Topics in cryptography The following outline is provided as an overview of and topical guide to cryptography:Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the ...
 Index of cryptography articles Articles related to cryptography include:3-D Secure •3-Way •40-bit encryption •56-bit encryption •5-UCO •
 History of cryptography Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of met... History of cryptography - Wikipedia
 Timeline of cryptography Below is a timeline of notable events related to cryptography.
 Cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term... Cipher - Wikipedia
 Symmetric-key algorithm Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a...
 Stream cipher A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher each plaintext digit is encrypted one at a time wi... Stream cipher - Wikipedia
 Block ciphers In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key. Block ciphe... Block ciphers - Wikipedia
 Block cipher modes of operation In cryptography, a mode of operation is an algorithm that uses a block cipher to provide an information service such as confidentiality or authenticity.A block cipher by itself is only suitable for th... Block cipher modes of operation - Wikipedia
 Asymmetric key algorithm Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public....
 Key (cryptography) In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result...
 Key authentication Key authentication is used to solve the problem of authenticating the keys of the person (say "person B") to whom some other person ("person A") is talking to or trying to talk to. In other words, it ...
 Weak key In cryptography, a weak key is a key, which, used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually represent a very small fraction of the overall keyspace, wh...
 Cryptographic hash function A cryptographic hash function is a hash function which is considered practically impossible to invert, that is, to recreate the input data from its hash value alone. These one-way hash functions have ... Cryptographic hash function - Wikipedia
 Cryptanalysis Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems. Cryptanaly... Cryptanalysis - Wikipedia
 Cryptography standards There are a number of standards related to cryptography. Standard algorithms and protocols provide a focus for study; standards for popular applications attract a large amount of cryptanalysis.
 List of cryptographers List of cryptographers. List of cryptographers - Wikipedia
 United States Naval Computing Machine Laboratory The United States Naval Computing Machine Laboratory was a highly secret design and manufacturing site for code-breaking machinery located in Building 26 of the National Cash Register (NCR) company in... United States Naval Computing Machine Laboratory - Wikipedia
 Timing attack In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. Every logical ope... Timing attack - Wikipedia
 Steganalysis Steganalysis is the study of detecting messages hidden using steganography; this is analogous to cryptanalysis applied to cryptography.The goal of steganalysis is to identify suspected packages, ...
 Random number generator attack The security of cryptographic systems depends on some secret data that is known to authorized persons but unknown and unpredictable to others. To achieve this unpredictability, some randomization is t...
 Numerical cipher
 Supply chain attack A supply chain attack is a cryptographic attack where a product, typically a device that performs encryption or secure transactions, is tampered with during manufacture or while it is still in the sup...
 Password cracking In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach (brute-force ...
 Side channel attack In cryptography, a side-channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms... Side channel attack - Wikipedia
 Integral cryptanalysis In cryptography, integral cryptanalysis is a cryptanalytic attack that is particularly applicable to block ciphers based on substitution-permutation networks. It was originally designed by Lars Knudse...
 Sinkov statistic Sinkov statistics, also known as log-weight statistics, is a specialized field of statistics that was developed by Abraham Sinkov, while working for the small Signal Intelligence Service organization,...
 Rubber-hose cryptanalysis In cryptography, rubber-hose cryptanalysis is a euphemism for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture—such as beating that...
 Watermarking attack In cryptography, a watermarking attack is an attack on disk encryption methods where the presence of a specially crafted piece of data (e.g., a decoy file) can be detected by an attacker without knowi...
 Pwdump pwdump is the name of various Windows programs that output the LM and NTLM password hashes of local user accounts from the Security Account Manager (SAM). In order to work, it must be run under an Adm...
 Babington Plot The Babington Plot was a plot in 1586 to assassinate Queen Elizabeth, a Protestant, and put the rescued Mary, Queen of Scots, her Roman Catholic cousin, on the English throne. It led to the execution ... Babington Plot - Wikipedia