Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • {{r|Cryptography}} {{r|Avalanche (cryptography)}}
    640 bytes (81 words) - 04:17, 27 April 2010
  • Any of the major texts listed under [[Cryptography/Bibliography | cryptography]] has a substantial section on stream ciphers.
    138 bytes (18 words) - 21:42, 29 April 2009
  • {{r|Asymmetric key cryptography}} {{r|Cryptography controversy}}
    707 bytes (89 words) - 20:09, 29 July 2010
  • {{r|Asymmetric key cryptography}} {{r|Cryptography}}
    657 bytes (85 words) - 17:19, 11 January 2010
  • {{r|Cryptography controversy}} {{r|Cryptography}}
    973 bytes (125 words) - 14:41, 18 March 2024
  • * In {{r|Protocol (cryptography)|cryptography|}}
    146 bytes (16 words) - 05:57, 2 January 2010
  • {{r|Cryptography}} {{r|History of cryptography}}
    547 bytes (70 words) - 11:35, 11 January 2010
  • {{r|cryptography}} {{r|asymmetric key cryptography}} -->
    259 bytes (33 words) - 18:53, 29 July 2010
  • {{r|Asymmetric key cryptography}} {{r|Cryptography}}
    608 bytes (77 words) - 15:58, 11 January 2010
  • {{rpl|Politics of cryptography}} {{rpl|cryptography}}
    496 bytes (65 words) - 10:09, 13 June 2010
  • #REDIRECT [[Cryptography]]
    26 bytes (2 words) - 18:20, 31 July 2010
  • #REDIRECT [[Cryptography]]
    26 bytes (2 words) - 22:11, 13 June 2010
  • #REDIRECT [[Cryptography]]
    26 bytes (2 words) - 22:45, 21 June 2012
  • #REDIRECT [[Cryptography]]
    26 bytes (2 words) - 22:47, 21 June 2012
  • #REDIRECT [[Cryptography]]
    26 bytes (2 words) - 09:35, 12 January 2011
  • #REDIRECT [[Cryptography]]
    26 bytes (2 words) - 01:35, 22 May 2010
  • {{r|Cryptography}} {{r|Key management (cryptography)}}
    844 bytes (96 words) - 14:48, 4 April 2024
  • #REDIRECT [[Hash (cryptography)]]
    33 bytes (3 words) - 06:09, 1 November 2008
  • #REDIRECT [[Cryptography#Codes_versus_ciphers]]
    47 bytes (5 words) - 21:46, 1 December 2009
  • #REDIRECT [[Hash (cryptography)]]
    33 bytes (3 words) - 06:07, 1 November 2008
  • #REDIRECT [[Hash (cryptography)#Skein]]
    39 bytes (4 words) - 05:44, 12 August 2009
  • #REDIRECT [[Asymmetric key cryptography]]
    41 bytes (4 words) - 13:34, 3 October 2008
  • #REDIRECT [[Hash_(cryptography)#MD5]]
    37 bytes (4 words) - 06:38, 19 November 2011
  • #REDIRECT [[Asymmetric key cryptography]]
    41 bytes (4 words) - 14:10, 3 October 2008
  • #REDIRECT [[Hash_(cryptography)#Tiger]]
    39 bytes (4 words) - 06:05, 28 November 2008
  • #REDIRECT [[Asymmetric key cryptography]]
    41 bytes (4 words) - 14:11, 3 October 2008
  • #REDIRECT [[Hash_(cryptography)#The_Advanced_Hash_Standard]]
    60 bytes (7 words) - 06:24, 28 November 2008
  • #REDIRECT [[Hash_(cryptography)#SHA]]
    37 bytes (4 words) - 06:25, 28 November 2008
  • #REDIRECT [[Hash_(cryptography)#Skein]]
    39 bytes (4 words) - 07:25, 29 November 2008
  • #REDIRECT [[Politics of cryptography]]
    38 bytes (4 words) - 20:52, 20 May 2010
  • #REDIRECT [[Hash_(cryptography)#Applications]]
    46 bytes (4 words) - 02:05, 27 November 2008
  • #REDIRECT [[Symmetric key cryptography]]
    40 bytes (4 words) - 05:38, 2 November 2008
  • {{r|Cryptography}} {{r|Symmetric key cryptography}}
    1 KB (173 words) - 14:49, 4 April 2024
  • {{r|Cryptography}} {{r|Code (cryptography)}}
    219 bytes (24 words) - 14:41, 18 March 2024
  • {{r|Cryptography}} {{r|History of cryptography}}
    724 bytes (100 words) - 14:31, 22 March 2024
  • #REDIRECT [[Hash_(cryptography)#SHA-1]]
    39 bytes (4 words) - 21:09, 26 November 2008
  • #REDIRECT [[Hash_(cryptography)#SHA-2]]
    39 bytes (4 words) - 06:26, 28 November 2008
  • {{r|Cryptography}} {{r|Hash (cryptography)}}
    784 bytes (100 words) - 14:41, 18 March 2024
  • In [[cryptography]], the unencrypted message
    80 bytes (8 words) - 19:07, 28 February 2010
  • {{r|Cryptography}} {{r|Snake (animal) oil (cryptography)}}
    167 bytes (18 words) - 14:21, 8 March 2024
  • {{r|Cryptography}} {{r|History of cryptography}}
    605 bytes (77 words) - 14:41, 18 March 2024
  • A method of mixing data, used in cryptography to achieve diffusion.
    103 bytes (14 words) - 09:24, 26 November 2009
  • {{r|Cryptography}} {{r|Protocol (cryptography)}}
    130 bytes (13 words) - 22:10, 18 April 2012
  • {{r|Cryptography}} {{r|Symmetric key cryptography}}
    398 bytes (43 words) - 20:00, 29 July 2010
  • A web site which publishes information on cryptography, freedom, privacy and security.
