Cryptology/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(New page: {{subpages}} ==Parent topics== {{r|Communication}} {{r|Computer network}} {{r|Convergence of communications}} {{r|Information theory}} {{r|Information security}} {{r|Linguistics}} {{r|...)
 
 
(22 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{subpages}}
{{subpages}}


==Parent topics==
==Parent topics==
{{r|Communication}}
{{r|Computer network}}
{{r|Convergence of communications}}
{{r|Information theory}}
{{r|Information security}}   
{{r|Information security}}   
{{r|Linguistics}}
{{r|Signals intelligence}}
{{r|Mathematics}}
{{r|Statistics}}
{{r|Telecommunications}}


==Subtopics==
==Subtopics==
{{r|Advanced Encryption System}}
 
{{r|Cryptography}}
{{r|Cryptanalysis}}
{{r|Symmetric key cryptography}}
{{r|Asymmetric key cryptography}}
{{r|Steganography}}
 
== Main techniques ==
{{r|Cipher}}
{{r|Cipher}}
{{r|Code}}
{{r|Block cipher}}
{{r|Cryptanalysis}}
{{r|Stream cipher}}
{{r|Cryptography}}
{{r|Hybrid cryptosystem}}
{{r|One-time pad}}
{{r|Random number generator}}
{{r|Hash (cryptography)}}
{{r|Code (cryptography)}}
{{r|Cryptographic key}}
{{r|Cryptographic key}}
== Well-known instances ==
{{r|Data Encryption Standard}}
{{r|Data Encryption Standard}}
{{r|Advanced Encryption Standard}}
{{r|RSA algorithm}}
{{r|Diffie-Hellman}}
{{r|Enigma machine}}
{{r|Enigma machine}}
{{r|Pretty Good Privacy}}
{{r|IPsec}}
== Famous cryptologists ==
The [[AES competition]] article has a [[AES_competition/Catalogs/AES_players|list of well-known players]] involved in that.
{{r|William Friedman}}
{{r|William Friedman}}
{{r|Auguste Kerckhoff}}
{{r|Auguste Kerckhoffs}}
{{r|PURPLE machine}}
{{r|Alan Turing}}
{{r|Claude Shannon}}
{{r|Sir Francis Walsingham}}


==Other related topics==
== Government cryptology ==
{{r|Communications intelligence}}
{{r|Communications intelligence}}
{{r|Signals intelligence}}
{{r|Radiofrequency MASINT}}
{{r|Communications Security Establishment}}
{{r|Communications Security Establishment}}
{{r|FAPSI}}
{{r|Foreign Intelligence Surveillance Act}}
{{r|Government Communications Headquarters}}
{{r|Government Communications Headquarters}}
{{r|Government Communications Security Bureau}}
{{r|Government Communications Security Bureau}}
{{r|National Security Agency}}
{{r|National Security Agency}}
{{r|Radiofrequency MASINT}}
{{r|FAPSI}}
{{r|Random number}}
{{r|Foreign Intelligence Surveillance Act}}
{{r|Signals intelligence}}
 
{{r|Claude Shannon}}
==Other related topics==
{{r|Sir Francis Walsingham}}
 
{{r|Wiretapping}}
{{r|Wiretapping}}
{{r|Communication}}
{{r|Computer network}}
{{r|Convergence of communications}}
{{r|Information theory}}
{{r|Linguistics}}
{{r|Mathematics}}
{{r|Statistics}}
{{r|Telecommunications}}

Latest revision as of 14:49, 4 April 2024

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Cryptology.
See also changes related to Cryptology, or pages that link to Cryptology or to this page or whose text contains "Cryptology".

Parent topics

Subtopics

Main techniques

  • Cipher [r]: A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key [e]
  • Block cipher [r]: A symmetric cipher that operates on fixed-size blocks of plaintext, giving a block of ciphertext for each [e]
  • Stream cipher [r]: A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step. [e]
  • Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
  • One-time pad [r]: A cipher system in which the cryptographic key, i.e. the secret used to encrypt and decrypt messages, is a sequence of random values, each one of which is only ever used once, and only to encrypt one particular letter or word. [e]
  • Random number generator [r]: A member of a sequence of which the successive values cannot be predicted, produced by measurement of physical phenomena, appropriate algorithms, or a combination of the two [e]
  • Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
  • Code (cryptography) [r]: A means of substituting, for the linguistically meaningful symbols of plaintext composed of words or other symbols meaningful to humans, into inherently meaningless numbers, letters, or words that make no sense to a recipient who is not in possession of a codebook or other means of reversing the substitution of symbols [e]
  • Cryptographic key [r]: Value used by a computer together with a complex algorithm to encrypt and decrypt messages. [e]

Well-known instances

Famous cryptologists

The AES competition article has a list of well-known players involved in that.

Government cryptology

Other related topics