• Thumbnail for Cryptography
    Cryptography, or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study"...
    98 KB (10,730 words) - 08:25, 22 April 2024
  • Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
    53 KB (5,552 words) - 22:03, 30 March 2024
  • Thumbnail for Public-key cryptography
    Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a...
    35 KB (4,031 words) - 00:41, 26 April 2024
  • Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC...
    39 KB (4,660 words) - 19:30, 4 March 2024
  • A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic...
    12 KB (1,496 words) - 14:16, 25 March 2024
  • Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography...
    80 KB (8,933 words) - 21:32, 1 May 2024
  • In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
    13 KB (1,481 words) - 04:52, 1 May 2024
  • Thumbnail for Encryption
    In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext...
    33 KB (3,575 words) - 16:30, 24 April 2024
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    45 KB (6,067 words) - 11:48, 27 April 2024
  • Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might...
    50 KB (6,651 words) - 19:44, 20 March 2024
  • Thumbnail for Symmetric-key algorithm
    Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of...
    15 KB (1,569 words) - 03:17, 2 January 2024
  • and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines...
    20 KB (1,876 words) - 10:47, 24 February 2024
  • Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer...
    6 KB (811 words) - 23:13, 20 December 2023
  • Thumbnail for Cryptanalysis
    is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown. In...
    44 KB (5,176 words) - 14:55, 27 April 2024
  • "Introduction to Cryptography with Open-Source Software". p. 12. Surender R. Chiluka. "Public key Cryptography". Neal Koblitz. "Cryptography As a Teaching...
    61 KB (7,868 words) - 01:02, 3 May 2024
  • A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences...
    9 KB (1,009 words) - 22:25, 21 March 2024
  • The export of cryptography is the transfer from one country to another of devices and technology related to cryptography. In the early days of the Cold...
    2 KB (166 words) - 18:06, 29 April 2024
  • Thumbnail for Alice and Bob
    fictional characters commonly used as placeholders in discussions about cryptographic systems and protocols, and in other science and engineering literature...
    24 KB (2,023 words) - 07:18, 22 April 2024
  • Thumbnail for Ultra (cryptography)
    (India), SCU13 and SCU14. The cryptographic element of each SLU was supplied by the RAF and was based on the TYPEX cryptographic machine and one-time pad systems...
    78 KB (10,411 words) - 09:04, 29 February 2024
  • Elliptic Curve Digital Signature Algorithm (category Public-key cryptography)
    In cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic-curve...
    19 KB (2,822 words) - 03:20, 30 April 2024
  • Cryptography is the practice and study of encrypting information, or in other words, securing information from unauthorized access. There are many different...
    28 KB (3,045 words) - 06:33, 26 March 2024
  • Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
    22 KB (2,846 words) - 07:57, 27 March 2024
  • Thumbnail for Digital signature
    to the recipient. Digital signatures are a standard element of most cryptographic protocol suites, and are commonly used for software distribution, financial...
    44 KB (5,198 words) - 17:17, 25 April 2024
  • Thumbnail for Diffie–Hellman key exchange
    Diffie–Hellman (DH) key exchange is a mathematical method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols...
    45 KB (4,969 words) - 19:55, 26 April 2024
  • Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted...
    10 KB (1,301 words) - 15:36, 3 April 2024
  • Financial cryptography is the use of cryptography in applications in which financial loss could result from subversion of the message system. Financial...
    5 KB (546 words) - 10:05, 22 March 2024
  • A cryptographically secure pseudorandom number generator (CSPRNG) or cryptographic pseudorandom number generator (CPRNG) is a pseudorandom number generator...
    30 KB (3,740 words) - 07:20, 29 April 2024
  • Thumbnail for Cryptographic nonce
    In cryptography, a nonce is an arbitrary number that can be used just once in a cryptographic communication. It is often a random or pseudo-random number...
    7 KB (898 words) - 00:40, 15 April 2024
  • In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating...
    15 KB (1,781 words) - 08:44, 18 April 2024
  • Thumbnail for Books on cryptography
    Books on cryptography have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial...
    28 KB (3,609 words) - 12:41, 13 December 2023