    122 bytes (15 words) - 08:44, 6 December 2010
  • Methods for attacking the Rivest, Shamir and Adleman public-key cryptography algorithm.
    124 bytes (14 words) - 06:55, 1 October 2009
  • People interested in [[cryptography]] as a tool for privacy, anonymity and social change.
    125 bytes (16 words) - 03:21, 10 November 2008
  • ...or section devoted to block ciphers. See our [[Cryptography/Bibliography | cryptography bibliography]] for additional sources. * ''Applied Cryptography: Protocols, Algorithms, and Source Code in C'' by [[Bruce Schneier]], Wiley
    2 KB (315 words) - 09:05, 27 September 2009
  • *Schneier, Bruce. ''Applied Cryptography''
    150 bytes (15 words) - 20:53, 11 May 2008
  • {{r|Cryptography controversy}} {{r|Snake (animal) oil (cryptography)}}
    485 bytes (61 words) - 14:21, 8 March 2024
  • The long history of the antithetical disciplines [[cryptography]] and [[cryptanalysis]].
    124 bytes (13 words) - 05:07, 19 October 2010
  • Political and legal controversy over the use and export of cryptography
    107 bytes (14 words) - 21:37, 20 May 2010
  • ...itional names for '''A''' and '''B''', the two players, in discussion of [[cryptography]] or [[coding theory]].
    151 bytes (19 words) - 19:25, 2 December 2008
  • A 19th Century French writer, famous for giving some axioms for [[cryptography]].
    117 bytes (15 words) - 21:14, 22 May 2010
  • A Russian [[Cryptography|cryptographer]] who was the first person prosecuted under the [[DMCA]].
    132 bytes (16 words) - 21:23, 8 October 2020
  • {{r|Cryptography controversy}} {{r|Cryptography}}
    523 bytes (65 words) - 20:16, 11 January 2010
  • {{r|Cryptography}} {{r|History of cryptography}}
    718 bytes (88 words) - 14:17, 28 March 2010
  • ...crypto wars", political controversies and legal cases involving the use of cryptography.
    129 bytes (16 words) - 01:24, 20 December 2008
  • Auto-populated based on [[Special:WhatLinksHere/Key (cryptography)]]. Needs checking by a human. {{r|Cryptography}}
    482 bytes (61 words) - 17:51, 11 January 2010
  • A technique based on [[public key]] cryptography to allow people to "sign" documents using their private keys.
    146 bytes (20 words) - 01:19, 30 November 2008
  • ...Communications Headquarters]] as a cryptologist, codeveloped [[public key cryptography]] while it remained classified
    197 bytes (22 words) - 17:57, 17 February 2011
  • {{r|Asymmetric key cryptography}} {{r|Cryptography}}
    594 bytes (73 words) - 19:48, 11 January 2010
  • {{r|Cryptography}} {{r|Hash (cryptography)}}
    678 bytes (84 words) - 15:58, 11 January 2010
  • [[Cryptography|Cryptographer]] who teaches at [[MIT]], co-inventor of the [[RSA algorithm]
    182 bytes (22 words) - 20:04, 29 July 2010
  • Auto-populated based on [[Special:WhatLinksHere/History of cryptography]]. Needs checking by a human. {{r|Cryptography}}
    654 bytes (85 words) - 17:13, 11 January 2010
  • ...y [[Steven Levy]], about the political and legal conflicts in the US about cryptography, such as the [[Clipper Chip]] controversy and the [[Bernstein v. United Sta ...ode.asp?id=2152 RSA Laboratories' Frequently Asked Questions About Today's Cryptography]
    3 KB (478 words) - 21:53, 10 May 2011
  • {{r|Cryptography}} {{r|Symmetric key cryptography}}
    597 bytes (79 words) - 11:25, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Cryptography controversy]]. Needs checking by a human. {{r|Cryptography}}
    763 bytes (99 words) - 02:28, 1 April 2024
  • Auto-populated based on [[Special:WhatLinksHere/Symmetric key cryptography]]. Needs checking by a human. {{r|Cryptography}}
    587 bytes (76 words) - 20:45, 11 January 2010
  • {{r|Asymmetric key cryptography}} {{r|Cryptography}}
    774 bytes (99 words) - 15:36, 11 January 2010
  • {{r|Cryptography}} {{r|Hash (cryptography)}}
    618 bytes (78 words) - 17:06, 11 January 2010
  • * [[International Data Encryption Algorithm]], a topic in [[cryptography]]
    212 bytes (26 words) - 12:51, 31 May 2009
  • {{r|Cryptography}} {{r|Cryptography}}
    932 bytes (116 words) - 11:20, 9 December 2009
  • See also our [[Cryptography/Bibliography]].
    137 bytes (18 words) - 04:42, 19 October 2010
  • {{r|Cryptography}} {{r|Key (cryptography)}}
    828 bytes (106 words) - 14:41, 18 March 2024
  • {{r|key (cryptography)}}
    102 bytes (14 words) - 12:50, 13 December 2008
  • {{r|Quantum cryptography}} {{r|Code (cryptography)}}
    2 KB (194 words) - 14:48, 4 April 2024
  • Lars Knudsen is a [[Cryptography|cryptographer]] who taught for some years at [[University of Bergen]] and n
    238 bytes (38 words) - 21:22, 8 October 2020
  • {{r|Snake oil (cryptography)}}
    83 bytes (11 words) - 18:03, 9 March 2024
  • The primary high-security [[cryptography|cryptographic]] [[communications security]] machine of [[Nazi Germany]]. Un
    321 bytes (39 words) - 10:20, 14 June 2010
  • {{rpl|hash (cryptography)}}
    118 bytes (14 words) - 05:05, 26 September 2013
  • ...the creator of Pretty Good Privacy or '''PGP''', a widely used program for cryptography|encrypting electronic mail. He has a [http://www.philzimmermann.com/EN/back
    392 bytes (58 words) - 07:34, 18 March 2024
  • ...y distribution key]], [[Key (cryptography)#public key|public key]], [[Key (cryptography)#key generating key|key generating key]]) ...must be kept secret. A subset of keys that must be kept secret are [[Key (cryptography)#private key|private keys,]] which imply the existence of an associated pub
    4 KB (564 words) - 23:12, 4 February 2010
  • {{main|Cryptography}} ...et key" is slightly misleading, as the [[private key]] in [[asymmetric key cryptography]] also must be protected.
