TM completed segments: 39
Other segments: 273
TM completed words: 630
Other words: 3289
Original | Translated |
---|---|
Introduction to Cryptography | Introduction à la cryptographie |
Cryptography | Cryptographie |
Applications of cryptography include |
Les applications de la cryptographie incluent le |
The growth of cryptographic technology has raised a number of legal issues in the information age.
Cryptography’s potential for use as a tool for |
La croissance de la technologie cryptographique a soulevé un certain nombre de questions juridiques à l'ère de l'information.
le potentiel de la cryptographie en tant qu'outil d' |
Terminology | Terminologie |
The first use of the term |
la première utilisation du terme |
Until modern times, cryptography referred almost exclusively to |
Jusqu'aux temps modernes, la cryptographie se référait presque exclusivement au |
Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
A |
Le déchiffrement est l'inverse, en d'autres termes, passer du texte chiffré inintelligible au texte en clair.
un |
The study of characteristics of languages that have some application in cryptography or cryptology (e.g. frequency data, letter combinations, universal patterns, etc.) is called cryptolinguistics. | L'étude des caractéristiques des langues ayant une application en cryptographie ou cryptologie (par exemple, les données de fréquence, les combinaisons de lettres, les motifs universels, etc.) est appelée cryptolinguistique. |
History of Cryptography | Histoire de la cryptographie |
Computer era | Ère informatique |
Just as the development of digital computers and electronics helped in cryptanalysis, it made possible much more complex ciphers.
Furthermore, computers allowed for the encryption of any kind of data representable in any binary format, unlike classical ciphers which only encrypted written language texts; this was new and significant.
Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis.
Many computer ciphers can be characterized by their operation on |
Tout comme le développement des ordinateurs numériques et de l'électronique a aidé à la cryptanalyse, il a rendu possibles des chiffres beaucoup plus complexes.
De plus, les ordinateurs ont permis le cryptage de tout type de données représentables dans n'importe quel format binaire, contrairement aux chiffres classiques qui ne cryptaient que les textes en langue écrite ; c'était nouveau et significatif.
L'utilisation des ordinateurs a ainsi supplanté la cryptographie linguistique, tant pour la conception de chiffres que pour la cryptanalyse.
De nombreux chiffres informatiques peuvent être caractérisés par leur fonctionnement sur des séquences |
Advent of modern cryptography | Avènement de la cryptographie moderne |
Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970’s.
In recent times, IBM personnel designed the algorithm that became the Federal (i.e., US) |
Des recherches académiques ouvertes et étendues sur la cryptographie sont relativement récentes ; elles n'ont commencé qu'au milieu des années 1970.
Ces derniers temps, le personnel de IBM a conçu l'algorithme qui est devenu la norme fédérale (c'est-à-dire US) de |
As well as being aware of cryptographic history, cryptographic algorithm and system designers must also sensibly consider probable future developments while working on their designs.
For instance, continuous improvements in computer processing power have increased the scope of |
En plus d'être conscients de l'histoire de la cryptographie, les concepteurs d'algorithmes et de systèmes cryptographiques doivent également considérer de manière sensée les développements futurs probables lors de la conception de leurs systèmes.
Par exemple, les améliorations continues de la puissance de traitement des ordinateurs ont augmenté la portée des |
The potential effects of |
Les effets potentiels de l' |
Symmetric-key cryptography | Cryptographie à clé symétrique |
Main article: |
Article principal : |
diagram showing encrypt with a key and decrypt process | diagramme montrant le processus de chiffrement avec une clé et de déchiffrement |
Symmetric-key cryptography, where a single key is used for encryption and decryption | Cryptographie à clé symétrique, où une seule clé est utilisée pour le chiffrement et le déchiffrement |
Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). This was the only kind of encryption publicly known until June 1976. | La cryptographie à clé symétrique fait référence aux méthodes de chiffrement dans lesquelles l'expéditeur et le destinataire partagent la même clé (ou, moins couramment, dans lesquelles leurs clés sont différentes mais liées de manière facilement calculable). C'était le seul type de chiffrement connu publiquement jusqu'en juin 1976. |
logic diagram showing International Data Encryption Algorithm cypher process | diagramme logique montrant le processus de chiffrement de l'algorithme de chiffrement des données internationales |
One round (out of 8.5) of the |
Un tour (sur 8,5) du chiffre |
The |
Le |
Despite its deprecation as an official standard, DES (especially its still-approved and much more secure |
Malgré sa dépréciation en tant que norme officielle, DES (en particulier sa variante |
to |
à la |
and |
et à l' |
Many other block ciphers have been designed and released, with considerable variation in quality.
Many, even some designed by capable practitioners, have been thoroughly broken, such as |
de nombreux autres chiffres par bloc ont été conçus et publiés, avec des variations considérables en termes de qualité.
