Outline of cryptography The following outline is provided as an overview of and topical guide to cryptography:Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the ...
 Index of cryptography articles Articles related to cryptography include:3-D Secure •3-Way •40-bit encryption •56-bit encryption •5-UCO •
 History of cryptography Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of met... History of cryptography - Wikipedia
 Timeline of cryptography Below is a timeline of notable events related to cryptography.
 Cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term... Cipher - Wikipedia
 Symmetric-key algorithm Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a...
 Stream cipher A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher each plaintext digit is encrypted one at a time wi... Stream cipher - Wikipedia
 Block ciphers In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key. Block ciphe... Block ciphers - Wikipedia
 Block cipher modes of operation In cryptography, a mode of operation is an algorithm that uses a block cipher to provide an information service such as confidentiality or authenticity.A block cipher by itself is only suitable for th... Block cipher modes of operation - Wikipedia
 Asymmetric key algorithm Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public....
 Key (cryptography) In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result...
 Key authentication Key authentication is used to solve the problem of authenticating the keys of the person (say "person B") to whom some other person ("person A") is talking to or trying to talk to. In other words, it ...
 Weak key In cryptography, a weak key is a key, which, used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually represent a very small fraction of the overall keyspace, wh...
 Cryptographic hash function A cryptographic hash function is a hash function which is considered practically impossible to invert, that is, to recreate the input data from its hash value alone. These one-way hash functions have ... Cryptographic hash function - Wikipedia
 Cryptanalysis Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems. Cryptanaly... Cryptanalysis - Wikipedia
 Cryptography standards There are a number of standards related to cryptography. Standard algorithms and protocols provide a focus for study; standards for popular applications attract a large amount of cryptanalysis.
 List of cryptographers List of cryptographers. List of cryptographers - Wikipedia
 Timing attack In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. Every logical ope... Timing attack - Wikipedia
 Steganalysis Steganalysis is the study of detecting messages hidden using steganography; this is analogous to cryptanalysis applied to cryptography.The goal of steganalysis is to identify suspected packages, ...
 Numerical cipher
 Supply chain attack A supply chain attack is a cryptographic attack where a product, typically a device that performs encryption or secure transactions, is tampered with during manufacture or while it is still in the sup...
 Integral cryptanalysis In cryptography, integral cryptanalysis is a cryptanalytic attack that is particularly applicable to block ciphers based on substitution-permutation networks. It was originally designed by Lars Knudse...
 Sinkov statistic Sinkov statistics, also known as log-weight statistics, is a specialized field of statistics that was developed by Abraham Sinkov, while working for the small Signal Intelligence Service organization,...
 Rubber-hose cryptanalysis In cryptography, rubber-hose cryptanalysis is a euphemism for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture—such as beating that...
 Pwdump pwdump is the name of various Windows programs that output the LM and NTLM password hashes of local user accounts from the Security Account Manager (SAM). In order to work, it must be run under an Adm...
 Babington Plot The Babington Plot was a plot in 1586 to assassinate Queen Elizabeth, a Protestant, and put the rescued Mary, Queen of Scots, her Roman Catholic cousin, on the English throne. It led to the execution ... Babington Plot - Wikipedia
 Black bag operation Black bag operations (or black bag jobs) are covert or clandestine entries into structures to obtain information for human intelligence operations. This usually entails breaking and entering into den...
 Reservehandverfahren Reservehandverfahren (RHV) (English: Reserve Hand Procedure) was a German Naval World War II hand-cipher system used as a backup method when no working Enigma machine was available.The cipher had ...
 Japanese naval codes The vulnerability of Japanese naval codes and ciphers was crucial to the conduct of World War II, and had an important influence on foreign relations between Japan and the west in the years leading up...
 Zendian Problem The Zendian problem was an exercise in communication intelligence operations (mainly traffic analysis and cryptanalysis) devised by Lambros D. Callimahos as part of an advanced course, CA-400, that Ca...
 Brute-force attack In cryptography, a brute-force attack, or exhaustive key search, is a cryptanalytic attack that can, in theory, be used against any encrypted data (except for data encrypted in an information-theoreti... Brute-force attack - Wikipedia