    4 KB (546 words) - 05:48, 8 April 2024
  • {{r|Cryptography}}
    216 bytes (24 words) - 03:15, 17 February 2010
  • {{r|Cryptography}}
    263 bytes (30 words) - 02:42, 30 November 2008
  • {{r|Cryptography}}
    227 bytes (26 words) - 12:43, 8 November 2008
  • {{r|Cryptography}}
    187 bytes (21 words) - 14:54, 25 October 2008
  • {{r|cryptography}}
    211 bytes (27 words) - 00:43, 30 November 2008
  • {{r|cryptography}}
    178 bytes (19 words) - 00:06, 24 May 2008
  • {{r|Hash (cryptography)}}
    200 bytes (23 words) - 20:13, 11 September 2009
  • {{r|Hash (cryptography)}}
    141 bytes (15 words) - 19:39, 3 January 2009
  • {{r|Cryptography}}
    245 bytes (29 words) - 09:38, 18 June 2009
  • {{r|Cryptography}}
    404 bytes (52 words) - 21:37, 27 November 2010
  • ...e intended to be secure except in special circumstances; they use strong [[cryptography]] intended to be unbreakable by anyone without the key. Typically, two valu ...art of the controversies over cryptography in the 1990s; see [[politics of cryptography]]. Among the critics, a common term for escrowed encryption is '''GAK''' fo
    2 KB (334 words) - 05:49, 8 April 2024
  • {{r|Cryptography}}
    356 bytes (42 words) - 10:42, 3 September 2008
  • '''Secure Sockets Layer (SSL)''' is an [[cryptography#two-way encryption|encrypted]] end-to-end [[protocol (computer)| protocol]] | title = Applied Cryptography
    1 KB (210 words) - 05:49, 8 April 2024
  • ...t who was on the cypherpunks mailing list and moderates its successor, the cryptography list.
    497 bytes (81 words) - 05:48, 8 April 2024
  • {{r|cryptography}}
    141 bytes (16 words) - 06:04, 31 March 2009
  • ...and Bob]], and sometimes the other characters, are used to name roles in [[cryptography]].
    460 bytes (66 words) - 12:39, 30 November 2009
  • ...log in to a computer system. If he sends the actual password, or a [[Hash (cryptography)|hash]] of it, over the wire, then a wiretapper can get it. Moreover, if an ...in step 4 and the system verifies with the public key in step 6. A [[Hash (cryptography)|hash]] can also be used — step 4 is then to hash some combination of
    2 KB (382 words) - 05:49, 8 April 2024
  • *''The Code Book: The Science of Secrecy from [[Ancient Egypt]] to Quantum [[Cryptography]]'' (2000)
    453 bytes (58 words) - 05:23, 22 February 2012
  • ...66-) is a [[cryptographer]] best known for attacks against various [[hash (cryptography)|hash]] functions. Her team first broke [[MD5]] and SHA-0. In later papers
    481 bytes (71 words) - 20:32, 5 April 2012
  • {{rpl|Cryptography controversy}}
    585 bytes (70 words) - 13:33, 26 September 2020
  • ...re no FAQs specifically on block ciphers, but these ciphers are covered in cryptography FAQs. ...ode.asp?id=2152 RSA Laboratories' Frequently Asked Questions About Today's Cryptography], a good introduction but not up-to-date
    4 KB (600 words) - 23:49, 7 June 2012
  • ...Labs and the University of Pennsylvania. He has a [http://www.crypto.com/ cryptography resource site] and a [http://www.crypto.com/blog blog].
    536 bytes (77 words) - 07:33, 18 March 2024
  • {{rpl|Hash (cryptography)|Message digest}}
    568 bytes (59 words) - 09:03, 22 April 2024
  • Two [[cryptography | cryptographic]] techniques are used together to produce a digital signatu If both the [[hash (cryptography) | hash]] and the [[public key]] system used are secure, and no-one except
    2 KB (277 words) - 05:48, 8 April 2024
  • ...rency''' is the name given to digital means of payment that are based on [[Cryptography|cryptographic]] [[Tool|tools]] such as blockchains and [[Digital Signature|
    599 bytes (78 words) - 13:43, 14 January 2021
  • {{r|cryptography}}
    315 bytes (47 words) - 14:26, 22 May 2011
  • {{r|cryptography}}
    310 bytes (47 words) - 15:01, 22 May 2011
  • {{r|cryptography}}
    272 bytes (42 words) - 14:50, 22 May 2011
  • {{r|cryptography}}
    270 bytes (42 words) - 15:04, 22 May 2011
  • {{r|cryptography}}
    288 bytes (45 words) - 14:56, 22 May 2011
  • {{r|Asymmetric key cryptography}} {{r|Cryptography}}
    2 KB (262 words) - 19:07, 11 January 2010
  • {{r|Cryptography}}
    686 bytes (86 words) - 21:24, 30 November 2013
  • {{r|Cryptography}}
    436 bytes (55 words) - 19:11, 11 January 2010
  • The '''pseudo-Hadamard transform''', or '''PHT''', is a technique used in [[cryptography]], primarily [[block cipher]] design. It was introduced in the [[SAFER (cip This has two very desirable properties for [[cryptography|cryptographic]] use.
    2 KB (395 words) - 05:48, 8 April 2024
  • Some of the major developments in [[cryptography]] before AES were: * The [[RSA algorithm]] for [[public key]] cryptography, from [[Ron Rivest]], [[Adi Shamir]] and [[Leonard Adleman]].