Beaucoup, même certains conçus par des praticiens compétents, ont été complètement cassés, comme |
Unlike block and stream ciphers that are invertible, cryptographic hash functions produce a hashed output that cannot be used to retrieve the original input data. Cryptographic hash functions are used to verify the authenticity of data retrieved from an untrusted source or to add a layer of security. | Contrairement aux chiffrements par bloc et par flux qui sont réversibles, les fonctions de hachage cryptographiques produisent une sortie hachée qui ne peut pas être utilisée pour récupérer les données d'entrée originales. les fonctions de hachage cryptographiques sont utilisées pour vérifier l'authenticité des données récupérées à partir d'une source non fiable ou pour ajouter une couche de sécurité. |
Modern cryptography | Cryptographie moderne |
The modern field of cryptography can be divided into several areas of study.
The chief ones are discussed here; see |
le domaine moderne de la cryptographie peut être divisé en plusieurs domaines d'étude.
les principaux sont discutés ici; voir |
Public-key cryptography | Cryptographie à clé publique |
diagram of Public-key cryptography showing public key and private key | schéma de cryptographie à clé publique montrant la clé publique et la clé privée |
Public-key cryptography, where different keys are used for encryption and decryption. | Cryptographie à clé publique, où des clés différentes sont utilisées pour le chiffrement et le déchiffrement. |
Symmetric-key cryptosystems use the same key for encryption and decryption of a message, although a message or group of messages can have a different key than others.
A significant disadvantage of symmetric ciphers is the |
Les cryptosystèmes à clé symétrique utilisent la même clé pour le chiffrement et le déchiffrement d'un message, bien qu'un message ou un groupe de messages puisse avoir une clé différente des autres.
un inconvénient majeur des chiffrements symétriques est la |
headshots of Whitfield Diffie and Martin Hellman | photos de Whitfield Diffie et Martin Hellman |
Original | Similar TM records |
---|---|
Cryptography or cryptology (from |
Cryptography or cryptology (from Cryptography prior to the modern age was effectively synonymous with |
https://en.wikipedia.org/wiki/Ancient_Greek_language | https://en.wikipedia.org/wiki/Ancient_Greek_language https://en.wikipedia.org/wiki/Language https://en.wikipedia.org/wiki/Key_management |
https://en.wikipedia.org/wiki/Cryptography#cite_note-1 | https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-16 https://en.wikipedia.org/wiki/Cryptography#cite_note-13 |
https://en.wikipedia.org/wiki/Secure_communication | https://en.wikipedia.org/wiki/Secure_communication https://en.wikipedia.org/wiki/Communications https://en.wikipedia.org/wiki/Military_communications |
https://en.wikipedia.org/wiki/Adversary_(cryptography) | https://en.wikipedia.org/wiki/Adversary_(cryptography) https://en.wikipedia.org/wiki/Key_(cryptography) https://en.wikipedia.org/wiki/Code_(cryptography) |
https://en.wikipedia.org/wiki/Cryptography#cite_note-rivest90-2 | https://en.wikipedia.org/wiki/Cryptography#cite_note-rivest90-2 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-40 |
https://en.wikipedia.org/wiki/Communications_protocol | https://en.wikipedia.org/wiki/Communications_protocol https://en.wikipedia.org/wiki/Communications https://en.wikipedia.org/wiki/Communication_science |
https://en.wikipedia.org/wiki/Cryptography#cite_note-modern-crypto-3 | https://en.wikipedia.org/wiki/Cryptography#cite_note-modern-crypto-3 https://en.wikipedia.org/wiki/Cryptography#cite_note-cryptolaw-6 https://en.wikipedia.org/wiki/Cryptography#cite_note-39 |
https://en.wikipedia.org/wiki/Information_security | https://en.wikipedia.org/wiki/Information_security https://en.wikipedia.org/wiki/Information_theoretic_security https://en.wikipedia.org/wiki/Information |
Cryptography or cryptology (from Cryptography prior to the modern age was effectively synonymous with |
|
https://en.wikipedia.org/wiki/Confidentiality | https://en.wikipedia.org/wiki/Confidentiality https://en.wikipedia.org/wiki/Colloquial https://en.wikipedia.org/wiki/Sedition |
https://en.wikipedia.org/wiki/Data_integrity | https://en.wikipedia.org/wiki/Data_integrity https://en.wikipedia.org/wiki/Bit https://en.wikipedia.org/wiki/Plaintext |
https://en.wikipedia.org/wiki/Authentication | https://en.wikipedia.org/wiki/Authentication https://en.wikipedia.org/wiki/Message_authentication_code https://en.wikipedia.org/wiki/Mathematics |
https://en.wikipedia.org/wiki/Non-repudiation | https://en.wikipedia.org/wiki/Non-repudiation https://en.wikipedia.org/wiki/Sedition https://en.wikipedia.org/wiki/Nonsense |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 https://en.wikipedia.org/wiki/Cryptography#cite_note-40 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 |
https://en.wikipedia.org/wiki/Mathematics | https://en.wikipedia.org/wiki/Mathematics https://en.wikipedia.org/wiki/Abstract_mathematics https://en.wikipedia.org/wiki/Statistics |
https://en.wikipedia.org/wiki/Computer_science | https://en.wikipedia.org/wiki/Computer_science https://en.wikipedia.org/wiki/Computer https://en.wikipedia.org/wiki/Computer_security |
