Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Contribute
Help
Learn to edit
Community portal
Recent changes
Upload file
Search
Search
Appearance
Donate
Create account
Log in
Personal tools
Donate
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Contents
move to sidebar
hide
(Top)
1
List of redirects to cryptography pages
Toggle the table of contents
User
:
Matt Crypto/Crypto redirects
Add languages
User page
Talk
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
User contributions
User logs
View user groups
Upload file
Special pages
Permanent link
Page information
Get shortened URL
Download QR code
Print/export
Download as PDF
Printable version
In other projects
Appearance
move to sidebar
hide
From Wikipedia, the free encyclopedia
<
User:Matt Crypto
List compiled 20th of April, 2004 based on
List of cryptography topics
.
List of redirects to cryptography pages
[
edit
]
40-bit encryption
40 bit encryption
A5/1
A5 (cryptography)
ADFGVX cipher
ADFGVX
Advanced Encryption Standard
AES
Advanced Encryption Standard process
AES process
AES competition
AES contest
Alan Turing
Turing, A.M.
Anonymous remailer
Anonymous Remailer
Asymmetric key algorithm
Asymmetric algorithm
Public key algorithm
Asymmetric Algorithms
Asymmetric key
Asymmetric key encryption algorithm
Atbash cipher
Atbash
Authentication
Authenticate
Babington plot
Babington Plot
Baby-step giant-step
BSGS
Beale ciphers
Beale Ciphers
Block cipher modes of operation
Electronic codebook
Cipher-block chaining
Cipher feedback
Output feedback
Counter mode
Blowfish (cipher)
Blowfish encryption algorithm
Bruce Schneier
Schneier
Burrows-Abadi-Needham logic
BAN Logic
BAN logic
Caesar cipher
Shift cipher
Caesar shift cipher
CAST-128
CAST5
CAST
Certificate authority
Certificate Authority
Certificate Revocation List
CRL
Chosen plaintext attack
Chosen plaintext
Cipher
CipheR
Cypher
Ciphertext-only attack
Ciphertext only attack
Clipper chip
Clipper Chip
Code
CodE
Codewords
Codeword
Coding theory
Codebook
Code book
Code talkers
Codetalker
Navajo code
Codetalkers
Communications security
COMSEC
Confidentiality
Data confidentiality
Content-scrambling system
Content Scrambling System
Content scrambling system
Cryptanalysis
CryptanalysiS
Cryptanalytic
Codebreaking
Cryptoanalysis
Codebreaker
Cryptanalyst
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Crypto
Crypto system
Cryptosystem
Cryptographic protocol
Cyptographic protocol
Cryptographically secure pseudo-random number generator
CSPRNG
Cryptography
CryptographY
Cryptology
CryptographY/Hashfunctions
Cryptographic
Codes and ciphers
Decrypting
Data encryption
Decryption
CryptologY
Cyptography
Cryptonomicon
Neal Stephenson/Cryptonomicon
Crypto-society
Crypto-societies
Cypherpunk
Cypherpunks
Cyphertext
Ciphertext
Codetext
Daniel J. Bernstein
Dan Bernstein
D. J. Bernstein
Daniel Bernstein
Data Encryption Standard
DataEncryptionStandard
DES
Data Encryption Algorithm
Decipherment
Decipher
Decypher
Decypher
DeCSS
DeCSS source code
Decss
Differential cryptanalysis
Differential attack
Diffie-Hellman key exchange
Diffie-Hellman
Diffie Hellman
Digital rights management
Digital-rights management
Digital Rights Management
Digital restrictions management
Digital signature
Digital signatures
Digital Signature Algorithm
DSA
Dining cryptographers protocol
Dining cryptographers
Dining cryptographer
Dining Cryptographers Protocol
