• The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information...
    20 KB (1,901 words) - 17:17, 17 July 2025
  • Thumbnail for Cryptography
    the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing...
    101 KB (11,139 words) - 05:17, 7 August 2025
  • A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic...
    13 KB (1,517 words) - 06:00, 3 August 2025
  • In RSA-based cryptography, a user's private key—which can be used to sign messages, or decrypt messages sent to that user—is a pair of large prime numbers...
    69 KB (8,479 words) - 06:50, 11 August 2025
  • Cryptography, the use of codes and ciphers, began thousands of years ago. Until recent decades, it has been the story of what might be called classical...
    53 KB (6,893 words) - 22:53, 28 July 2025
  • In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating...
    16 KB (1,918 words) - 14:30, 11 July 2025
  • In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
    13 KB (1,527 words) - 22:35, 14 June 2025
  • Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer...
    6 KB (819 words) - 14:10, 3 August 2025
  • Thumbnail for Siemens and Halske T52
    Geheimfernschreiber Photographs of Sturgeon Entry for "Sturgeon" in the Government Code and Cypher School Cryptographic Dictionary Bletchley Park's Sturgeon...
    7 KB (919 words) - 05:17, 5 August 2025
  • Thumbnail for Visual cryptography
    Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted...
    12 KB (1,411 words) - 09:59, 24 June 2025
  • Thumbnail for Merkle tree
    Merkle tree (category Cryptographic hash functions)
    In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" node is labelled with the cryptographic hash of a data...
    15 KB (1,785 words) - 00:31, 10 August 2025
  • Thumbnail for Digital signature
    sender known to the recipient. Digital signatures are a type of public-key cryptography, and are commonly used for software distribution, financial transactions...
    42 KB (4,980 words) - 12:28, 8 August 2025
  • Harvest now, decrypt later (category Cryptography)
    future. As of 2022[update], the U.S. federal government has proposed a roadmap for organizations to start migrating toward quantum-cryptography-resistant...
    5 KB (424 words) - 23:25, 1 August 2025
  • Joan Clarke (category Members of the Order of the British Empire)
    communications earned her awards and citations, such as appointment as a Member of the Order of the British Empire (MBE), in 1946. Joan Elisabeth Lowther Clarke was...
    21 KB (1,968 words) - 22:53, 10 August 2025
  • The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers....
    9 KB (1,053 words) - 04:19, 31 December 2024
  • probabilistic for square root of a quadratic residue modulo a prime. Menezes, Oorschot, Vanstone, Scott: Handbook of Applied Cryptography (free PDF downloads)...
    14 KB (2,076 words) - 14:01, 26 March 2025
  • Thumbnail for Enigma machine
    components of the daily key, which enabled the Cipher Bureau to read German Enigma messages starting from January 1933. Over time, the German cryptographic procedures...
    95 KB (11,562 words) - 08:56, 7 August 2025
  • Thumbnail for Encryption
    In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can...
    34 KB (3,645 words) - 19:23, 28 July 2025
  • Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC...
    39 KB (4,677 words) - 07:29, 27 June 2025
  • history of cryptography, a grille cipher was a technique for encrypting a plaintext by writing it onto a sheet of paper through a pierced sheet (of paper...
    17 KB (2,249 words) - 10:46, 25 May 2025
  • In cryptography, a substitution cipher is a cipher that creates the ciphertext (its output) by replacing units of the plaintext (its input) in a defined...
    30 KB (4,041 words) - 07:06, 11 August 2025
  • Thumbnail for Hash collision
    returns a fixed length of bits. Although hash algorithms, especially cryptographic hash algorithms, have been created with the intent of being collision resistant...
    9 KB (1,120 words) - 20:01, 19 June 2025
  • The Cryptographic Message Syntax (CMS) is the IETF's standard for cryptographically protected messages. It can be used by cryptographic schemes and protocols...
    3 KB (322 words) - 07:10, 20 February 2025
  • Thumbnail for Symmetric-key algorithm
    algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys...
    15 KB (1,540 words) - 21:14, 19 June 2025
  • advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny....
    52 KB (6,092 words) - 20:53, 17 July 2025
  • Thumbnail for RIPEMD
    RIPEMD (category Cryptographic hash functions)
    has a RIPEMD-160 function. RIPEMD (RIPE Message Digest) is a family of cryptographic hash functions developed in 1992 (the original RIPEMD) and 1996 (other...
    9 KB (884 words) - 16:44, 18 July 2025
  • Thumbnail for Pigpen cipher
    fragments of a grid. The example key shows one way the letters can be assigned to the grid. The Pigpen cipher offers little cryptographic security. It...
    12 KB (1,483 words) - 16:12, 7 August 2025
  • Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself...
    24 KB (2,872 words) - 22:30, 4 July 2025
  • Thumbnail for Polybius square
    Polybius square (category History of telecommunications)
    can be represented by a smaller set of symbols, which is useful for telegraphy, steganography, and cryptography. The device was originally used for fire...
    10 KB (1,134 words) - 07:37, 25 May 2025
  • Fortuna (PRNG) (category Cryptographically secure pseudorandom number generators)
    Fortuna is a cryptographically secure pseudorandom number generator (CS-PRNG) devised by Bruce Schneier and Niels Ferguson and published in 2003. It is...
    8 KB (923 words) - 14:45, 13 April 2025