    5 KB (823 words) - 20:23, 19 September 2011
  • {{r|Cryptography}}
    483 bytes (61 words) - 19:50, 11 January 2010
  • ...he [[birthday paradox]]. This math turns up whenever the question of two [[cryptography|cryptographic]] operations producing the same result becomes an issue. ...e authentication that these functions are intended to provide. See [[Hash (cryptography)#Collision resistance | collision resistance]] for details.
    3 KB (415 words) - 05:48, 8 April 2024
  • ...ipant on the Cypherpunk mailing list and on its successor, Perry Metzger's cryptography list. ...= Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography
    2 KB (259 words) - 07:37, 18 March 2024
  • {{r|Cryptography}}
    451 bytes (59 words) - 05:18, 22 February 2012
  • {{r|Cryptography}}
    559 bytes (72 words) - 19:40, 11 January 2010
  • {{r|Cryptography}}
    533 bytes (66 words) - 11:45, 11 January 2010
  • {{r|Cryptography}}
    557 bytes (70 words) - 11:45, 11 January 2010
  • {{r|Cryptography}}
    510 bytes (67 words) - 20:47, 11 January 2010
  • ...excellent [[cipher]] cannot protect against an enemy who knows the [[Key (cryptography) | key]]. Many [[cryptography|cryptographic]] techniques — [[block cipher]]s, [[stream cipher]]s, [
    3 KB (459 words) - 05:49, 8 April 2024
  • {{r|Hash (cryptography)}}
    568 bytes (75 words) - 20:10, 29 July 2010
  • {{r|Cryptography||**}}
    697 bytes (85 words) - 11:30, 27 February 2010
  • ...created a revolution in mathematics, communications, computer engineering, cryptography, and information science. Shannon's effect on the world arguably can be co == Cryptography ==
    7 KB (993 words) - 15:28, 8 January 2023
  • ...er open source application, [[off-the-record messaging]], which provides [[cryptography|encrypted]] connections over any protocol Pidgin supports.
    712 bytes (98 words) - 08:57, 22 April 2024
  • {{rpl|Cryptography controversy}}
    727 bytes (87 words) - 10:38, 25 April 2023
  • {{r|Public key cryptography}}
    541 bytes (71 words) - 18:46, 29 October 2009
  • {{r|Cryptography}}
    701 bytes (92 words) - 10:46, 5 January 2009
  • {{r|Hash (cryptography)}}
    626 bytes (79 words) - 16:23, 11 January 2010
  • There is a large [http://www.faqs.org/faqs/cryptography-faq/ cryptography FAQ] with many links to other material.
    1 KB (158 words) - 02:53, 6 March 2011
  • {{r|History of cryptography}}
    853 bytes (115 words) - 17:00, 12 August 2020
  • ...rets, from Greek language|Greek) is the general term that encompasses both cryptography (the study of techniques for keeping secrets) and cryptanalysis (codebreaki | url = http://people.csail.mit.edu/rivest/Rivest-Cryptography.pdf
    848 bytes (113 words) - 16:46, 25 March 2024
  • {{r|Cryptography controversy}}
    698 bytes (88 words) - 18:27, 11 January 2010
  • '''Ross Anderson''' is a [[Cryptography|cryptographer]] and security researcher at [[Cambridge University]]. His [h
    917 bytes (130 words) - 05:49, 8 April 2024
  • {{r|Cryptography}}
    830 bytes (103 words) - 14:41, 18 March 2024
  • {{r|Asymmetric key cryptography}}
    856 bytes (107 words) - 18:36, 11 January 2010
  • '''Carlisle Adams''' is a [[Cryptography|cryptographer]] and security expert, best known for designing the [[CAST (c
    799 bytes (109 words) - 21:26, 8 October 2020
  • {{r|Hash (cryptography)}}
    899 bytes (119 words) - 07:46, 8 January 2010
  • {{r|cryptography}}
    680 bytes (106 words) - 14:07, 22 May 2011
  • {{r|cryptography}}
    681 bytes (106 words) - 14:20, 22 May 2011
  • * <big>"A Mathematical Theory of Cryptography" (1945)</big> - Bell Laboratories Memorandum MM 45-110-02. Classified at th Shannon, C.E. (1945) A Mathematical Theory of Cryptography. Bell System Technical Memo MM 45-110-02, September 1, downloadable at [htt
    3 KB (449 words) - 13:27, 4 January 2023
  • {{r|Cryptography controversy}}
    859 bytes (116 words) - 21:38, 11 January 2010
  • {{r|Cryptography controversy}}
    909 bytes (127 words) - 12:57, 18 April 2024
  • {{r|Hash (cryptography)|Hash}}
    854 bytes (123 words) - 01:07, 2 November 2008
  • {{main|Cryptography}} ...ic key cryptography.</ref>. The historian David Kahn described public-key cryptography as "the most revolutionary new concept in the field since polyalphabetic su
    8 KB (1,233 words) - 05:48, 8 April 2024
  • {{r|Cryptography controversy}}
    1,014 bytes (137 words) - 21:28, 11 January 2010
  • {{r|Cryptography}}
    1 KB (132 words) - 14:31, 22 March 2024
  • {{r|Cryptography controversy}}
    1,018 bytes (132 words) - 20:29, 11 January 2010
  • ...,1024</td><td>72 or 80</td><td></td><td></td><td></td><td></td><td>[[Hash_(cryptography)#Skein|Skein]]</td><td>[[Block cipher#Whitening and tweaking|tweakable]]</t .../td><td>512</td><td>10</td><td></td><td></td><td></td><td></td><td>[[Hash_(cryptography)#Whirlpool|Whirlpool]]</td><td>AES-like</td>
    7 KB (1,292 words) - 12:20, 27 July 2010
  • ...l possible nonlinearity. The high [[non-linearity]] makes them useful in [[cryptography]], in the construction of [[stream cipher]]s or [[block cipher]]s. Bent fun | conference = selected Areas in Cryptography
    3 KB (435 words) - 23:36, 14 February 2010
  • {{dambigbox|Snake oil (cryptography)|Snake}} ...which have ''both wildly extravagant marketing claims and appallingly bad cryptography''. Unfortunately, these are somewhat common.
