Cryptology: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(Proposal for structuring articles in cryptology)
 
imported>Howard C. Berkowitz
(More headings and prerequisites)
Line 1: Line 1:
{{subpages}}
{{subpages}}
==Underlying principles==
*Information theory
*Random numbers
*Statistical characteristics of language
==Methods of proving information is correct or has been transferred==
==Methods of proving information is correct or has been transferred==
===Authentication===
===Authentication===
Line 21: Line 25:
*Symmetric, asymmetric, and both
*Symmetric, asymmetric, and both
*Key management protocols
*Key management protocols
*'''some link to random numbers and other mathematical background'''
====Specific cipher implementations====
====Specific cipher implementations====
=====Manual=====
*Monoalphabetic substitutions
*Polyalphabetic substitutions
**Straddling methods
*Transposition
*Superencipherment
=====Mechanical/Electromechanical=====
=====Mechanical/Electromechanical=====
*Jefferson/Bazeries cylinder, strip ciphers
*Jefferson/Bazeries cylinder, strip ciphers
Line 34: Line 43:
*AES
*AES
===Steganography===
===Steganography===
*Invisible ink methods?
*Classic covert channel
*Masking with graphics
*Spread spectrum, frequency agility, {{seealso|electronic warfare))
===Hybrid methods===
===Hybrid methods===
==Methods of obtaining partial or full information==
==Methods of obtaining partial or full information==
Line 41: Line 54:
*Basic mathematical cryptanalysis: frequency analysis, index of coincidence, Kappa test
*Basic mathematical cryptanalysis: frequency analysis, index of coincidence, Kappa test
*Advanced mathematical cryptanalysis
*Advanced mathematical cryptanalysis
*Red/black engineering and other COMSEC supporting measures
*Red/black engineering and other COMSEC supporting measures {{seealso|communications intelligence}}
*"Practical cryptanalysis" (black bag job), RINT nethods (TEMPEST/Van Eck, etc.), acoustic cryptanalysis
*"Practical cryptanalysis" (black bag job), [[radiofrequency MASINT#Unintentional Radiation MASINT]] (TEMPEST/Van Eck, etc.), acoustic cryptanalysis

Revision as of 11:52, 4 August 2008

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

Please create the "Talk page". Just click this Talk page link and save the page.

Underlying principles

  • Information theory
  • Random numbers
  • Statistical characteristics of language

Methods of proving information is correct or has been transferred

Authentication

Sender authentication

Digital signatures
Key management
  • PKI
  • PGP

Server authentication

Nonrepudiation

Zero-knowledge proofs

Digital signatures

Confidentiality and integrity

Existence confidentiality

Traffic confidentiality

Message content confidentiality

Atomic and sequential integrity

Methods of concealing information

Cryptography

  • Ciphers and codes, including basic methods
  • Symmetric, asymmetric, and both
  • Key management protocols

Specific cipher implementations

Manual
  • Monoalphabetic substitutions
  • Polyalphabetic substitutions
    • Straddling methods
  • Transposition
  • Superencipherment
Mechanical/Electromechanical
  • Jefferson/Bazeries cylinder, strip ciphers
  • Vernam
  • Rotor and rotor-like: Hagelin, Enigma, Purple, SIGABA/Typex
Computer (general purpose and chip) implementations
  • General characteristics of military (KG vs KW, etc.)
  • Non-text/data: secure voice, video, fax
  • DES
  • PGP
  • AES

Steganography

  • Invisible ink methods?
  • Classic covert channel
  • Masking with graphics
  • Spread spectrum, frequency agility, {{seealso|electronic warfare))

Hybrid methods

Methods of obtaining partial or full information

See also: communications intelligence for things including traffic analysis and direction finding
  • Man-in-the-middle attack
  • Various general scenarios: brute force, chosen plaintext
  • Basic mathematical cryptanalysis: frequency analysis, index of coincidence, Kappa test
  • Advanced mathematical cryptanalysis
  • Red/black engineering and other COMSEC supporting measures
See also: communications intelligence