• The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information...
    20 KB (1,901 words) - 17:17, 17 July 2025
  • Thumbnail for Cryptography
    the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing...
    101 KB (11,138 words) - 15:26, 1 August 2025
  • A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic...
    13 KB (1,517 words) - 06:00, 3 August 2025
  • Cryptography, the use of codes and ciphers, began thousands of years ago. Until recent decades, it has been the story of what might be called classical...
    53 KB (6,893 words) - 22:53, 28 July 2025
  • In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
    13 KB (1,527 words) - 22:35, 14 June 2025
  • Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer...
    6 KB (819 words) - 14:10, 3 August 2025
  • In RSA-based cryptography, a user's private key—which can be used to sign messages, or decrypt messages sent to that user—is a pair of large prime numbers...
    68 KB (8,447 words) - 02:37, 31 July 2025
  • In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating...
    16 KB (1,918 words) - 14:30, 11 July 2025
  • Thumbnail for Enigma machine
    components of the daily key, which enabled the Cipher Bureau to read German Enigma messages starting from January 1933. Over time, the German cryptographic procedures...
    95 KB (11,556 words) - 02:16, 1 August 2025
  • Harvest now, decrypt later (category Cryptography)
    future. As of 2022[update], the U.S. federal government has proposed a roadmap for organizations to start migrating toward quantum-cryptography-resistant...
    5 KB (424 words) - 23:25, 1 August 2025
  • Thumbnail for Visual cryptography
    Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted...
    12 KB (1,411 words) - 09:59, 24 June 2025
  • computers Outline of computing and Outline of information technology Outline of computer science Outline of artificial intelligence Outline of cryptography Outline...
    8 KB (846 words) - 12:29, 30 July 2025
  • Joan Clarke (category Members of the Order of the British Empire)
    communications earned her awards and citations, such as appointment as a Member of the Order of the British Empire (MBE), in 1946. Joan Elisabeth Lowther Clarke was...
    21 KB (1,970 words) - 18:18, 1 August 2025
  • Thumbnail for Encryption
    In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can...
    34 KB (3,645 words) - 19:23, 28 July 2025
  • The Cryptographic Message Syntax (CMS) is the IETF's standard for cryptographically protected messages. It can be used by cryptographic schemes and protocols...
    3 KB (322 words) - 07:10, 20 February 2025
  • Thumbnail for Polybius square
    Polybius square (category History of telecommunications)
    can be represented by a smaller set of symbols, which is useful for telegraphy, steganography, and cryptography. The device was originally used for fire...
    10 KB (1,134 words) - 07:37, 25 May 2025
  • Thumbnail for Digital signature
    sender known to the recipient. Digital signatures are a type of public-key cryptography, and are commonly used for software distribution, financial transactions...
    42 KB (4,980 words) - 23:52, 1 August 2025
  • In cryptography, key size or key length refers to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines...
    29 KB (3,225 words) - 14:31, 21 June 2025
  • Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC...
    39 KB (4,677 words) - 07:29, 27 June 2025
  • Thumbnail for Siemens and Halske T52
    Geheimfernschreiber Photographs of Sturgeon Entry for "Sturgeon" in the Government Code and Cypher School Cryptographic Dictionary Bletchley Park's Sturgeon...
    7 KB (920 words) - 14:16, 11 May 2025
  • Thumbnail for Symmetric-key algorithm
    algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys...
    15 KB (1,540 words) - 21:14, 19 June 2025
  • A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences...
    9 KB (1,021 words) - 21:24, 23 July 2025
  • In cryptography, GMR is a digital signature algorithm named after its inventors Shafi Goldwasser, Silvio Micali and Ron Rivest. As with RSA the security...
    1 KB (132 words) - 13:34, 18 July 2025
  • The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers....
    9 KB (1,053 words) - 04:19, 31 December 2024
  • Thumbnail for ROT13
    of the Caesar cipher which was developed in ancient Rome, used by Julius Caesar in the 1st century BC. An early entry on the Timeline of cryptography...
    19 KB (2,089 words) - 09:15, 13 July 2025
  • in standards processes or otherwise publishes information about its cryptographic algorithms. The NSA has categorized encryption items into four product...
    9 KB (469 words) - 02:34, 21 October 2023
  • Thumbnail for Ciphertext
    Ciphertext (category Cryptography)
    In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known...
    9 KB (1,133 words) - 21:23, 27 July 2025
  • In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with...
    30 KB (4,028 words) - 07:04, 25 June 2025
  • In classical cryptography, the bifid cipher is a cipher which combines the Polybius square with transposition, and uses fractionation to achieve diffusion...
    4 KB (329 words) - 12:49, 31 July 2025
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle n}...
    49 KB (6,300 words) - 10:48, 24 July 2025