Dining cryptographer protocol
Dining cryptographer's protocol
Discrete logarithm
Discrete logarithms
Discrete log
Discrete log problem
Discrete logarithm problem
Dmitry Sklyarov
Dmitri Sklyarov
Dimitry Sklyarov
Dimitry Sklyarov
Dimitri Sklyarov
Dimitri Skylarov
ECHELON
EcheloN
Echelon
Edward Hebern
Edward Hugh Hebern
Electronic money
EFT
Electronic cash
Digital cash
Electronic voting
E-voting
E-voting
ElGamal discrete log cryptosystem
ElGamal
Elgamal discrete logarithm cryptosystem
El Gamal
El Gamal discrete log cryptosystem
Elizebeth Friedman
Elizabeth Friedman
Elliptic curve cryptography
Elliptical Curve Cryptography
Elliptic Curve DSA
ECDSA
Encode
Encoding code
Encoding
Encryption
Encryption key
Encryption algorithm
Encrypt
Encrypt
Enigma machine
Enigma
Naval Engima
Exclusive disjunction
XOR
Exclusive or
Xor
XOR function
Feistel cipher
Feistel network
Geheimfernschreiber
STURGEON (cryptography)
GNU Privacy Guard
Gnu Privacy Guard
GPG
Gnupg
GnuPG
Government Communications Headquarters
GCHQ
GC&CS
Government Code and Cypher School
Government Code and Cipher School
Hardware random number generator
Random device
True random number generator
Entropy pool
HTTPS
Https
ID-based cryptography
ID Based Cryptography
Illegal prime
Illegal prime number
Index of coincidence
Coincidence counting
Information security
Information systems security
Information assurance
INFOSEC
Initialization vector
Initialisation vector
International Association for Cryptologic Research
IACR
International Data Encryption Algorithm
IDEA encryption algorithm
IDEA (cipher)
Internet key exchange
Internet Key Exchange
IKE
IPSec
RFC 2401
IPSEC
Iraqi block cipher
Iraqi Block Cipher
Kerckhoffs' law
Kerckhoff's principle
Kerckhoffs' principle
Shannon's maxim
Kerkhoffs' law
Kerkhoffs law
Kerckhoffs law
Kirckhoffs law
Kerkchoffs law
Kerchoffs law
Kerchoff's law
Kerchoff's Law
Kerchoffs' Law
Kerckhoffs' Law
Kerchkoffs' Law
Kerkhoffs' Law
Kerckhoffs' Law
Shannon's Maxim
Key (cryptography)
Cryptographic key
CryptographY/Keys
Cryptography/Key
Secret key
Cryptographic keys
Key size
Cryptographic key length
Cryptography/key length
Key length
Keyed-hash message authentication code
HMAC
Keyed-Hashing Message Authentication
Knapsack problem
0/1 knapsack problem
Known-plaintext attack
Known plaintext attack
Known plaintext
KY-57
VINSON device
Leo Marks
Leopold Samuel Marks
Leonard Adleman
Len Adleman
Adleman
Leone Battista Alberti
Leone Battista Alrerti
Leon Battista Alberti
LibTom Project
LibTomNet
LibTomCrypt
LibTomPoly
LibTomMath
Linear feedback shift register
LFSR
List of cryptographers
Cryptographer
Cryptographers
Cryptologist
List of cryptography topics
List of cryptology topics
List of famous ciphertexts
Famous ciphertexts
Lorenz cypher
Tunny (cryptography)
Lorenz cipher
Fish cyphers
Lucifer (cipher)
Lucifer cipher
MAGENTA
MAGENTA (cipher)
Magic (cryptography)
Magic cryptography
Man in the middle attack
Man-in-the-middle attack
Man in the middle
MARS
Mars (cipher)
MD5
Md5
MD5 - A Message Digest Algorithm
Md5sum
Meet-in-the-middle attack
Birthday attack
Message Authentication Code
Message authentication code
National Security Agency
NSA
Armed Forces Security Agency
AFSA
NTRUEncrypt
NTRU
Null cipher
Null cypher
One-time pad
OneTimePads
One time pads
One time pad
Vernam cipher
One way function
One-way
One way
OpenSSL
Openssl
Password
Passcode
Pass-phrase
