 
=====Key management=====
Based on Claude Shannon's definition of Information theory as the study of "communication in the presence of noise", Ron Rivest wrote: "Cryptology is about communication in the presence of adversaries"<ref>{{citation
*PKI
| url = http://people.csail.mit.edu/rivest/Rivest-Cryptography.pdf
*PGP
| author = Ronald Rivest
====Server authentication====
| title = Cryptology
===Nonrepudiation===
}}</ref>.
===Zero-knowledge proofs===
 
===Digital signatures===
==References==
==Confidentiality and integrity==
{{reflist}}
===Existence confidentiality===
===Traffic confidentiality===
===Message content confidentiality===
===Atomic and sequential integrity===
==Methods of concealing information==
===Cryptography===
*Ciphers and codes, including basic methods
*Symmetric, asymmetric, and both
*Key management protocols
*'''some link to random numbers and other mathematical background'''
====Specific cipher implementations====
=====Mechanical/Electromechanical=====
*Jefferson/Bazeries cylinder, strip ciphers
*Vernam
*Rotor and rotor-like: Hagelin, Enigma, Purple, SIGABA/Typex
=====Computer (general purpose and chip) implementations=====
*General characteristics of military (KG vs KW, etc.)
*Non-text/data: secure voice, video, fax
*DES
*PGP
*AES
===Steganography===
===Hybrid methods===
==Methods of obtaining partial or full information==
{{seealso|communications intelligence}} for things including [[traffic analysis]] and [[direction finding]]
*Man-in-the-middle attack
*Various general scenarios: brute force, chosen plaintext
*Basic mathematical cryptanalysis: frequency analysis, index of coincidence, Kappa test
*Advanced mathematical cryptanalysis
*Red/black engineering and other COMSEC supporting measures
*"Practical cryptanalysis" (black bag job), RINT nethods (TEMPEST/Van Eck, etc.), acoustic cryptanalysis

Latest revision as of 16:46, 25 March 2024

This article may be deleted soon.
To oppose or discuss a nomination, please go to CZ:Proposed for deletion and follow the instructions.

For the monthly nomination lists, see
Category:Articles for deletion.


This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.
Please create the "Talk page". Just click this Talk page link and save the page.

Cryptology (the science of secrets, from Greek language|Greek) is the general term that encompasses both cryptography (the study of techniques for keeping secrets) and cryptanalysis (codebreaking, acquiring secrets without authorisation). The field has a long and interesting history, see History of cryptology.

Cryptology provides the scientific background for a broad range of activities in signals intelligence and information security.

Based on Claude Shannon's definition of Information theory as the study of "communication in the presence of noise", Ron Rivest wrote: "Cryptology is about communication in the presence of adversaries"[1].

References

  1. Ronald Rivest, Cryptology