The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information...
20 KB (1,901 words) - 17:17, 17 July 2025
the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing...
101 KB (11,138 words) - 15:26, 1 August 2025
A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic...
13 KB (1,517 words) - 06:00, 3 August 2025
Cryptography, the use of codes and ciphers, began thousands of years ago. Until recent decades, it has been the story of what might be called classical...
53 KB (6,893 words) - 22:53, 28 July 2025
In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
13 KB (1,527 words) - 22:35, 14 June 2025
Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer...
6 KB (819 words) - 14:10, 3 August 2025
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted...
12 KB (1,411 words) - 09:59, 24 June 2025
RSA cryptosystem (redirect from RSA public key cryptography)
In RSA-based cryptography, a user's private key—which can be used to sign messages, or decrypt messages sent to that user—is a pair of large prime numbers...
68 KB (8,447 words) - 02:37, 31 July 2025
Message authentication code (redirect from MAC (cryptography))
In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating...
16 KB (1,918 words) - 14:30, 11 July 2025
Enigma machine (redirect from Enigma cryptography machine)
components of the daily key, which enabled the Cipher Bureau to read German Enigma messages starting from January 1933. Over time, the German cryptographic procedures...
95 KB (11,556 words) - 02:16, 1 August 2025
Harvest now, decrypt later (category Cryptography)
future. As of 2022[update], the U.S. federal government has proposed a roadmap for organizations to start migrating toward quantum-cryptography-resistant...
5 KB (424 words) - 23:25, 1 August 2025
Joan Clarke (category Members of the Order of the British Empire)
communications earned her awards and citations, such as appointment as a Member of the Order of the British Empire (MBE), in 1946. Joan Elisabeth Lowther Clarke was...
21 KB (1,970 words) - 18:18, 1 August 2025
Encryption (redirect from Cryptography algorithm)
In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can...
34 KB (3,645 words) - 19:23, 28 July 2025
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC...
39 KB (4,677 words) - 07:29, 27 June 2025
Polybius square (category History of telecommunications)
can be represented by a smaller set of symbols, which is useful for telegraphy, steganography, and cryptography. The device was originally used for fire...
10 KB (1,134 words) - 07:37, 25 May 2025
Digital signature (redirect from Signature (cryptography))
sender known to the recipient. Digital signatures are a type of public-key cryptography, and are commonly used for software distribution, financial transactions...
42 KB (4,980 words) - 23:52, 1 August 2025
The Cryptographic Message Syntax (CMS) is the IETF's standard for cryptographically protected messages. It can be used by cryptographic schemes and protocols...
3 KB (322 words) - 07:10, 20 February 2025
Key size (redirect from Cryptography/key length)
In cryptography, key size or key length refers to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines...
29 KB (3,225 words) - 14:31, 21 June 2025
computers Outline of computing and Outline of information technology Outline of computer science Outline of artificial intelligence Outline of cryptography Outline...
8 KB (846 words) - 12:29, 30 July 2025
Siemens and Halske T52 (redirect from STURGEON (cryptography))
Geheimfernschreiber Photographs of Sturgeon Entry for "Sturgeon" in the Government Code and Cypher School Cryptographic Dictionary Bletchley Park's Sturgeon...
7 KB (920 words) - 14:16, 11 May 2025
In cryptography, GMR is a digital signature algorithm named after its inventors Shafi Goldwasser, Silvio Micali and Ron Rivest. As with RSA the security...
1 KB (132 words) - 13:34, 18 July 2025
Symmetric-key algorithm (redirect from Symmetric key cryptography)
algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys...
15 KB (1,540 words) - 21:14, 19 June 2025
A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences...
9 KB (1,021 words) - 21:24, 23 July 2025
in standards processes or otherwise publishes information about its cryptographic algorithms. The NSA has categorized encryption items into four product...
9 KB (469 words) - 02:34, 21 October 2023
of the Caesar cipher which was developed in ancient Rome, used by Julius Caesar in the 1st century BC. An early entry on the Timeline of cryptography...
19 KB (2,089 words) - 09:15, 13 July 2025
MD2 (hash function) (redirect from MD2 (cryptography))
The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers....
9 KB (1,053 words) - 04:19, 31 December 2024
Ciphertext (category Cryptography)
In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known...
9 KB (1,133 words) - 21:23, 27 July 2025
In classical cryptography, the bifid cipher is a cipher which combines the Polybius square with transposition, and uses fractionation to achieve diffusion...
4 KB (329 words) - 12:49, 31 July 2025
Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself...
24 KB (2,872 words) - 22:30, 4 July 2025
Substitution cipher (redirect from Substitution cryptography)
In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with...
30 KB (4,028 words) - 07:04, 25 June 2025