TM completed segments: 119
Other segments: 207
TM completed words: 2407
Other words: 1599
Original | Translated |
---|---|
Introduction to Cryptography | zh-Hant Introduction to Cryptography |
Cryptography | zh-Hant Cryptography |
zh-Hant |
|
zh-Hant |
|
zh-Hant |
|
zh-Hant |
|
Modern cryptography exists at the intersection of the disciplines of |
zh-Hant Modern cryptography exists at the intersection of the disciplines of |
Applications of cryptography include |
zh-Hant Applications of cryptography include |
Cryptography prior to the modern age was effectively synonymous with |
zh-Hant Cryptography prior to the modern age was effectively synonymous with |
The originator of an encrypted message shares the decoding technique only with intended recipients to preclude access from adversaries. | zh-Hant The originator of an encrypted message shares the decoding technique only with intended recipients to preclude access from adversaries. |
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic |
zh-Hant Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic |
It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means. | zh-Hant It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means. |
These schemes are therefore termed computationally secure; theoretical advances, e.g., improvements in |
zh-Hant These schemes are therefore termed computationally secure; theoretical advances, e.g., improvements in |
There exist |
zh-Hant There exist |
The growth of cryptographic technology has raised a number of legal issues in the information age. | zh-Hant The growth of cryptographic technology has raised a number of legal issues in the information age. |
[9] | zh-Hant [9] |
Terminology | zh-Hant Terminology |
The first use of the term |
zh-Hant The first use of the term |
Until modern times, cryptography referred almost exclusively to |
zh-Hant Until modern times, cryptography referred almost exclusively to |
Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. | zh-Hant Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. |
A |
zh-Hant A |
The detailed operation of a cipher is controlled both by the algorithm and in each instance by a “ |
zh-Hant The detailed operation of a cipher is controlled both by the algorithm and in each instance by a “ |
The key is a secret (ideally known only to the communicants), usually a short string of characters, which is needed to decrypt the ciphertext. | zh-Hant The key is a secret (ideally known only to the communicants), usually a short string of characters, which is needed to decrypt the ciphertext. |
Formally, a “ |
zh-Hant Formally, a “ |
Keys are important both formally and in actual practice, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter-productive) for most purposes. | zh-Hant Keys are important both formally and in actual practice, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter-productive) for most purposes. |
Historically, ciphers were often used directly for encryption or decryption without additional procedures such as |
zh-Hant Historically, ciphers were often used directly for encryption or decryption without additional procedures such as |
There are two kinds of cryptosystems: |
zh-Hant There are two kinds of cryptosystems: |
In symmetric systems the same key (the secret key) is used to encrypt and decrypt a message. | zh-Hant In symmetric systems the same key (the secret key) is used to encrypt and decrypt a message. |
Data manipulation in symmetric systems is faster than asymmetric systems as they generally use shorter key lengths. | zh-Hant Data manipulation in symmetric systems is faster than asymmetric systems as they generally use shorter key lengths. |
Asymmetric systems use a public key to encrypt a message and a private key to decrypt it. | zh-Hant Asymmetric systems use a public key to encrypt a message and a private key to decrypt it. |
Use of asymmetric systems enhances the security of communication. | zh-Hant Use of asymmetric systems enhances the security of communication. |
Examples of asymmetric systems include RSA ( |
zh-Hant Examples of asymmetric systems include RSA ( |
Symmetric models include the commonly used AES ( |
zh-Hant Symmetric models include the commonly used AES ( |
In |
zh-Hant In |
However, in cryptography, |
zh-Hant However, in cryptography, |
It means the replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a |
zh-Hant It means the replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a |
zh-Hant |
|
Some use the terms |
zh-Hant Some use the terms |