https://en.wikipedia.org/wiki/Electrical_engineering | https://en.wikipedia.org/wiki/Electrical_engineering https://en.wikipedia.org/wiki/Engineering https://en.wikipedia.org/wiki/Security_engineering |
https://en.wikipedia.org/wiki/Communication_science | https://en.wikipedia.org/wiki/Communication_science https://en.wikipedia.org/wiki/Communications https://en.wikipedia.org/wiki/Communications_protocol |
https://en.wikipedia.org/wiki/Physics | https://en.wikipedia.org/wiki/Physics https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Electronic_commerce | https://en.wikipedia.org/wiki/Electronic_commerce https://en.wikipedia.org/wiki/Electronic_mailing_list https://en.wikipedia.org/wiki/Secure_communication |
https://en.wikipedia.org/wiki/Credit_card_chip | https://en.wikipedia.org/wiki/Credit_card_chip https://en.wikipedia.org/wiki/Cricket_pitch https://en.wikipedia.org/wiki/Sedition |
https://en.wikipedia.org/wiki/Digital_currencies | https://en.wikipedia.org/wiki/Digital_currencies https://en.wikipedia.org/wiki/Digital_signature https://en.wikipedia.org/wiki/Bit |
https://en.wikipedia.org/wiki/Password | https://en.wikipedia.org/wiki/Password https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Code_word |
https://en.wikipedia.org/wiki/Military_communications | https://en.wikipedia.org/wiki/Military_communications https://en.wikipedia.org/wiki/Communications https://en.wikipedia.org/wiki/Secure_communication |
Cryptography prior to the modern age was effectively synonymous with |
Cryptography prior to the modern age was effectively synonymous with Cryptography or cryptology (from Prior to the early 20th century, cryptography was mainly concerned with |
https://en.wikipedia.org/wiki/Encryption | https://en.wikipedia.org/wiki/Encryption https://en.wikipedia.org/wiki/Sedition https://en.wikipedia.org/wiki/Espionage |
https://en.wikipedia.org/wiki/Nonsense | https://en.wikipedia.org/wiki/Nonsense https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Alice_and_Bob | https://en.wikipedia.org/wiki/Alice_and_Bob https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Eavesdropper | https://en.wikipedia.org/wiki/Eavesdropper https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-codesintro-5 | https://en.wikipedia.org/wiki/Cryptography#cite_note-codesintro-5 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-40 |
https://en.wikipedia.org/wiki/Rotor_machine | https://en.wikipedia.org/wiki/Rotor_machine https://en.wikipedia.org/wiki/RC4 https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/World_War_I | https://en.wikipedia.org/wiki/World_War_I https://en.wikipedia.org/wiki/World_War_II https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Computer | https://en.wikipedia.org/wiki/Computer https://en.wikipedia.org/wiki/Computer_network https://en.wikipedia.org/wiki/Computer_science |
https://en.wikipedia.org/wiki/World_War_II | https://en.wikipedia.org/wiki/World_War_II https://en.wikipedia.org/wiki/World_War_I https://en.wikipedia.org/wiki/PHP |
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic |
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
A Since then, cryptography has become a widely used tool in communications, |
https://en.wikipedia.org/wiki/Algorithm | https://en.wikipedia.org/wiki/Algorithm https://en.wikipedia.org/wiki/RSA_(algorithm) https://en.wikipedia.org/wiki/Bit |
https://en.wikipedia.org/wiki/Computational_hardness_assumption | https://en.wikipedia.org/wiki/Computational_hardness_assumption https://en.wikipedia.org/wiki/Computational_complexity_theory https://en.wikipedia.org/wiki/Computer |
https://en.wikipedia.org/wiki/Integer_factorization | https://en.wikipedia.org/wiki/Integer_factorization https://en.wikipedia.org/wiki/Information https://en.wikipedia.org/wiki/Internet_forum |
https://en.wikipedia.org/wiki/Information_theoretic_security | https://en.wikipedia.org/wiki/Information_theoretic_security https://en.wikipedia.org/wiki/Information_security https://en.wikipedia.org/wiki/Information_theory |
https://en.wikipedia.org/wiki/One-time_pad | https://en.wikipedia.org/wiki/One-time_pad https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Espionage | https://en.wikipedia.org/wiki/Espionage https://en.wikipedia.org/wiki/Encryption https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Sedition | https://en.wikipedia.org/wiki/Sedition https://en.wikipedia.org/wiki/Bit https://en.wikipedia.org/wiki/Spy |
https://en.wikipedia.org/wiki/Cryptography#cite_note-cryptolaw-6 | https://en.wikipedia.org/wiki/Cryptography#cite_note-cryptolaw-6 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-UK_law-7 |
https://en.wikipedia.org/wiki/Key_disclosure_law | https://en.wikipedia.org/wiki/Key_disclosure_law https://en.wikipedia.org/wiki/Key_length https://en.wikipedia.org/wiki/Keccak |
https://en.wikipedia.org/wiki/Cryptography#cite_note-UK_law-7 | https://en.wikipedia.org/wiki/Cryptography#cite_note-UK_law-7 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-40 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-RangerSteve1-8 | https://en.wikipedia.org/wiki/Cryptography#cite_note-RangerSteve1-8 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-40 |
