Portal:Cryptography

From Wikipedia, the free encyclopedia

Culture · Geography · Health · History · Mathematics · Natural sciences · Philosophy · Religion · Society · Technology

Cryptography Portal

Cryptography

Cryptography (from Greek κρύπτω, "to conceal, to obscure", and γράφω, "to etch, to inscribe, to write down") is, traditionally, the study of means of converting information from its normal, comprehensible form into an incomprehensible format, rendering it unreadable without secret knowledge — the art of encryption. Cryptography is often used to replace or in combination with steganography. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, the field of cryptography has expanded its remit in two ways. Firstly, it provides mechanisms for more than just keeping secrets: schemes like digital signatures and digital cash, for example. Secondly, cryptography has come to be in widespread use by many civilians who do not have extraordinary needs for secrecy, although typically it is transparently built into the infrastructure for computing and telecommunications, and users are not aware of it.

More about Cryptography...

Selected article edit

An Enigma machine

The Enigma machine was a portable cipher machine used to encrypt and decrypt secret messages. More precisely, Enigma was a family of related electro-mechanical rotor machines — there are a variety of different models.The Enigma was used commercially from the early 1920s on, and was also adopted by military and governmental services of a number of nations — most famously, by Nazi Germany before and during World War II. The German military model, the Wehrmacht Enigma, is the version most commonly discussed. Allied codebreakers were, in many cases, able to decrypt messages protected by the machine (see cryptanalysis of the Enigma). The intelligence gained through this source — codenamed ULTRA — was a significant aid to the Allied war effort. Some historians have suggested that the end of the European war was hastened by up to a year or more because of the decryption of German ciphers.

More featured articles

Selected picture edit

The EFF's "Deep Crack"The EFF's US$250,000 DES cracking machine contained over 1,800 custom chips and could brute force a DES key in a matter of days — the photo shows a DES Cracker circuit board fitted with several Deep Crack chips] In cryptography, the EFF DES cracker (nicknamed "Deep Crack") is a machine built by the Electronic Frontier Foundation (EFF) to perform a brute force search of DES cipher's keyspace—that is, to decrypt an encrypted message by trying every possible key. The aim in doing this was to prove that DES's key is not long enough to be secure. edit  

Did you know...

Marian Rejewski

...that the Pigpen cipher was used by the Freemasons for correspondence and record keeping?
...that Polish mathematician Marian Rejewski (pictured) deduced the wiring of the German Enigma machine in 1932 using theorems about permutations?

Pigpen cipher

...that acoustic cryptanalysis is a type of attack that exploits sound in order to compromise a system?
...that one scheme to defeat spam involves proving that the sender has performed a small amount of computation: a proof-of-work system?

edit  

Miscellaneous

edit  

Categories

Authentication methods | Cryptographers | Cryptography | Cryptographic algorithms | Cryptographic attacks | Cryptographic hardware | Cryptographic protocols | Cryptographic software | Organizations in cryptography | Randomness

edit  

News

edit  

Thing you can do

Current tasks for Wikipedia:WikiProject Cryptography edit
Image:Evolution-tasks.png
  • Improvement to featured or good article status:
  • Alan Turing, anonymous remailer, digital signature, frequency analysis, grille (cryptography), one time pad, pretty good privacy, purple code, secret sharing, substitution cipher
  • Start from scratch:        
    • Theory: Computational boundedness, Lattice-based cryptography
    • Hash functions: SMASH (hash)
    • Historical cryptography: TELWA, Hut 3, Hut 4
      • Cipher machines: Alvis (cipher machine), SIGTOT, B-211 or B-21 (cryptography), OMI (machine), Siemens SFM T43, SA-1 (cryptography), BC-543, BC-38, Syko, CORAL, PENELOPE
    • Stream ciphers: Correlation attack, Fast correlation attack, HBB (cipher)
    • Block ciphers: Vino (cipher), BKSQ, Manta (cipher)
    • Block cipher misc topics: IAPM, XECB
    • Block cipher cryptanalysis: Yoyo game
    • Boolean functions and S-boxes: bent function
    • Cryptographers: Joan Clarke, Francis Fasson, Vladimir Furman, Joos Vandewalle, Toshio Tokita, Henri Gilbert, Helena Handschuh, Antoon Bosselaers, Christophe De Cannière, Joseph Lano, Håvard Raddum, Michael Wiener
    • Misc: Elementary cryptography
  • Expansion / stubs: (see also: Category:Cryptography stubs)
    • Cryptographic primitive, Key schedule, ElGamal signature scheme, Cyclometer, Algebraic normal form, Key clustering, cryptographic nonce, Slidex
    • Theory: Completeness, Correlation immunity, Ring signature, Secure computation, Secure two-party computation, Universal composability
    • Hash functions: HAS-V, MASH-1, MDC-2
    • Cryptographers: Charles Rackoff, Leonard Hooper, Eric Malcolm Jones, Gordon Welchman, Victor S. Miller, Mihir Bellare, Phillip Rogaway, Lawrie Brown, Josef Pieprzyk, Jennifer Seberry, Jacques Stern, Alex Biryukov, Carlisle Adams, Matt Robshaw, Sean Murphy, Burt Kaliski, Nikita Borisov, Thomas Jakobsen, Kaisa Nyberg, David Naccache, James Massey, Stafford Tavares, Michael Luby, Jean-Jacques Quisquater, Paul van Oorschot, Howard Heys, Tom Berson, Hideki Imai, Xuejia Lai, Hugh Foss, Oliver Strachey, Francis Birch
    • Protocol: Wireless Transport Layer Security, Oakley protocol
    • Stream ciphers: LILI-128, LEVIATHAN, Self-shrinking generator, SOBER, Stream cipher
    • Block ciphers: ABC, ARIA, BaseKing, BassOmatic, CIKS-1, CIPHERUNICORN-A, CIPHERUNICORN-E, Cobra, COCONUT98, Crab, CRYPTON, DFC, E2, FEA-M, Grand Cru, Hierocrypt, KN-Cipher, Ladder-DES, M6, M8, MESH, MultiSwap, New Data Seal, Nimbus, NUSH, Q, SC2000, Spectr-H64, SXAL/MBAL, Treyfer, UES, Xenon, xmx, Zodiac
    • Block cipher cryptanalysis: Davies' attack, Differential-linear attack, Higher order differential cryptanalysis, Impossible differential cryptanalysis, Integral cryptanalysis, Interpolation attack, Partitioning cryptanalysis, Slide attack, Truncated differential cryptanalysis
    • Block cipher misc topics: CWC mode, Decorrelation theory
    • Misc: Watermarking attack, Rambutan (cryptography), Cryptovirology
    • Public-key cryptography: McEliece cryptosystem, Public key fingerprint, IND-CCA, Pairing-based cryptography, Pohlig-Hellman algorithm
  • Verification:
    • None currently
  • Images:
    • None currently
edit  

Mathematics-related portals

Portal:Algebra
Portal:Analysis
Portal:Category theory
Portal:Computer science
Portal:Cryptography
Portal:Discrete mathematics
Portal:Geometry
Algebra Analysis Category
theory
Computer
science
Cryptography Discrete
mathematics
Geometry
Portal:Logic
Portal:Mathematics
Portal:Number theory
Portal:Physics
Portal:Science
Portal:Set theory
Portal:Statistics
Portal:Topology
Logic Mathematics Number
theory
Physics Science Set theory Statistics Topology
edit  

Other Portals

What are portals? · List of portals · Featured portals
v • d • e   Cryptography
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers | Steganography