    6 KB (921 words) - 05:48, 8 April 2024
  • {{r|Cryptography}}
    969 bytes (150 words) - 04:51, 8 June 2011
  • {{r|Cryptography}}
    983 bytes (153 words) - 14:26, 31 May 2010
  • ...cience of secrets, from Greek) is the general term that encompasses both [[cryptography]] (the study of techniques for keeping secrets) and [[cryptanalysis]] (code Before the modern era, cryptography was concerned solely with message confidentiality (i.e. encryption) &mdash;
    9 KB (1,312 words) - 05:49, 8 April 2024
  • {{r|Cryptography controversy}}
    1 KB (150 words) - 19:28, 11 January 2010
  • Many of the references given for the parent topics [[cryptanalysis]] and [[cryptography]] discuss brute force attacks.
    1 KB (163 words) - 22:27, 26 March 2009
  • A '''cryptographic key''' is a variable which influences the behavior of a [[cryptography | cryptographic algorithm]]. A [[cipher]] uses an encryption key for encryp The more exotic keyed [[Hash_(cryptography)|hash]] functions use keys to change the behavior of the hash according to
    3 KB (523 words) - 05:49, 8 April 2024
  • '''Off-the-record messaging''' or '''OTR''' is a system for providing cryptography|encryption for Instant messaging (Internet chat) applications such as MSN a
    1 KB (174 words) - 07:34, 18 March 2024
  • ...o just '''A''' and '''B''', are the standard example users in writing on [[cryptography]], [[coding theory]], communication complexity theory etc. Carol and Dave o | title = Applied Cryptography
    5 KB (793 words) - 05:49, 8 April 2024
  • ...various products for securing electronic books were [[Snake (animal) oil (cryptography)|extremely weak]].<ref>{{citation
    2 KB (272 words) - 14:20, 8 March 2024
  • ...nal enforcement of the closed group by requiring that all connections be [[cryptography|encrypted]], with cryptographic keys issued by the network administrator.
    1 KB (191 words) - 14:50, 14 July 2008
  • ...combine [[public key]] (asymmetric) [[cryptography]] with [[Symmetric key cryptography|secret key]] (symmetric) techniques such as [[block cipher]]s, [[stream cip
    3 KB (544 words) - 05:49, 8 April 2024
  • ...s an alternate means of hiding messages, theoretically quite distinct from cryptography; in practice, however the two are often used together. As for [[cryptography]] and [[cryptanalysis]], it is possible to distinguish between steganograph
    11 KB (1,766 words) - 09:26, 31 October 2015
  • {{seealso|cryptography}}
    1 KB (159 words) - 15:30, 27 May 2008
  • '''Ron Rivest''' is a cryptography | cryptographer who teaches at MIT. He is probably best known as the "R" in
    1 KB (195 words) - 07:35, 18 March 2024
  • {{r|Cryptography controversy}}
    1 KB (156 words) - 15:53, 4 April 2024
  • ...ways a fixed-size, large integer. An example of a hash digest is [[Hash_(cryptography)#SHA-1|SHA-1]], which dates from 1994; the SHA-1 [[Algorithm|algorithm]] ta System.Security.Cryptography.SHA1CryptoServiceProvider sha1 =
    4 KB (586 words) - 15:45, 8 April 2024
  • | booktitle = Selected Areas in Cryptography (SAC '99)
    1 KB (215 words) - 14:23, 30 September 2009
  • | title = Applied Cryptography
    1 KB (228 words) - 05:49, 8 April 2024
  • * the 512-bit AES-like block cipher used in the [[Hash_(cryptography)#Whirlpool|Whirlpool]] hash algorithm, called the Whirlpool or W cipher ...reefish]] cipher, with 256, 512 and 1024-bit versions, used in the [[Hash_(cryptography)#Skein|Skein]] hash algorithm
    4 KB (551 words) - 12:36, 13 April 2016
  • {{r|Cryptography controversy}}
    2 KB (223 words) - 13:46, 10 March 2024
  • in which he stated six axioms of [[cryptography]]. Some are no longer relevant given the ability of computers to perform co Using secure cryptography is supposed to replace the difficult problem of keeping messages secure wit
    7 KB (1,186 words) - 14:20, 8 March 2024
  • ...]] (SSH) and its related protocols (SCP, SFTP etc.) which use [[public key cryptography]] and key-based authentication to solve the security problems in Telnet. T
    2 KB (248 words) - 10:02, 6 February 2009
  • ...me. A notable application is as the foundation for some kinds of modern [[cryptography]]. Within pure mathematics, modular arithmetic is of fundamental importanc
    2 KB (267 words) - 13:18, 6 December 2008
  • In [[cryptography]], '''perfect forward secrecy''' or '''PFS''' is a property of communicatio
    2 KB (253 words) - 05:49, 8 April 2024
  • {{rpl|Asymmetric key cryptography|public key}}
    3 KB (355 words) - 22:06, 3 March 2010
  • Symmetric two-way encryption, also known as ''[[Symmetric key cryptography|private key]]'' encryption, is where both the sender and the receiver use t Whitfield Diffie and Martin Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, Nov. 1976, pp: 644-6
    5 KB (879 words) - 09:41, 28 September 2023
  • in which he stated six axioms of [[cryptography]]. Some are no longer relevant given the ability of computers to perform co | url = http://people.csail.mit.edu/rivest/Rivest-Cryptography.pdf
    8 KB (1,338 words) - 05:49, 8 April 2024
  • A '''hashed message authentication code''' or '''HMAC''' is a [[cryptography | cryptographic]] technique for providing [[information security#integrity|
    2 KB (313 words) - 05:49, 8 April 2024
  • ...t would kill it if they could. To prevent this, military IFF signals are [[cryptography|encrypted]], and change frequently. ATC transponders do not have this degre
    2 KB (284 words) - 10:20, 8 April 2024
  • ...97); ''The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography'' (2000); ''Big Bang: The Origin of the Universe'' (2005); and ''Trick or T
    2 KB (330 words) - 05:11, 22 February 2012
  • ...the advent of inexpensive computers made widespread access to high quality cryptography possible. The 1990s had the "crypto wars"; intense debates on cryptography policy issues. <ref name="levybook">{{cite book|
    20 KB (2,946 words) - 05:49, 8 April 2024
  • | booktitle = Selected Areas in Cryptography, SAC 2000
    2 KB (309 words) - 05:48, 8 April 2024
  • ...elds a few authors provide the main connection &mdash; [[Ron Rivest]] in [[cryptography]], [[John Tukey]] in [[Statistics]], [[Eugene Koonin]], [[Eric Lander]] and
    2 KB (370 words) - 12:51, 11 February 2013
  • {{main|Cryptography}} ...of the applications of each, see the [[Cryptography#Codes_versus_ciphers| cryptography]] article.