https://en.wikipedia.org/wiki/Digital_rights_management | https://en.wikipedia.org/wiki/Digital_rights_management https://en.wikipedia.org/wiki/Key_management https://en.wikipedia.org/wiki/Digital_signature |
https://en.wikipedia.org/wiki/Copyright_infringement | https://en.wikipedia.org/wiki/Copyright_infringement https://en.wikipedia.org/wiki/Caught https://en.wikipedia.org/wiki/Engineering |
https://en.wikipedia.org/wiki/Cryptography#cite_note-AACS-9 | https://en.wikipedia.org/wiki/Cryptography#cite_note-AACS-9 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-40 |
https://en.wikipedia.org/wiki/The_Gold-Bug | https://en.wikipedia.org/wiki/The_Gold-Bug https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Edgar_Allan_Poe | https://en.wikipedia.org/wiki/Edgar_Allan_Poe https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-10 | https://en.wikipedia.org/wiki/Cryptography#cite_note-10 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-16 |
10 | |
https://en.wikipedia.org/wiki/Plaintext | https://en.wikipedia.org/wiki/Plaintext https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Ciphertext |
https://en.wikipedia.org/wiki/Ciphertext | https://en.wikipedia.org/wiki/Ciphertext https://en.wikipedia.org/wiki/Cipher https://en.wikipedia.org/wiki/Computer |
https://en.wikipedia.org/wiki/Cryptography#cite_note-kahnbook-11 | https://en.wikipedia.org/wiki/Cryptography#cite_note-kahnbook-11 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-16 |
11 | |
https://en.wikipedia.org/wiki/Cipher | https://en.wikipedia.org/wiki/Cipher https://en.wikipedia.org/wiki/Ciphertext https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Key_(cryptography) | https://en.wikipedia.org/wiki/Key_(cryptography) https://en.wikipedia.org/wiki/Code_(cryptography) https://en.wikipedia.org/wiki/Adversary_(cryptography) |
https://en.wikipedia.org/wiki/Cryptosystem | https://en.wikipedia.org/wiki/Cryptosystem https://en.wikipedia.org/wiki/RSA_(cryptosystem) https://en.wikipedia.org/wiki/Cryptanalysis |
Historically, ciphers were often used directly for encryption or decryption without additional procedures such as |
Historically, ciphers were often used directly for encryption or decryption without additional procedures such as Symmetric-key cryptosystems use the same key for encryption and decryption of a message, although a message or group of messages can have a different key than others.
A significant disadvantage of symmetric ciphers is the |
https://en.wikipedia.org/wiki/Authentication | https://en.wikipedia.org/wiki/Authentication https://en.wikipedia.org/wiki/Message_authentication_code https://en.wikipedia.org/wiki/Mathematics |
https://en.wikipedia.org/wiki/Symmetric-key_algorithm | https://en.wikipedia.org/wiki/Symmetric-key_algorithm https://en.wikipedia.org/wiki/Algorithm https://en.wikipedia.org/wiki/RSA_(algorithm) |
https://en.wikipedia.org/wiki/Public-key_cryptography | https://en.wikipedia.org/wiki/Public-key_cryptography https://en.wikipedia.org/wiki/Key_(cryptography) https://en.wikipedia.org/wiki/Quantum_cryptography |
https://en.wikipedia.org/wiki/Cryptography#cite_note-12 | https://en.wikipedia.org/wiki/Cryptography#cite_note-12 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-16 |
12 | |
Examples of asymmetric systems include RSA ( |
Examples of asymmetric systems include RSA ( |
https://en.wikipedia.org/wiki/Rivest-Shamir-Adleman | https://en.wikipedia.org/wiki/Rivest-Shamir-Adleman https://en.wikipedia.org/wiki/RC4 https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography | https://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography https://en.wikipedia.org/wiki/Topics_in_Cryptography https://en.wikipedia.org/wiki/Code_(cryptography) |
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard | https://en.wikipedia.org/wiki/Advanced_Encryption_Standard https://en.wikipedia.org/wiki/Data_Encryption_Standard https://en.wikipedia.org/wiki/Encryption |
https://en.wikipedia.org/wiki/Data_Encryption_Standard | https://en.wikipedia.org/wiki/Data_Encryption_Standard https://en.wikipedia.org/wiki/Advanced_Encryption_Standard https://en.wikipedia.org/wiki/Encryption |
https://en.wikipedia.org/wiki/Cryptography#cite_note-13 | https://en.wikipedia.org/wiki/Cryptography#cite_note-13 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-16 |
13 | |
In |
In |
https://en.wikipedia.org/wiki/Colloquial | https://en.wikipedia.org/wiki/Colloquial https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Code_(cryptography) | https://en.wikipedia.org/wiki/Code_(cryptography) https://en.wikipedia.org/wiki/Key_(cryptography) https://en.wikipedia.org/wiki/Adversary_(cryptography) |
https://en.wikipedia.org/wiki/Code_word | https://en.wikipedia.org/wiki/Code_word https://en.wikipedia.org/wiki/Password https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Cryptanalysis | https://en.wikipedia.org/wiki/Cryptanalysis https://en.wikipedia.org/wiki/Cryptosystem https://en.wikipedia.org/wiki/Physics |
Some use the terms |
Some use the terms The growth of cryptographic technology has raised a number of legal issues in the information age.
