Cryptology: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(More headings and prerequisites)
m (Text replacement - "]]" to "")
 
(22 intermediate revisions by 6 users not shown)
Line 1: Line 1:
{{subpages}}
{{PropDel}}<br><br>{{subpages}}
==Underlying principles==
'''Cryptology''' (the science of secrets, from Greek language|Greek) is the general term that encompasses both cryptography (the study of techniques for keeping secrets) and cryptanalysis (codebreaking, acquiring secrets without authorisation).  The field has a long and interesting history, see History of cryptology.
*Information theory
 
*Random numbers
Cryptology provides the scientific background for a broad range of activities in signals intelligence and information security.
*Statistical characteristics of language
 
==Methods of proving information is correct or has been transferred==
Based on Claude Shannon's definition of Information theory as the study of "communication in the presence of noise", Ron Rivest wrote: "Cryptology is about communication in the presence of adversaries"<ref>{{citation
===Authentication===
| url = http://people.csail.mit.edu/rivest/Rivest-Cryptography.pdf
====Sender authentication====
| author = Ronald Rivest
=====Digital signatures=====
| title = Cryptology
=====Key management=====
}}</ref>.
*PKI
 
*PGP
==References==
====Server authentication====
{{reflist}}
===Nonrepudiation===
===Zero-knowledge proofs===
===Digital signatures===
==Confidentiality and integrity==
===Existence confidentiality===
===Traffic confidentiality===
===Message content confidentiality===
===Atomic and sequential integrity===
==Methods of concealing information==
===Cryptography===
*Ciphers and codes, including basic methods
*Symmetric, asymmetric, and both
*Key management protocols
====Specific cipher implementations====
=====Manual=====
*Monoalphabetic substitutions
*Polyalphabetic substitutions
**Straddling methods
*Transposition
*Superencipherment
=====Mechanical/Electromechanical=====
*Jefferson/Bazeries cylinder, strip ciphers
*Vernam
*Rotor and rotor-like: Hagelin, Enigma, Purple, SIGABA/Typex
=====Computer (general purpose and chip) implementations=====
*General characteristics of military (KG vs KW, etc.)
*Non-text/data: secure voice, video, fax
*DES
*PGP
*AES
===Steganography===
*Invisible ink methods?
*Classic covert channel
*Masking with graphics
*Spread spectrum, frequency agility, {{seealso|electronic warfare))
===Hybrid methods===
==Methods of obtaining partial or full information==
{{seealso|communications intelligence}} for things including [[traffic analysis]] and [[direction finding]]
*Man-in-the-middle attack
*Various general scenarios: brute force, chosen plaintext
*Basic mathematical cryptanalysis: frequency analysis, index of coincidence, Kappa test
*Advanced mathematical cryptanalysis
*Red/black engineering and other COMSEC supporting measures {{seealso|communications intelligence}}
*"Practical cryptanalysis" (black bag job), [[radiofrequency MASINT#Unintentional Radiation MASINT]] (TEMPEST/Van Eck, etc.), acoustic cryptanalysis

Latest revision as of 16:46, 25 March 2024

This article may be deleted soon.
To oppose or discuss a nomination, please go to CZ:Proposed for deletion and follow the instructions.

For the monthly nomination lists, see
Category:Articles for deletion.


This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.
Please create the "Talk page". Just click this Talk page link and save the page.

Cryptology (the science of secrets, from Greek language|Greek) is the general term that encompasses both cryptography (the study of techniques for keeping secrets) and cryptanalysis (codebreaking, acquiring secrets without authorisation). The field has a long and interesting history, see History of cryptology.

Cryptology provides the scientific background for a broad range of activities in signals intelligence and information security.

Based on Claude Shannon's definition of Information theory as the study of "communication in the presence of noise", Ron Rivest wrote: "Cryptology is about communication in the presence of adversaries"[1].

References

  1. Ronald Rivest, Cryptology