Main Page | See live article | Alphabetical index

List of cryptology topics

This page aims to list terms that are related to cryptology. This is so that those interested in the subject can monitor changes to the pages by clicking on "Related changes" in the sidebar and on the bottom of the page. Some of these terms do not have an article on Wikipedia yet: their presence here is intended to stimulate the creation of new articles on these topics.

The list is not necessarily complete or up to date - if you see an article that should be here but isn't (or one that shouldn't be here but is), please do update the page accordingly.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Digits and symbols

3DES -- 3-Way --

A

A5 -- Adi Shamir -- Advanced Encryption Standard -- AES -- Alan Turing -- Leone Battista Alberti -- algebraic cryptanalysis -- anonymous remailer -- Arthur Scherbius -- asymmetric key algorithm -- Atbash cipher --

B

Babington plot -- bit-flipping attack -- Bletchley Park -- blinding (cryptography) -- block cipher -- block cipher modes of operation -- block size -- Blowfish encryption algorithm -- Blum Blum Shub -- Boris Hagelin -- Bruce Schneier -- brute force attack --

C

Caesar cipher -- chaffing and winnowing -- cipher -- cipher-block chaining -- ciphertext -- Claude Shannon -- Clipper chip --Clifford Cocks -- code -- codebook -- codec -- Cold War -- Colossus computer -- confusion and diffusion -- courier -- covert channel -- covertext -- cryptanalysis -- crypto -- cryptographers -- cryptographic algorithm -- cryptographic key -- cryptographically secure pseudo-random number generator -- cryptography -- cryptology --

D

Daniel J. Bernstein -- Data Encryption Standard -- David Kahn -- David Wagner -- decryption -- DeCSS -- DES -- dictionary attack -- differential cryptanalysis -- differential power analysis -- Diffie-Hellman -- digital fingerprint -- digital signature -- digital watermark -- dining cryptographers protocol -- diplomatic bag --

E

Echelon -- Edward Hebern -- electronic cash -- electronic codebook -- El Gamal -- Elizabeth Friedman -- elliptic curve cryptography -- encryption -- Enigma -- entropy pool --espionage --

F

Feistel network -- FISH

G

GCHQ -- Geheimfernschreiber -- Gilbert Vernam -- GOST -- GPG -- group (mathematics)

H

hardware random number generator -- hash function -- Henryk Zygalski --

I

IACR -- IDEA encryption algorithm -- IKE -- index of coincidence -- information theory -- International Data Encryption Algorithm -- invisible ink -- IPSec -- IPv6 -- Iraqi Block Cipher -- ISAAC -- ISAKAMP --

J

Jerzy Rozycki -- Joan Daemen -- John Wilkins

K

Kasiski attack --
Kerckhoffs' principle -- key escrow -- key exchange -- KGB -- known-ciphertext attack -- known-plaintext attack --

L

Leo Marks -- Leonard Adleman -- letter-substitution cipher -- linear cryptanalysis -- Lorenz cypher -- Lucifer cipher --

M

man-in-the-middle attack -- Marian Rejewski -- Mars encryption algorithm -- Martin Hellman -- Max Newman -- MD4 -- MD5 -- message digest -- microdot -- monoalphabetic substitution --

N

nonce (cryptography) --
NSA -- null cipher -- number theory --

O

One-time pad --

P

Permissive Action Link -- Phil Zimmermann -- Pike -- PKI -- plaintext -- poem code -- polyalphabetic substitution -- Polybius square -- Pretty Good Privacy -- pseudo-random number generator -- public key crytography -- Purple code --

Q

Quantum Cryptography --

R

Ralph Merkle -- Railroad fence cypher -- RC4 -- RC4 cipher -- RC5 encryption algorithm -- RC6 encryption algorithm -- related-key attack -- RIPEMD-160 -- Ronald Rivest -- ROT-13 -- rotor machine -- RSA -- rubber-hose cryptanalysis

S

S-box -- Safer block cipher -- Scott Vanstone -- scrambler -- scytale -- SEAL -- secret writing -- secure cryptoprocessor -- Secure Sockets Layer -- security engineering -- Serpent encryption algorithm -- SHA -- SHA-1 -- shrinking generator -- SIGABA -- SIGINT -- Skipjack encryption algorithm -- slide attack cryptanalysis -- snake oil -- steganography -- stegotext -- straddling checkerboard -- stream cipher -- STURGEON -- symmetric key algorithm --

T

The Codebreakers -- The Communications Theory of Secrecy Systems --
TEMPEST -- Tiger hash function -- timing attack -- traffic analysis -- transposition cipher -- trapdoor function -- Tunny -- Twofish encryption algorithm -- Typex --

U

Ultra -- Ultra secret -- unicity distance -- USSR --

V

VENONA -- VIC cipher -- Vigenere cipher -- Vincent Rijmen --

W

Whitfield Diffie -- William Friedman --

X

XOR --

Y

Yarrow algorithm --

Z

Zero-knowledge proof -- zeroise --