English is more flexible than several other languages in which |
zh-Hant English is more flexible than several other languages in which |
zh-Hant |
|
The study of characteristics of languages that have some application in cryptography or cryptology (e.g. frequency data, letter combinations, universal patterns, etc.) is called cryptolinguistics. | zh-Hant The study of characteristics of languages that have some application in cryptography or cryptology (e.g. frequency data, letter combinations, universal patterns, etc.) is called cryptolinguistics. |
History of Cryptography | zh-Hant History of Cryptography |
Before the modern era, cryptography focused on message confidentiality (i.e., encryption)—conversion of |
zh-Hant Before the modern era, cryptography focused on message confidentiality (i.e., encryption)—conversion of |
Encryption attempted to ensure |
zh-Hant Encryption attempted to ensure |
In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity |
zh-Hant In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity |
Computer era | zh-Hant Computer era |
Prior to the early 20th century, cryptography was mainly concerned with |
zh-Hant Prior to the early 20th century, cryptography was mainly concerned with |
Since then the emphasis has shifted, and cryptography now makes extensive use of mathematics, including aspects of |
zh-Hant Since then the emphasis has shifted, and cryptography now makes extensive use of mathematics, including aspects of |
Cryptography is also a branch of |
zh-Hant Cryptography is also a branch of |
There is also active research examining the relationship between cryptographic problems and |
zh-Hant There is also active research examining the relationship between cryptographic problems and |
Just as the development of digital computers and electronics helped in cryptanalysis, it made possible much more complex ciphers. | zh-Hant Just as the development of digital computers and electronics helped in cryptanalysis, it made possible much more complex ciphers. |
Furthermore, computers allowed for the encryption of any kind of data representable in any binary format, unlike classical ciphers which only encrypted written language texts; this was new and significant. | zh-Hant Furthermore, computers allowed for the encryption of any kind of data representable in any binary format, unlike classical ciphers which only encrypted written language texts; this was new and significant. |
Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis. | zh-Hant Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis. |
Many computer ciphers can be characterized by their operation on |
zh-Hant Many computer ciphers can be characterized by their operation on |
However, computers have also assisted cryptanalysis, which has compensated to some extent for increased cipher complexity. | zh-Hant However, computers have also assisted cryptanalysis, which has compensated to some extent for increased cipher complexity. |
Nonetheless, good modern ciphers have stayed ahead of cryptanalysis; it is typically the case that use of a quality cipher is very efficient (i.e., fast and requiring few resources, such as memory or CPU capability), while breaking it requires an effort many orders of magnitude larger, and vastly larger than that required for any classical cipher, making cryptanalysis so inefficient and impractical as to be effectively impossible. | zh-Hant Nonetheless, good modern ciphers have stayed ahead of cryptanalysis; it is typically the case that use of a quality cipher is very efficient (i.e., fast and requiring few resources, such as memory or CPU capability), while breaking it requires an effort many orders of magnitude larger, and vastly larger than that required for any classical cipher, making cryptanalysis so inefficient and impractical as to be effectively impossible. |
Advent of modern cryptography | zh-Hant Advent of modern cryptography |
zh-Hant |
|
In the United Kingdom, cryptanalytic efforts at |
zh-Hant In the United Kingdom, cryptanalytic efforts at |
This culminated in the development of the |
zh-Hant This culminated in the development of the |
Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970’s. | zh-Hant Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970’s. |
In recent times, IBM personnel designed the algorithm that became the Federal (i.e., US) |
zh-Hant In recent times, IBM personnel designed the algorithm that became the Federal (i.e., US) |
and the |
zh-Hant and the |