Cryptography’s potential for use as a tool for Cryptography or cryptology (from |
https://en.wikipedia.org/wiki/Cryptography#cite_note-goldreichbook-14 | https://en.wikipedia.org/wiki/Cryptography#cite_note-goldreichbook-14 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-kahnbook-11 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-websters-15 | https://en.wikipedia.org/wiki/Cryptography#cite_note-websters-15 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-16 |
14 | |
15 | |
https://en.wikipedia.org/wiki/Request_for_Comments_(identifier) | https://en.wikipedia.org/wiki/Request_for_Comments_(identifier) https://en.wikipedia.org/wiki/Confidentiality https://en.wikipedia.org/wiki/Scientific_American |
https://tools.ietf.org/html/rfc2828 | https://tools.ietf.org/html/rfc2828 |
https://en.wikipedia.org/wiki/Steganography | https://en.wikipedia.org/wiki/Steganography https://en.wikipedia.org/wiki/Spy https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Cryptography#cite_note-16 | https://en.wikipedia.org/wiki/Cryptography#cite_note-16 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-13 |
16 | |
Before the modern era, cryptography focused on message confidentiality (i.e., encryption)—conversion of |
Cryptography prior to the modern age was effectively synonymous with Prior to the early 20th century, cryptography was mainly concerned with Cryptography or cryptology (from |
https://en.wikipedia.org/wiki/Information | https://en.wikipedia.org/wiki/Information https://en.wikipedia.org/wiki/Information_theory https://en.wikipedia.org/wiki/Information_security |
https://en.wikipedia.org/wiki/Secrecy | https://en.wikipedia.org/wiki/Secrecy https://en.wikipedia.org/wiki/Spy https://en.wikipedia.org/wiki/SHA-3 |
https://en.wikipedia.org/wiki/Communications | https://en.wikipedia.org/wiki/Communications https://en.wikipedia.org/wiki/Communications_protocol https://en.wikipedia.org/wiki/Communication_science |
https://en.wikipedia.org/wiki/Spy | https://en.wikipedia.org/wiki/Spy https://en.wikipedia.org/wiki/SHA-3 https://en.wikipedia.org/wiki/SHA-2 |
https://en.wikipedia.org/wiki/Diplomat | https://en.wikipedia.org/wiki/Diplomat https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Authentication | https://en.wikipedia.org/wiki/Authentication https://en.wikipedia.org/wiki/Message_authentication_code https://en.wikipedia.org/wiki/Mathematics |
https://en.wikipedia.org/wiki/Digital_signature | https://en.wikipedia.org/wiki/Digital_signature https://en.wikipedia.org/wiki/Digital_currencies https://en.wikipedia.org/wiki/Digital_rights_management |
https://en.wikipedia.org/wiki/Interactive_proof_system | https://en.wikipedia.org/wiki/Interactive_proof_system https://en.wikipedia.org/wiki/Web_template_system https://en.wikipedia.org/wiki/Cryptosystem |
https://en.wikipedia.org/wiki/Secure_multiparty_computation | https://en.wikipedia.org/wiki/Secure_multiparty_computation https://en.wikipedia.org/wiki/Secure_communication https://en.wikipedia.org/wiki/Secure_Shell |
Prior to the early 20th century, cryptography was mainly concerned with |
Prior to the early 20th century, cryptography was mainly concerned with The growth of cryptographic technology has raised a number of legal issues in the information age.