    12 KB (1,744 words) - 05:48, 8 April 2024
  • In [[cryptography]] an '''active attack''' on a communications system is one in which the att ...xecute'''. The attacker must not only intercept messages, break whatever [[cryptography]] is in use (often ''both'' an authentication mechanism and a cipher), and
    6 KB (903 words) - 05:49, 8 April 2024
  • Computer and communications security mechanisms that depend on [[public key cryptography]] require confidence in the existence of a trusted means of obtaining the
    2 KB (365 words) - 05:49, 8 April 2024
  • ...des the supporting tools to make it practical to deploy and use public key cryptography. The first essential element of PKI is that the creators of public-private
    2 KB (388 words) - 05:49, 8 April 2024
  • ...ity either to intranets or the Internet, with the limited exception that [[cryptography|encrypted]] tunnels may pass through an untrusted network acting as a backb
    3 KB (397 words) - 20:52, 4 November 2008
  • ...ve drastic consequences for the future: e.g. Shor's algorithm relevance to cryptography. ...he factors of a number. It is particularly important because of the use in cryptography of multiplying together two large prime numbers. Factoring this number into
    8 KB (1,344 words) - 23:59, 8 February 2010
  • | journal = Designs, Codes and Cryptography | journal = Selected Areas in Cryptography (SAC '96)
    9 KB (1,452 words) - 05:49, 8 April 2024
  • ...tents, and forwarding them on certainly existed in the Middle Ages. Even [[cryptography|encrypted]] communications were being [[cryptanalysis|deciphered]], such as
    3 KB (437 words) - 23:20, 8 August 2010
  • ...RED and BLACK, except through an approved security device, typically an [[cryptography|encryptor]], or, when a PDS is used, an [[optoisolator]] or other device th
    3 KB (421 words) - 05:48, 8 April 2024
  • | title = Applied Cryptography: Protocols, Algorithms, and Source Code in C | contribution = Lecture 3: Cryptography Support Services: Key Management
    7 KB (1,015 words) - 05:48, 8 April 2024
  • ...the theoretical basis of [[algorithm]]s for [[storing integers]] and in [[cryptography]]. The Chinese remainder theorem can be generalized to a statement about [
    3 KB (535 words) - 15:02, 22 November 2008
  • {{main|Cryptography}} | conference = Selected Areas in Cryptography, SAC '99
    8 KB (1,297 words) - 05:48, 8 April 2024
  • ...&mdash; then either full IPsec or BTNS blocks that. The packets are all [[cryptography|encrypted]], so while the enemy can intercept them, he cannot read them unl
    3 KB (516 words) - 05:48, 8 April 2024
  • Generalized versions of the birthday paradox have applications in [[cryptography]], whenever two things to turn out coincidentally the same is an issue ([[b
    4 KB (538 words) - 01:33, 9 July 2010
  • While frequency hopping is not cryptography|encryption, it increases security, and most SINCGARS radios can be equipped
    3 KB (476 words) - 16:23, 30 March 2024
  • | title = Applied Cryptography | title = Handbook of Applied Cryptography
    7 KB (1,171 words) - 05:48, 8 April 2024
  • | title = Lecture Notes on Cryptography ...agant marketing claims; these are often described as [[Snake (animal)_oil_(cryptography)|snake oil]]. One common sign of snake oil is that the vendor claims one-ti
    12 KB (1,878 words) - 05:48, 8 April 2024
  • ...l telephone switches, ruggedized for field use and designed to incorporate cryptography|encryption devices for communications security. These toll switches, in tur
    3 KB (508 words) - 16:22, 30 March 2024
  • ...scribed using cubic polynomial equations, have important applications to [[cryptography]]. The study of solutions of general systems of polynomial equations in se
    4 KB (647 words) - 16:35, 22 December 2008
  • | title = Internet Cryptography
    5 KB (761 words) - 16:22, 30 March 2024
  • ...intense politics of cryptography|political and legal controversies around cryptography of the period. Most have remained active into the 21st century, and others ...nly one way this vision will materialize, and that is by widespread use of cryptography. Is this technologically possible? Definitely. The obstacles are political
    35 KB (5,430 words) - 07:27, 18 March 2024
  • | title = Applied Cryptography: Protocols, Algorithms, and Source Code in C ...eystrokes or mouse movements. In other cases, such as extremely critical [[cryptography]], only the best uncorrelated physical random sequences will do. See [[#Ra
    23 KB (3,650 words) - 05:49, 8 April 2024
  • ...s limited the use of e-mail to so-called friendly applications. Public-key cryptography has been applied to e-mail messaging, notably in [[PEM]] (Privacy Enhanced
    5 KB (732 words) - 11:46, 2 February 2023
  • While frequency hopping is not cryptography|encryption, it increases security, and most Have Quick II radios can be equ
    4 KB (694 words) - 16:22, 30 March 2024
  • ...ing its subversion. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. ...y reasonable -- assumptions). See [[Cryptography#Cryptography is difficult|cryptography is difficult]] for further discussion.