Following their work in 1976, it became popular to consider cryptography systems based on mathematical problems that are easy to state but have been found difficult to solve. | zh-Hant Following their work in 1976, it became popular to consider cryptography systems based on mathematical problems that are easy to state but have been found difficult to solve. |
Since then, cryptography has become a widely used tool in communications, |
zh-Hant Since then, cryptography has become a widely used tool in communications, |
Some modern cryptographic techniques can only keep their keys secret if certain mathematical problems are |
zh-Hant Some modern cryptographic techniques can only keep their keys secret if certain mathematical problems are |
There are very few cryptosystems that are proven to be unconditionally secure. | zh-Hant There are very few cryptosystems that are proven to be unconditionally secure. |
The |
zh-Hant The |
There are a few important algorithms that have been proven secure under certain assumptions. | zh-Hant There are a few important algorithms that have been proven secure under certain assumptions. |
For example, the infeasibility of factoring extremely large integers is the basis for believing that |
zh-Hant For example, the infeasibility of factoring extremely large integers is the basis for believing that |
In practice, these are widely used, and are believed unbreakable in practice by most competent observers. | zh-Hant In practice, these are widely used, and are believed unbreakable in practice by most competent observers. |
There are systems similar to RSA, such as one by |
zh-Hant There are systems similar to RSA, such as one by |
The |
zh-Hant The |
As well as being aware of cryptographic history, cryptographic algorithm and system designers must also sensibly consider probable future developments while working on their designs. | zh-Hant As well as being aware of cryptographic history, cryptographic algorithm and system designers must also sensibly consider probable future developments while working on their designs. |
For instance, continuous improvements in computer processing power have increased the scope of |
zh-Hant For instance, continuous improvements in computer processing power have increased the scope of |
The potential effects of |
zh-Hant The potential effects of |
Symmetric-key cryptography | zh-Hant Symmetric-key cryptography |
Main article: |
zh-Hant Main article: |
diagram showing encrypt with a key and decrypt process | diagram showing encrypt with a key and decrypt process |
Symmetric-key cryptography, where a single key is used for encryption and decryption | zh-Hant Symmetric-key cryptography, where a single key is used for encryption and decryption |
Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). | zh-Hant Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). |
This was the only kind of encryption publicly known until June 1976. | zh-Hant This was the only kind of encryption publicly known until June 1976. |
logic diagram showing International Data Encryption Algorithm cypher process | logic diagram showing International Data Encryption Algorithm cypher process |
One round (out of 8.5) of the |
zh-Hant One round (out of 8.5) of the |
Symmetric key ciphers are implemented as either |
zh-Hant Symmetric key ciphers are implemented as either |
A block cipher enciphers input in blocks of plaintext as opposed to individual characters, the input form used by a stream cipher. | zh-Hant A block cipher enciphers input in blocks of plaintext as opposed to individual characters, the input form used by a stream cipher. |
The |
zh-Hant The |
Despite its deprecation as an official standard, DES (especially its still-approved and much more secure |
zh-Hant Despite its deprecation as an official standard, DES (especially its still-approved and much more secure |
to |
zh-Hant to |
and |
zh-Hant and |
Many other block ciphers have been designed and released, with considerable variation in quality. | zh-Hant Many other block ciphers have been designed and released, with considerable variation in quality. |
Many, even some designed by capable practitioners, have been thoroughly broken, such as |
zh-Hant Many, even some designed by capable practitioners, have been thoroughly broken, such as |
Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined with the plaintext bit-by-bit or character-by-character, somewhat like the |
zh-Hant Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined with the plaintext bit-by-bit or character-by-character, somewhat like the |