Cryptography’s potential for use as a tool for Cryptography prior to the modern age was effectively synonymous with |
https://en.wikipedia.org/wiki/Language | https://en.wikipedia.org/wiki/Language https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Lexicographic_code | https://en.wikipedia.org/wiki/Lexicographic_code https://en.wikipedia.org/wiki/Steganography https://en.wikipedia.org/wiki/Code_(cryptography) |
https://en.wikipedia.org/wiki/Information_theory | https://en.wikipedia.org/wiki/Information_theory https://en.wikipedia.org/wiki/Information https://en.wikipedia.org/wiki/Information_theoretic_security |
https://en.wikipedia.org/wiki/Computational_complexity_theory | https://en.wikipedia.org/wiki/Computational_complexity_theory https://en.wikipedia.org/wiki/Computational_complexity_theory#Intractability https://en.wikipedia.org/wiki/Information_theory |
https://en.wikipedia.org/wiki/Statistics | https://en.wikipedia.org/wiki/Statistics https://en.wikipedia.org/wiki/Spy https://en.wikipedia.org/wiki/Mathematics |
https://en.wikipedia.org/wiki/Combinatorics | https://en.wikipedia.org/wiki/Combinatorics https://en.wikipedia.org/wiki/Computer https://en.wikipedia.org/wiki/Cricket_bat |
https://en.wikipedia.org/wiki/Abstract_algebra | https://en.wikipedia.org/wiki/Abstract_algebra https://en.wikipedia.org/wiki/Abstract_mathematics https://en.wikipedia.org/wiki/Square_(algebra) |
https://en.wikipedia.org/wiki/Number_theory | https://en.wikipedia.org/wiki/Number_theory https://en.wikipedia.org/wiki/Cipher https://en.wikipedia.org/wiki/Information_theory |
https://en.wikipedia.org/wiki/Engineering | https://en.wikipedia.org/wiki/Engineering https://en.wikipedia.org/wiki/Electrical_engineering https://en.wikipedia.org/wiki/Security_engineering |
https://en.wikipedia.org/wiki/Security_engineering | https://en.wikipedia.org/wiki/Security_engineering https://en.wikipedia.org/wiki/Engineering https://en.wikipedia.org/wiki/Electrical_engineering |
https://en.wikipedia.org/wiki/Quantum_physics | https://en.wikipedia.org/wiki/Quantum_physics https://en.wikipedia.org/wiki/Physics https://en.wikipedia.org/wiki/Quantum_cryptography |
https://en.wikipedia.org/wiki/Quantum_cryptography | https://en.wikipedia.org/wiki/Quantum_cryptography https://en.wikipedia.org/wiki/Post-quantum_cryptography https://en.wikipedia.org/wiki/Quantum_physics |
https://en.wikipedia.org/wiki/Quantum_computer | https://en.wikipedia.org/wiki/Quantum_computer https://en.wikipedia.org/wiki/Quantum_computing https://en.wikipedia.org/wiki/Computer |
https://en.wikipedia.org/wiki/Binary_numeral_system | https://en.wikipedia.org/wiki/Binary_numeral_system https://en.wikipedia.org/wiki/Cryptosystem https://en.wikipedia.org/wiki/Bit |
https://en.wikipedia.org/wiki/Bit | https://en.wikipedia.org/wiki/Bit https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/PHP |
https://en.wikipedia.org/wiki/Cryptanalysis | https://en.wikipedia.org/wiki/Cryptanalysis https://en.wikipedia.org/wiki/Cryptosystem https://en.wikipedia.org/wiki/Physics |
https://en.wikipedia.org/wiki/Bletchley_Park | https://en.wikipedia.org/wiki/Bletchley_Park https://en.wikipedia.org/wiki/Blog https://en.wikipedia.org/wiki/Bit |
https://en.wikipedia.org/wiki/Colossus_computer | https://en.wikipedia.org/wiki/Colossus_computer https://en.wikipedia.org/wiki/Computer https://en.wikipedia.org/wiki/Computer_network |
https://en.wikipedia.org/wiki/Computer_programming | https://en.wikipedia.org/wiki/Computer_programming https://en.wikipedia.org/wiki/Computer https://en.wikipedia.org/wiki/Computer_network |
https://en.wikipedia.org/wiki/Lorenz_SZ40/42 | https://en.wikipedia.org/wiki/Lorenz_SZ40/42 https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Data_Encryption_Standard | https://en.wikipedia.org/wiki/Data_Encryption_Standard https://en.wikipedia.org/wiki/Advanced_Encryption_Standard https://en.wikipedia.org/wiki/Encryption |
https://en.wikipedia.org/wiki/Whitfield_Diffie | https://en.wikipedia.org/wiki/Whitfield_Diffie https://en.wikipedia.org/wiki/Diffie-Hellman https://en.wikipedia.org/wiki/Bit |
https://en.wikipedia.org/wiki/Martin_Hellman | https://en.wikipedia.org/wiki/Martin_Hellman https://en.wikipedia.org/wiki/Martin_Gardner https://en.wikipedia.org/wiki/Diffie-Hellman |
https://en.wikipedia.org/wiki/Diffie-Hellman | https://en.wikipedia.org/wiki/Diffie-Hellman https://en.wikipedia.org/wiki/Martin_Hellman https://en.wikipedia.org/wiki/File:Diffie_and_Hellman.jpg |
https://en.wikipedia.org/wiki/Cryptography#cite_note-dh2-30 | https://en.wikipedia.org/wiki/Cryptography#cite_note-dh2-30 https://en.wikipedia.org/wiki/Cryptography#cite_note-39 https://en.wikipedia.org/wiki/Cryptography#cite_note-32 |
30 | |
and the |
Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970’s.
