• Thumbnail for Cryptography
    Cryptography, or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study"...
    99 KB (10,975 words) - 11:30, 14 May 2025
  • Thumbnail for Public-key cryptography
    Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a...
    40 KB (4,512 words) - 17:51, 26 March 2025
  • Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
    63 KB (6,408 words) - 13:56, 6 May 2025
  • A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic...
    13 KB (1,524 words) - 21:51, 14 May 2025
  • Thumbnail for Encryption
    In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can...
    34 KB (3,645 words) - 17:52, 2 May 2025
  • Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography...
    82 KB (9,126 words) - 22:03, 22 May 2025
  • Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC...
    39 KB (4,677 words) - 13:04, 20 May 2025
  • In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
    13 KB (1,533 words) - 12:18, 19 January 2025
  • Financial cryptography is the use of cryptography in applications in which financial loss could result from subversion of the message system. Financial...
    5 KB (587 words) - 11:02, 19 February 2025
  • Cryptography, the use of codes and ciphers, began thousands of years ago. Until recent decades, it has been the story of what might be called classical...
    53 KB (6,893 words) - 19:25, 5 May 2025
  • Cryptography is the practice and study of encrypting information, or in other words, securing information from unauthorized access. There are many different...
    28 KB (3,046 words) - 01:54, 15 December 2024
  • and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines...
    20 KB (1,901 words) - 07:15, 23 January 2025
  • A cryptographically secure pseudorandom number generator (CSPRNG) or cryptographic pseudorandom number generator (CPRNG) is a pseudorandom number generator...
    29 KB (3,633 words) - 08:24, 16 April 2025
  • "Introduction to Cryptography with Open-Source Software". p. 12. Surender R. Chiluka. "Public key Cryptography". Neal Koblitz. "Cryptography As a Teaching...
    60 KB (7,787 words) - 23:29, 17 May 2025
  • Thumbnail for Symmetric-key algorithm
    Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of...
    15 KB (1,540 words) - 19:12, 22 April 2025
  • Thumbnail for Cryptanalysis
    is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown. In...
    45 KB (5,235 words) - 11:22, 20 May 2025
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    49 KB (6,299 words) - 20:13, 4 May 2025
  • Thumbnail for Diffie–Hellman key exchange
    exchange is a mathematical method of securely generating a symmetric cryptographic key over a public channel and was one of the first public-key protocols...
    48 KB (5,437 words) - 16:48, 22 April 2025
  • A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences...
    9 KB (1,015 words) - 07:59, 25 April 2025
  • Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
    22 KB (2,846 words) - 19:45, 6 February 2025
  • Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer...
    6 KB (819 words) - 05:08, 24 March 2025
  • The export of cryptography is the transfer from one country to another of devices and technology related to cryptography. In the early days of the Cold...
    2 KB (190 words) - 23:55, 8 June 2024
  • In cryptographic protocol design, cryptographic agility or crypto-agility is the ability to switch between multiple cryptographic primitives. A cryptographically...
    12 KB (1,222 words) - 11:18, 7 February 2025
  • Thumbnail for Cryptographic nonce
    In cryptography, a nonce is an arbitrary number that can be used just once in a cryptographic communication. It is often a random or pseudo-random number...
    7 KB (881 words) - 23:18, 22 May 2025
  • Thumbnail for Bibliography of cryptography
    Books on cryptography have been published sporadically and with variable quality for a long time. This is despite the paradox that secrecy is of the essence...
    28 KB (3,604 words) - 08:21, 14 October 2024
  • Thumbnail for Digital signature
    to the recipient. Digital signatures are a standard element of most cryptographic protocol suites, and are commonly used for software distribution, financial...
    45 KB (5,315 words) - 16:52, 11 April 2025
  • Thumbnail for Visual cryptography
    Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted...
    11 KB (1,416 words) - 02:11, 12 March 2025
  • In cryptography, padding is any of a number of distinct practices which all include adding data to the beginning, middle, or end of a message prior to...
    23 KB (3,307 words) - 14:54, 5 February 2025
  • The Cryptographic Message Syntax (CMS) is the IETF's standard for cryptographically protected messages. It can be used by cryptographic schemes and protocols...
    3 KB (322 words) - 07:10, 20 February 2025
  • Articles related to cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis...
    67 KB (2,932 words) - 23:20, 16 May 2025