• The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information...
    20 KB (1,901 words) - 17:17, 17 July 2025
  • Thumbnail for Cryptography
    the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing...
    101 KB (11,144 words) - 05:17, 7 August 2025
  • A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic...
    13 KB (1,517 words) - 06:00, 3 August 2025
  • In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
    13 KB (1,527 words) - 22:35, 14 June 2025
  • Cryptography, the use of codes and ciphers, began thousands of years ago. Until recent decades, it has been the story of what might be called classical...
    53 KB (6,893 words) - 22:53, 28 July 2025
  • Thumbnail for Enigma machine
    components of the daily key, which enabled the Cipher Bureau to read German Enigma messages starting from January 1933. Over time, the German cryptographic procedures...
    95 KB (11,562 words) - 08:56, 7 August 2025
  • Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer...
    6 KB (819 words) - 14:10, 3 August 2025
  • Thumbnail for Digital signature
    sender known to the recipient. Digital signatures are a type of public-key cryptography, and are commonly used for software distribution, financial transactions...
    42 KB (4,987 words) - 18:14, 7 August 2025
  • In RSA-based cryptography, a user's private key—which can be used to sign messages, or decrypt messages sent to that user—is a pair of large prime numbers...
    68 KB (8,447 words) - 02:37, 31 July 2025
  • advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny....
    52 KB (6,092 words) - 20:53, 17 July 2025
  • probabilistic for square root of a quadratic residue modulo a prime. Menezes, Oorschot, Vanstone, Scott: Handbook of Applied Cryptography (free PDF downloads)...
    14 KB (2,076 words) - 14:01, 26 March 2025
  • Thumbnail for Encryption
    In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can...
    34 KB (3,645 words) - 19:23, 28 July 2025
  • Thumbnail for Pigpen cipher
    fragments of a grid. The example key shows one way the letters can be assigned to the grid. The Pigpen cipher offers little cryptographic security. It...
    12 KB (1,483 words) - 16:12, 7 August 2025
  • Thumbnail for Symmetric-key algorithm
    algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys...
    15 KB (1,540 words) - 21:14, 19 June 2025
  • Harvest now, decrypt later (category Cryptography)
    future. As of 2022[update], the U.S. federal government has proposed a roadmap for organizations to start migrating toward quantum-cryptography-resistant...
    5 KB (424 words) - 23:25, 1 August 2025
  • Joan Clarke (category Members of the Order of the British Empire)
    communications earned her awards and citations, such as appointment as a Member of the Order of the British Empire (MBE), in 1946. Joan Elisabeth Lowther Clarke was...
    21 KB (1,970 words) - 18:18, 1 August 2025
  • In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating...
    16 KB (1,918 words) - 14:30, 11 July 2025
  • Thumbnail for Hash collision
    returns a fixed length of bits. Although hash algorithms, especially cryptographic hash algorithms, have been created with the intent of being collision resistant...
    9 KB (1,120 words) - 20:01, 19 June 2025
  • Thumbnail for Polybius square
    Polybius square (category History of telecommunications)
    can be represented by a smaller set of symbols, which is useful for telegraphy, steganography, and cryptography. The device was originally used for fire...
    10 KB (1,134 words) - 07:37, 25 May 2025
  • In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with...
    30 KB (4,039 words) - 04:59, 7 August 2025
  • The Cryptographic Message Syntax (CMS) is the IETF's standard for cryptographically protected messages. It can be used by cryptographic schemes and protocols...
    3 KB (322 words) - 07:10, 20 February 2025
  • Thumbnail for Siemens and Halske T52
    Geheimfernschreiber Photographs of Sturgeon Entry for "Sturgeon" in the Government Code and Cypher School Cryptographic Dictionary Bletchley Park's Sturgeon...
    7 KB (919 words) - 05:17, 5 August 2025
  • Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC...
    39 KB (4,677 words) - 07:29, 27 June 2025
  • Thumbnail for Timing attack
    In cryptography, a timing attack is a side-channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute...
    13 KB (1,541 words) - 14:52, 6 August 2025
  • A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences...
    9 KB (1,021 words) - 21:24, 23 July 2025
  • Thumbnail for HMAC
    code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. As with any MAC, it...
    18 KB (2,327 words) - 01:15, 2 August 2025
  • In cryptography, GMR is a digital signature algorithm named after its inventors Shafi Goldwasser, Silvio Micali and Ron Rivest. As with RSA the security...
    1 KB (132 words) - 13:34, 18 July 2025
  • Thumbnail for Visual cryptography
    Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted...
    12 KB (1,411 words) - 09:59, 24 June 2025
  • Thumbnail for Ciphertext
    Ciphertext (category Cryptography)
    In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known...
    9 KB (1,133 words) - 21:23, 27 July 2025
  • In classical cryptography, the bifid cipher is a cipher which combines the Polybius square with transposition, and uses fractionation to achieve diffusion...
    4 KB (329 words) - 12:49, 31 July 2025