In recent times, IBM personnel designed the algorithm that became the Federal (i.e., US) |
https://en.wikipedia.org/wiki/RSA_(algorithm) | https://en.wikipedia.org/wiki/RSA_(algorithm) https://en.wikipedia.org/wiki/Algorithm https://en.wikipedia.org/wiki/RC4 |
https://en.wikipedia.org/wiki/Martin_Gardner | https://en.wikipedia.org/wiki/Martin_Gardner https://en.wikipedia.org/wiki/Martin_Hellman https://en.wikipedia.org/wiki/MariaDB |
https://en.wikipedia.org/wiki/Scientific_American | https://en.wikipedia.org/wiki/Scientific_American https://en.wikipedia.org/wiki/Spy https://en.wikipedia.org/wiki/Authentication |
https://en.wikipedia.org/wiki/Cryptography#cite_note-31 | https://en.wikipedia.org/wiki/Cryptography#cite_note-31 https://en.wikipedia.org/wiki/Cryptography#cite_note-39 https://en.wikipedia.org/wiki/Cryptography#cite_note-32 |
31 | |
Since then, cryptography has become a widely used tool in communications, |
Since then, cryptography has become a widely used tool in communications, Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic Prior to the early 20th century, cryptography was mainly concerned with |
https://en.wikipedia.org/wiki/Computer_network | https://en.wikipedia.org/wiki/Computer_network https://en.wikipedia.org/wiki/Computer https://en.wikipedia.org/wiki/Computer_science |
https://en.wikipedia.org/wiki/Computer_security | https://en.wikipedia.org/wiki/Computer_security https://en.wikipedia.org/wiki/Computer https://en.wikipedia.org/wiki/Computer_science |
https://en.wikipedia.org/wiki/Computational_complexity_theory#Intractability | https://en.wikipedia.org/wiki/Computational_complexity_theory#Intractability https://en.wikipedia.org/wiki/Computational_complexity_theory https://en.wikipedia.org/wiki/Military_communications |
https://en.wikipedia.org/wiki/Integer_factorization | https://en.wikipedia.org/wiki/Integer_factorization https://en.wikipedia.org/wiki/Information https://en.wikipedia.org/wiki/Internet_forum |
https://en.wikipedia.org/wiki/Discrete_logarithm | https://en.wikipedia.org/wiki/Discrete_logarithm https://en.wikipedia.org/wiki/Discrete_logarithm_problem https://en.wikipedia.org/wiki/Algorithm |
https://en.wikipedia.org/wiki/Abstract_mathematics | https://en.wikipedia.org/wiki/Abstract_mathematics https://en.wikipedia.org/wiki/Mathematics https://en.wikipedia.org/wiki/Abstract_algebra |
https://en.wikipedia.org/wiki/One-time_pad | https://en.wikipedia.org/wiki/One-time_pad https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/RSA_(cryptosystem) | https://en.wikipedia.org/wiki/RSA_(cryptosystem) https://en.wikipedia.org/wiki/Cryptosystem https://en.wikipedia.org/wiki/RSA_(algorithm) |
https://en.wikipedia.org/wiki/Michael_O._Rabin | https://en.wikipedia.org/wiki/Michael_O._Rabin https://en.wikipedia.org/wiki/Md5 https://en.wikipedia.org/wiki/MD5 |
https://en.wikipedia.org/wiki/Discrete_logarithm_problem | https://en.wikipedia.org/wiki/Discrete_logarithm_problem https://en.wikipedia.org/wiki/Discrete_logarithm https://en.wikipedia.org/wiki/Algorithm |
https://en.wikipedia.org/wiki/Cryptography#cite_note-32 | https://en.wikipedia.org/wiki/Cryptography#cite_note-32 https://en.wikipedia.org/wiki/Cryptography#cite_note-39 https://en.wikipedia.org/wiki/Cryptography#cite_note-31 |
32 | |
https://en.wikipedia.org/wiki/Brute-force_attack | https://en.wikipedia.org/wiki/Brute-force_attack https://en.wikipedia.org/wiki/Bit https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Key_length | https://en.wikipedia.org/wiki/Key_length https://en.wikipedia.org/wiki/Keccak https://en.wikipedia.org/wiki/Key_management |
https://en.wikipedia.org/wiki/Cryptography#cite_note-fortify-33 | https://en.wikipedia.org/wiki/Cryptography#cite_note-fortify-33 https://en.wikipedia.org/wiki/Cryptography#cite_note-39 https://en.wikipedia.org/wiki/Cryptography#cite_note-32 |
33 | |
https://en.wikipedia.org/wiki/Quantum_computing | https://en.wikipedia.org/wiki/Quantum_computing https://en.wikipedia.org/wiki/Quantum_computer https://en.wikipedia.org/wiki/Quantum_physics |
https://en.wikipedia.org/wiki/Post-quantum_cryptography | https://en.wikipedia.org/wiki/Post-quantum_cryptography https://en.wikipedia.org/wiki/Quantum_cryptography https://en.wikipedia.org/wiki/Public-key_cryptography |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 https://en.wikipedia.org/wiki/Cryptography#cite_note-40 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 |
https://en.wikipedia.org/wiki/Symmetric-key_algorithm | https://en.wikipedia.org/wiki/Symmetric-key_algorithm https://en.wikipedia.org/wiki/Algorithm https://en.wikipedia.org/wiki/RSA_(algorithm) |
https://en.wikipedia.org/wiki/File:Symmetric_key_encryption.svg https://en.wikipedia.org/wiki/File:Public_key_encryption.svg https://en.wikipedia.org/wiki/Encryption |
|
https://en.wikipedia.org/wiki/Cryptography#cite_note-dh2-30 | https://en.wikipedia.org/wiki/Cryptography#cite_note-dh2-30 https://en.wikipedia.org/wiki/Cryptography#cite_note-39 https://en.wikipedia.org/wiki/Cryptography#cite_note-32 |