    32 KB (4,913 words) - 14:38, 18 March 2024
  • ...ing its subversion. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. ...y reasonable -- assumptions). See [[Cryptography#Cryptography is difficult|cryptography is difficult]] for further discussion.
    32 KB (4,916 words) - 05:49, 8 April 2024
  • During the [[Second World War]], Turing was one of the key [[cryptography|codebreakers]] on the British [[ULTRA]] project which read many [[Germany|G
    5 KB (782 words) - 05:57, 8 April 2024
  • The term '''cryptography''' comes from [[Greek language|Greek]] κρυπτός ''kryptós'' "hidden, ...pread of computers and electronic communication systems in recent decades, cryptography has become much more broadly important.
    52 KB (8,332 words) - 05:49, 8 April 2024
  • ...tions/publi00039.cfm}}</ref> While such traffic was normally immune from [[cryptography#cryptanalysis|cryptanalysis]] because it used the [[one-time pad]] system,
    5 KB (731 words) - 08:11, 4 May 2024
  • In [[cryptography]], a '''stream cipher''' is a symmetric [[cipher]] which encrypts data by c In theory, any [[hash (cryptography) | hash algorithm]] could be used to construct a stream cipher by repeatedl
    24 KB (3,851 words) - 05:49, 8 April 2024
  • A related concept is cypherpunk, a group focused on uses of [[cryptography]] that could create social change.
    5 KB (763 words) - 18:31, 13 March 2024
  • {{main|Cryptography}} In cryptography, a '''hash''' or '''message digest''' is a fixed-size string calculated fro
    16 KB (2,641 words) - 15:51, 8 April 2024
  • ...ns.com/books/9780060512804/Cryptonomicon/index.aspx] has a great deal of [[cryptography]] in it, competently described. Parts of it take place around the turn of t
    5 KB (854 words) - 05:49, 8 April 2024
  • is a technique of [[cryptography]] that allows two parties without any initial [[shared secret]] to create o
    6 KB (954 words) - 05:48, 8 April 2024
  • | conference = Selected Areas in Cryptography, SAC '99
    6 KB (1,064 words) - 02:04, 24 January 2017
  • In [[cryptography]], '''block ciphers''' are one of the two main types of [[symmetric cipher] ...able to read the enciphered material. Block ciphers therefore use a [[Key (cryptography)|key]] and are designed to be hard to read without that key. Of course an a
    53 KB (8,371 words) - 05:48, 8 April 2024
  • The project refused to implement weak [[cryptography]], even where the RFCs required it. Their position was that the RFCs had un
    6 KB (914 words) - 05:48, 8 April 2024
  • ...the candidate designs took account of research in [[cryptanalysis]] and [[cryptography]], | booktitle = Selected Areas in Cryptography, SAC 2000
    21 KB (3,252 words) - 05:49, 8 April 2024
  • ...phisticated techniques present digital certificates, which, minimally, use cryptography as a means of authentication. ''By adding server authentication of any sort ...t, unauthorized users cannot obtain the cleartext content of the message. Cryptography|Cryptographic means are the primary way to achieve this service, although p
    13 KB (2,000 words) - 16:21, 30 March 2024
  • ...e = Permissive Action Links,Nuclear Weapons, and the History of Public Key Cryptography
    6 KB (813 words) - 14:14, 18 March 2024
  • ...and easy to use security can be achieved by organizational methods without cryptography. RMX was also meant as such a proof of concept, which should work in realit * The system should avoid cryptography for several reasons:
    41 KB (6,790 words) - 03:36, 17 October 2013
  • ...e for cypherpunks, who aim generally at a utopia brought about by strong [[cryptography]], and they developed some of the first [[anonymous remailer]]s.
    7 KB (1,051 words) - 18:31, 13 March 2024
  • ...ers' adherence to proactive security and the operating system's integrated cryptography. OpenBSD's homepage reflects their pride in security: "Only two remote hole
    7 KB (1,103 words) - 07:58, 12 September 2010
  • ...erties of prime numbers and their generalizations is essential to modern [[cryptography]] &mdash; in particular to [[public key cipher]]s that are crucial to Inter It is this aspect of prime numbers that is of such interest to modern cryptography, in particular in the area of public key ciphers, as mentioned above. The m
    18 KB (2,917 words) - 10:27, 30 August 2014
  • Communications security is provided by an external TSEC/KG-40 cryptography|encryptor. Cryptography|Encryption adds additional protection against both unauthorized access to,
    14 KB (2,111 words) - 16:23, 30 March 2024
  • ...the [[ITAR]] controls on export of arms. Under those regulations, strong [[cryptography]] such as PGP was considered a "dual use" item with military as well as civ
    7 KB (1,143 words) - 05:49, 8 April 2024
  • ...n to import and re-license a lot of material (several 100 K of HTML, about cryptography and security) that I'd written for another project. See [[User_talk:Sandy_H
    7 KB (1,208 words) - 07:39, 26 December 2015
  • === Application:cryptography===
    10 KB (1,637 words) - 16:03, 17 December 2008
  • IKE establishes the parameters for the services provided by the IPsec [[cryptography]]. As do all cryptographic services, these depend on [[key (cryptographic)| * Authentication using [[symmetric cryptography]] and a shared secret is also possible, but not widely used.