In a stream cipher, the output stream is created based on a hidden internal state that changes as the cipher operates. | zh-Hant In a stream cipher, the output stream is created based on a hidden internal state that changes as the cipher operates. |
That internal state is initially set up using the secret key material. |
zh-Hant That internal state is initially set up using the secret key material. |
zh-Hant |
|
They take a message of any length as input, and output a short, fixed length |
zh-Hant They take a message of any length as input, and output a short, fixed length |
For good hash functions, an attacker cannot find two messages that produce the same hash. |
zh-Hant For good hash functions, an attacker cannot find two messages that produce the same hash. |
The US | zh-Hant The US |
zh-Hant |
|
zh-Hant |
|
zh-Hant |
|
zh-Hant |
|
Thus, a |
zh-Hant Thus, a |
The competition ended on October 2, 2012 when the NIST announced that |
zh-Hant The competition ended on October 2, 2012 when the NIST announced that |
Unlike block and stream ciphers that are invertible, cryptographic hash functions produce a hashed output that cannot be used to retrieve the original input data. | zh-Hant Unlike block and stream ciphers that are invertible, cryptographic hash functions produce a hashed output that cannot be used to retrieve the original input data. |
Cryptographic hash functions are used to verify the authenticity of data retrieved from an untrusted source or to add a layer of security. | zh-Hant Cryptographic hash functions are used to verify the authenticity of data retrieved from an untrusted source or to add a layer of security. |
zh-Hant |
|
Modern cryptography | zh-Hant Modern cryptography |
The modern field of cryptography can be divided into several areas of study. | zh-Hant The modern field of cryptography can be divided into several areas of study. |
The chief ones are discussed here; see |
zh-Hant The chief ones are discussed here; see |
Public-key cryptography | zh-Hant Public-key cryptography |
diagram of Public-key cryptography showing public key and private key | diagram of Public-key cryptography showing public key and private key |
Public-key cryptography, where different keys are used for encryption and decryption. | zh-Hant Public-key cryptography, where different keys are used for encryption and decryption. |
Symmetric-key cryptosystems use the same key for encryption and decryption of a message, although a message or group of messages can have a different key than others. | zh-Hant Symmetric-key cryptosystems use the same key for encryption and decryption of a message, although a message or group of messages can have a different key than others. |
A significant disadvantage of symmetric ciphers is the |
zh-Hant A significant disadvantage of symmetric ciphers is the |
Each distinct pair of communicating parties must, ideally, share a different key, and perhaps for each ciphertext exchanged as well. | zh-Hant Each distinct pair of communicating parties must, ideally, share a different key, and perhaps for each ciphertext exchanged as well. |
The number of keys required increases as the |
zh-Hant The number of keys required increases as the |
headshots of Whitfield Diffie and Martin Hellman | headshots of Whitfield Diffie and Martin Hellman |
Original | Similar TM records |
---|---|
main | |
Cryptography or cryptology (from |
|
https://en.wikipedia.org/wiki/Ancient_Greek_language | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-1 | |
https://en.wikipedia.org/wiki/Secure_communication | |
https://en.wikipedia.org/wiki/Adversary_(cryptography) | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-rivest90-2 | |
https://en.wikipedia.org/wiki/Communications_protocol | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-modern-crypto-3 | |
https://en.wikipedia.org/wiki/Information_security | |
https://en.wikipedia.org/wiki/Confidentiality | |
https://en.wikipedia.org/wiki/Data_integrity | |
https://en.wikipedia.org/wiki/Authentication | |
https://en.wikipedia.org/wiki/Non-repudiation | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | |
https://en.wikipedia.org/wiki/Mathematics | |
https://en.wikipedia.org/wiki/Computer_science | |
https://en.wikipedia.org/wiki/Electrical_engineering | |
https://en.wikipedia.org/wiki/Communication_science | |
https://en.wikipedia.org/wiki/Physics | |
https://en.wikipedia.org/wiki/Electronic_commerce | |
https://en.wikipedia.org/wiki/Credit_card_chip | |