Phil Zimmermann
PhilZimmermann
Philip Zimmermann
Physical security
Physical Security
Pike (cipher)
Pike (cryptography)
Red pike
Plaintext
Plain-text
Plain text
Clear message
Cleartext
Polyalphabetic cipher
Polyalphabetic substitution
Pretty Good Privacy
PrettyGoodPrivacy
PGP
Privacy-enhanced Electronic Mail
Privacy Enhanced Mail
PEM
Privacy-enhanced electronic mail
Pseudorandom number generator
Pseudorandom number generators
Pseudo-random number generator
Pseudo-random
PRNG
Pseudorandom
Pseudorandom sequence
Pseudo Random
Pseudo-randomness
Public key certificate
Identity certificate
Public-key cryptography
Private key
Public key
Public key cryptography
Asymmetric key cryptography
Public key crytography
Public key encyption
Public key encryption
Public-key encryption
Public-key
Public key infrastructure
PKI
Purple code
PURPLE
Quantum cryptography
Quantum Cryptography
Random oracle
Random oracle model
RC4 (cipher)
RC4 cipher
ARCFOUR
RC4 Cipher
RC5
RC5 encryption algorithm
RC5 cipher
RC6
RC6 encryption algorithm
RC6 cipher
Regulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act
RIP Act
Rijndael
Rijndael encryption algorithm
Rijndael encryption alogrithm
Rijndael encryption alogrithm
Ron Rivest
Rivest
Ronald Rivest
Ronald L. Rivest
Ross Anderson
Ross J. Anderson
ROT13
Rot13
ROT-13
ROT-47
Rot-13
Rot47
Rot-47
ROT47
Rotor machine
Rotor cypher machine
RSA
RSA Cryptosystem
RSA Security
RSA Data Security
S-1
S-1 block cipher
Scytale
Skytale
SEAL (cipher)
SEAL (cryptography)
Secure shell
SSH
Secure Shell
Ssh
Security through obscurity
Security by obscurity
Self-certifying key
Self-Certifying Keys
Serpent (cipher)
Serpent encryption algorithm
SHA-1
SHA
SHA1
SHA-256
SHA-384
SHA-512
SIGABA
Sigaba
SIGINT
Signals Intelligence
Signals intelligence
Sigint
Signal intelligence
Skipjack (cipher)
Skipjack encryption algorithm
S/MIME
Smime
SMIME
Snefru
Snefru (cryptography)
Steganography
Secret writing
Digital watermark
Stegonagraphy
Substitution box
Substitution boxes
Cryptography/s-box
S-box
Substitution cipher
Substitution ciphers
Substitution alphabet
Letter-substitution cipher
Substitution-permutation network
SP-network
SPN
Symmetric key algorithm
Symmetric Algorithms
Symmetric algorithm
Symmetric key
Symmetric key cryptography
Symmetric encryption
Taher ElGamal
Taher El-Gamal
Tamper resistance
Tamper-resistance
Tamper-resistant
Tamper resistant
The Gold Bug
Goldbug
Tiger (hash)
Tiger hash function
Tiny Encryption Algorithm
TEA
Topics in cryptography
Topics in Cryptography
Transport Layer Security
Secure Sockets Layer
Secure Socket Layer
Transport Layer Security Protocol
Transport layer security
Transposition cipher
Transposition (cryptography)
Columnar disposition
Triple DES
3DES
Trusted Third Party
Trusted third party
Twofish
Twofish encryption algorithm
Type 1 product
Saville
Typex
Type X
TypeX
Ultra
UltrA
Ultra secret
ULTRA
Unicity distance
Spurious key
VENONA project
VENONA
Venona
VENONA Project
Voynich Manuscript
Voynich manuscript
Voynich
Web of trust
Web of Trust
William F. Friedman
William Friedman
William Frederick Friedman
Wolfe Frederick Friedman
Wired Equivalent Privacy
WEP
W. T. Tutte
Bill Tutte
Zero-knowledge proof
Zero knowledge proof
Zeroise
Zeroization
Zimmermann Telegram
Zimmermann telegram
Zimmerman telegram
Zimmerman Note
Zimmerman-Sassaman key-signing protocol
Zimmmermann-Sassaman key signing protocol