    40 KB (6,219 words) - 05:49, 8 April 2024
  • ...S. classified material cannot be transmitted by electronic means that lack cryptography|encryption. For example, the U.S. SIPRNET network provides Internet Protoco
    12 KB (1,757 words) - 07:30, 18 March 2024
  • {{rpr|Cryptography}}
    10 KB (1,530 words) - 05:06, 8 March 2024
  • In looking for collisions in [[hash (cryptography)|hash function]]s, an attacker can use a [[birthday attack]]. This works a
    11 KB (1,819 words) - 05:48, 8 April 2024
  • Early DRM relied on [[cryptography|encryption]], using a content encoding system and then limiting access to t ...hy_controversy#Bernstein_case|Bernstein case]] over export restrictions on cryptography had set a precedent that those protections sometimes apply to code. However
    47 KB (7,475 words) - 05:49, 8 April 2024
  • ...erties of prime numbers and their generalizations is essential to modern [[cryptography]]&mdash;in particular to [[public key cipher]]s that are crucial to Interne
    14 KB (2,281 words) - 12:20, 13 September 2013
  • ...tempt to arrange network communication systems so that any two nodes can [[cryptography|encrypt]] their communication, without any connection-specific setup by the
    14 KB (2,265 words) - 05:49, 8 April 2024
  • ...known example is the moduli used in the [[RSA algorithm]] for [[public key cryptography]]; an RSA modulus is a product of two primes, each of a few hundred bits.
    15 KB (2,548 words) - 21:03, 20 August 2010
  • ...opment of writing; see [[cipher]], and a more technical discussion under [[cryptography]]. A simple encryption system, for example, is the [[Caesar cipher]]. Elec {{main|cryptography}}
    36 KB (5,247 words) - 05:49, 8 April 2024
  • ...re are already some related topics there such as [[Automata theory]] and [[Cryptography]]. I would have suggested an independent Computer Science Workgroup, but I ...ter Science groups. However, you're right in that [[Discrete Math]] and [[Cryptography]] are going to be joint articles between Math and Computers (at least as fa
    30 KB (4,607 words) - 20:11, 10 March 2012
  • In a '''secure VPN''', [[cryptography|encryption]] is used to achieve privacy.
    15 KB (2,421 words) - 05:49, 8 April 2024
  • ...sent.<ref name="Sipser2006"/>. One negative impact is that many forms of [[cryptography]] would become easy to "[[security cracking|crack]]" and would therefore be
    17 KB (2,637 words) - 13:14, 6 November 2010
  • ...ure in computer hardware, [[Information theory|information theory]], and [[Cryptography]], without which all of today's digital communication would be impossible.
    12 KB (1,906 words) - 10:45, 18 January 2021
  • Python’s stash of third party contributed packages, for game development, cryptography, physics modeling, and bioinformatics, exploded exponentially. In Python, a
    12 KB (1,808 words) - 22:24, 14 February 2021
  • ## [[Cryptography]] - [[User:Jnc|Jnc]]
    12 KB (1,457 words) - 08:39, 22 April 2024
  • | [[Combinatorics]] || [[Theory of computation]] || [[Cryptography]] || [[Graph theory]] ...[[Financial mathematics]] • [[Game theory]] • [[Mathematical biology]] • [[Cryptography]] • [[Operations research]]
    30 KB (4,289 words) - 16:03, 20 January 2023
  • The permutation ensures rapid [[Avalanche (cryptography)|avalanche]]; a one-bit change in key affects one S-box; a one-bit change i
    16 KB (2,456 words) - 05:48, 8 April 2024
  • There are [[cryptography]] applications that can serve as a remedy to one or more of the above. Some
    17 KB (2,760 words) - 11:50, 2 February 2023
  • ...nformation, which leads to quantum communication, quantum games, [[quantum cryptography]] and [[quantum computation]].
    24 KB (3,745 words) - 02:21, 26 October 2013
  • ...odels assume, for example, that many of the security mechanisms will use [[cryptography]] in the [[Secure Sockets Layer]] or some other form of [[Transport Layer S
    20 KB (2,779 words) - 13:29, 20 March 2023
  • must determine whether cryptography is needed, and, if so, whether
    24 KB (3,628 words) - 21:04, 17 April 2014
  • for [[cryptography|encrypting messages]] (e.g., [[RSA]])
    27 KB (4,383 words) - 08:05, 11 October 2011
  • ...ly faster than a standard computer. However, these problems, relating to [[cryptography]] and, unsurprisingly, quantum physics simulations, are of considerable pra
    25 KB (3,906 words) - 12:07, 22 February 2009
  • ...ncluding the Battle of the Atlantic, the Mediterranean Theater, and MAGIC (cryptography)|MAGIC against the Japanese in the Pacific Theater and the China-Burma-Indi
    23 KB (3,456 words) - 18:47, 3 April 2024
  • ...munications equipment. Under the French, no Vietnamese had been trained in cryptography, so, the initial messages were sent in the clear. On September 23, 1945, th
    25 KB (3,805 words) - 22:34, 14 June 2009
  • .... We were just a few then in Room 2646, young people who gave ourselves to cryptography with the same ascetic devotion with which young men enter a monastery. It w
    25 KB (3,954 words) - 12:48, 2 April 2024
  • ...ment and keys, is the complement of communications security. The strongest cryptography in the world cannot protect information that, when not being sent through s
    33 KB (4,816 words) - 08:11, 4 May 2024
  • ...y manipulating quantum states. Efforts are being made to develop [[quantum cryptography]], which will allow guaranteed secure transmission of [[information]]. A mo
    37 KB (5,578 words) - 04:54, 21 March 2024
  • ...cess to all parts of the station, with the exception of the Americans’ own cryptography room."
    32 KB (4,630 words) - 06:04, 8 April 2024
  • ...ray-1]], were associated almost exclusively with scientific research and [[cryptography]] applications. However, as multimedia has largely shifted to digital medi
    37 KB (5,596 words) - 21:55, 26 April 2008