https://en.wikipedia.org/wiki/Digital_currencies | |
https://en.wikipedia.org/wiki/Password | |
https://en.wikipedia.org/wiki/Military_communications | |
https://en.wikipedia.org/wiki/Encryption | |
https://en.wikipedia.org/wiki/Nonsense | |
The cryptography literature |
|
https://en.wikipedia.org/wiki/Alice_and_Bob | |
https://en.wikipedia.org/wiki/Eavesdropper | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-codesintro-5 | |
https://en.wikipedia.org/wiki/Rotor_machine | |
https://en.wikipedia.org/wiki/World_War_I | |
https://en.wikipedia.org/wiki/Computer | |
https://en.wikipedia.org/wiki/World_War_II | |
https://en.wikipedia.org/wiki/Algorithm | |
https://en.wikipedia.org/wiki/Computational_hardness_assumption | |
https://en.wikipedia.org/wiki/Integer_factorization | |
https://en.wikipedia.org/wiki/Information_theoretic_security | |
https://en.wikipedia.org/wiki/One-time_pad | |
Cryptography’s potential for use as a tool for |
|
https://en.wikipedia.org/wiki/Espionage | |
https://en.wikipedia.org/wiki/Sedition | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-cryptolaw-6 | |
https://en.wikipedia.org/wiki/Key_disclosure_law | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-UK_law-7 | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-RangerSteve1-8 | |
https://en.wikipedia.org/wiki/Digital_rights_management | |
https://en.wikipedia.org/wiki/Copyright_infringement | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-AACS-9 | |
https://en.wikipedia.org/wiki/The_Gold-Bug | |
https://en.wikipedia.org/wiki/Edgar_Allan_Poe | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-10 | |
10 | |
https://en.wikipedia.org/wiki/Plaintext | |
https://en.wikipedia.org/wiki/Ciphertext | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-kahnbook-11 | |
11 | |
https://en.wikipedia.org/wiki/Cipher | |
https://en.wikipedia.org/wiki/Key_(cryptography) | |
https://en.wikipedia.org/wiki/Cryptosystem | |
https://en.wikipedia.org/wiki/Authentication | |
https://en.wikipedia.org/wiki/Symmetric-key_algorithm | |
https://en.wikipedia.org/wiki/Public-key_cryptography | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-12 | |
12 | |
https://en.wikipedia.org/wiki/Rivest-Shamir-Adleman | |
https://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography | |
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard | |
https://en.wikipedia.org/wiki/Data_Encryption_Standard | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-13 | |
13 | |
https://en.wikipedia.org/wiki/Colloquial | |
https://en.wikipedia.org/wiki/Code_(cryptography) | |
https://en.wikipedia.org/wiki/Code_word | |
https://en.wikipedia.org/wiki/Cryptanalysis | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-goldreichbook-14 | |
14 | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-websters-15 | |
15 | |
https://en.wikipedia.org/wiki/Request_for_Comments_(identifier) | |
https://tools.ietf.org/html/rfc2828 | |
https://en.wikipedia.org/wiki/Steganography | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-16 | |
16 | |
https://en.wikipedia.org/wiki/Information | |
https://en.wikipedia.org/wiki/Secrecy | |
https://en.wikipedia.org/wiki/Communications | |
https://en.wikipedia.org/wiki/Spy | |
https://en.wikipedia.org/wiki/Diplomat | |
https://en.wikipedia.org/wiki/Authentication | |
https://en.wikipedia.org/wiki/Digital_signature | |
https://en.wikipedia.org/wiki/Interactive_proof_system | |
https://en.wikipedia.org/wiki/Secure_multiparty_computation | |
https://en.wikipedia.org/wiki/Language | |
https://en.wikipedia.org/wiki/Lexicographic_code | |
https://en.wikipedia.org/wiki/Information_theory | |
https://en.wikipedia.org/wiki/Computational_complexity_theory | |
https://en.wikipedia.org/wiki/Statistics | |
https://en.wikipedia.org/wiki/Combinatorics | |
https://en.wikipedia.org/wiki/Abstract_algebra | |
https://en.wikipedia.org/wiki/Number_theory | |
https://en.wikipedia.org/wiki/Engineering | |
https://en.wikipedia.org/wiki/Security_engineering | |
https://en.wikipedia.org/wiki/Quantum_physics | |
https://en.wikipedia.org/wiki/Quantum_cryptography | |
https://en.wikipedia.org/wiki/Quantum_computer | |
https://en.wikipedia.org/wiki/Binary_numeral_system | |
https://en.wikipedia.org/wiki/Bit | |
https://en.wikipedia.org/wiki/Cryptanalysis | |
https://en.wikipedia.org/wiki/Bletchley_Park | |
https://en.wikipedia.org/wiki/Colossus_computer | |
https://en.wikipedia.org/wiki/Computer_programming | |
https://en.wikipedia.org/wiki/Lorenz_SZ40/42 | |
https://en.wikipedia.org/wiki/Data_Encryption_Standard | |
https://en.wikipedia.org/wiki/Whitfield_Diffie | |
https://en.wikipedia.org/wiki/Martin_Hellman | |
https://en.wikipedia.org/wiki/Diffie-Hellman | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-dh2-30 | |
30 | |
https://en.wikipedia.org/wiki/RSA_(algorithm) | |
https://en.wikipedia.org/wiki/Martin_Gardner | |
https://en.wikipedia.org/wiki/Scientific_American | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-31 | |
31 | |
https://en.wikipedia.org/wiki/Computer_network | |
https://en.wikipedia.org/wiki/Computer_security | |
https://en.wikipedia.org/wiki/Computational_complexity_theory#Intractability | |
https://en.wikipedia.org/wiki/Integer_factorization | |
https://en.wikipedia.org/wiki/Discrete_logarithm | |
https://en.wikipedia.org/wiki/Abstract_mathematics | |
https://en.wikipedia.org/wiki/One-time_pad | |
https://en.wikipedia.org/wiki/RSA_(cryptosystem) | |
https://en.wikipedia.org/wiki/Michael_O._Rabin | |
https://en.wikipedia.org/wiki/Discrete_logarithm_problem | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-32 | |
32 | |
https://en.wikipedia.org/wiki/Brute-force_attack | |
https://en.wikipedia.org/wiki/Key_length | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-fortify-33 | |
33 | |
https://en.wikipedia.org/wiki/Quantum_computing | |
https://en.wikipedia.org/wiki/Post-quantum_cryptography | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | |
https://en.wikipedia.org/wiki/Symmetric-key_algorithm | |
https://en.wikipedia.org/wiki/File:Symmetric_key_encryption.svg | |
https://upload.wikimedia.org/wikipedia/commons/thumb/2/27/Symmetric_key_encryption.svg/250px-Symmetric_key_encryption.svg.png | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-dh2-30 | |
30 | |
https://en.wikipedia.org/wiki/File:International_Data_Encryption_Algorithm_InfoBox_Diagram.svg | |
https://upload.wikimedia.org/wikipedia/commons/thumb/a/af/International_Data_Encryption_Algorithm_InfoBox_Diagram.svg/220px-International_Data_Encryption_Algorithm_InfoBox_Diagram.svg.png | |
https://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm | |
https://en.wikipedia.org/wiki/Pretty_Good_Privacy | |
https://en.wikipedia.org/wiki/Block_ciphers | |
https://en.wikipedia.org/wiki/Stream_ciphers | |
https://en.wikipedia.org/wiki/Data_Encryption_Standard | |
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard | |
https://en.wikipedia.org/wiki/Cryptography_standards | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-aes-34 | |
34 | |
https://en.wikipedia.org/wiki/Triple-DES | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-atm-35 | |
35 | |
https://en.wikipedia.org/wiki/E-mail_privacy | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-opgp-36 | |
36 | |
https://en.wikipedia.org/wiki/Secure_Shell | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-ssh-37 | |
37 | |
https://en.wikipedia.org/wiki/FEAL | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-schneierbook-38 | |
38 | |
https://en.wikipedia.org/wiki/One-time_pad | |
https://en.wikipedia.org/wiki/RC4 | |
https://en.wikipedia.org/wiki/Category:Stream_ciphers | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | |
https://en.wikipedia.org/wiki/Block_cipher_modes_of_operation | |
https://en.wikipedia.org/wiki/Cryptographic_hash_functions | |
https://en.wikipedia.org/wiki/Hash_function | |
https://en.wikipedia.org/wiki/MD4 | |
https://en.wikipedia.org/wiki/MD5 | |
https://en.wikipedia.org/wiki/National_Security_Agency | |
https://en.wikipedia.org/wiki/SHA-1 | |
https://en.wikipedia.org/wiki/SHA-2 | |
https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-39 | |
39 | |
https://en.wikipedia.org/wiki/NIST_hash_function_competition | |
https://en.wikipedia.org/wiki/SHA-3 | |
https://en.wikipedia.org/wiki/Keccak | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-40 | |
40 | |
https://en.wikipedia.org/wiki/Message_authentication_code | |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | |
https://en.wikipedia.org/wiki/Md5 | |
https://en.wikipedia.org/wiki/Topics_in_Cryptography | |
https://en.wikipedia.org/wiki/File:Public_key_encryption.svg | |
https://upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Public_key_encryption.svg/250px-Public_key_encryption.svg.png | |
https://en.wikipedia.org/wiki/Key_management | |
https://en.wikipedia.org/wiki/Square_(algebra) | |
https://en.wikipedia.org/wiki/File:Diffie_and_Hellman.jpg | |
https://upload.wikimedia.org/wikipedia/commons/thumb/8/88/Diffie_and_Hellman.jpg/220px-Diffie_and_Hellman.jpg |