30 | |
https://en.wikipedia.org/wiki/File:International_Data_Encryption_Algorithm_InfoBox_Diagram.svg https://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm |
|
https://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm | https://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm https://en.wikipedia.org/wiki/File:International_Data_Encryption_Algorithm_InfoBox_Diagram.svg https://en.wikipedia.org/wiki/Data_Encryption_Standard |
https://en.wikipedia.org/wiki/Pretty_Good_Privacy | https://en.wikipedia.org/wiki/Pretty_Good_Privacy https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/E-mail_privacy |
Symmetric key ciphers are implemented as either |
Symmetric key ciphers are implemented as either |
https://en.wikipedia.org/wiki/Block_ciphers | https://en.wikipedia.org/wiki/Block_ciphers https://en.wikipedia.org/wiki/Cipher https://en.wikipedia.org/wiki/Blog |
https://en.wikipedia.org/wiki/Stream_ciphers | https://en.wikipedia.org/wiki/Stream_ciphers https://en.wikipedia.org/wiki/Category:Stream_ciphers https://en.wikipedia.org/wiki/Block_ciphers |
https://en.wikipedia.org/wiki/Data_Encryption_Standard | https://en.wikipedia.org/wiki/Data_Encryption_Standard https://en.wikipedia.org/wiki/Advanced_Encryption_Standard https://en.wikipedia.org/wiki/Encryption |
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard | https://en.wikipedia.org/wiki/Advanced_Encryption_Standard https://en.wikipedia.org/wiki/Data_Encryption_Standard https://en.wikipedia.org/wiki/Encryption |
https://en.wikipedia.org/wiki/Cryptography_standards | https://en.wikipedia.org/wiki/Cryptography_standards https://en.wikipedia.org/wiki/Key_(cryptography) https://en.wikipedia.org/wiki/Code_(cryptography) |
https://en.wikipedia.org/wiki/Cryptography#cite_note-aes-34 | https://en.wikipedia.org/wiki/Cryptography#cite_note-aes-34 https://en.wikipedia.org/wiki/Cryptography#cite_note-39 https://en.wikipedia.org/wiki/Cryptography#cite_note-32 |
34 | |
https://en.wikipedia.org/wiki/Triple-DES | https://en.wikipedia.org/wiki/Triple-DES https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-atm-35 | https://en.wikipedia.org/wiki/Cryptography#cite_note-atm-35 https://en.wikipedia.org/wiki/Cryptography#cite_note-39 https://en.wikipedia.org/wiki/Cryptography#cite_note-32 |
35 | |
https://en.wikipedia.org/wiki/E-mail_privacy | https://en.wikipedia.org/wiki/E-mail_privacy https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-opgp-36 | https://en.wikipedia.org/wiki/Cryptography#cite_note-opgp-36 https://en.wikipedia.org/wiki/Cryptography#cite_note-39 https://en.wikipedia.org/wiki/Cryptography#cite_note-32 |
36 | |
https://en.wikipedia.org/wiki/Secure_Shell | https://en.wikipedia.org/wiki/Secure_Shell https://en.wikipedia.org/wiki/Secrecy https://en.wikipedia.org/wiki/Spy |
https://en.wikipedia.org/wiki/Cryptography#cite_note-ssh-37 | https://en.wikipedia.org/wiki/Cryptography#cite_note-ssh-37 https://en.wikipedia.org/wiki/Cryptography#cite_note-39 https://en.wikipedia.org/wiki/Cryptography#cite_note-32 |
37 | |
https://en.wikipedia.org/wiki/FEAL | https://en.wikipedia.org/wiki/FEAL https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 https://en.wikipedia.org/wiki/Cryptography#cite_note-40 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-schneierbook-38 | https://en.wikipedia.org/wiki/Cryptography#cite_note-schneierbook-38 https://en.wikipedia.org/wiki/Cryptography#cite_note-kahnbook-11 https://en.wikipedia.org/wiki/Cryptography#cite_note-39 |
38 | |
Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined with the plaintext bit-by-bit or character-by-character, somewhat like the |
Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined with the plaintext bit-by-bit or character-by-character, somewhat like the |
https://en.wikipedia.org/wiki/One-time_pad | https://en.wikipedia.org/wiki/One-time_pad https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/RC4 | https://en.wikipedia.org/wiki/RC4 https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Category:Stream_ciphers | https://en.wikipedia.org/wiki/Category:Stream_ciphers https://en.wikipedia.org/wiki/Stream_ciphers https://en.wikipedia.org/wiki/Cipher |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 https://en.wikipedia.org/wiki/Cryptography#cite_note-40 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 |
https://en.wikipedia.org/wiki/Block_cipher_modes_of_operation | https://en.wikipedia.org/wiki/Block_cipher_modes_of_operation https://en.wikipedia.org/wiki/Block_ciphers https://en.wikipedia.org/wiki/Cipher |
https://en.wikipedia.org/wiki/Cryptographic_hash_functions | https://en.wikipedia.org/wiki/Cryptographic_hash_functions https://en.wikipedia.org/wiki/Hash_function https://en.wikipedia.org/wiki/Encryption |
https://en.wikipedia.org/wiki/Hash_function | https://en.wikipedia.org/wiki/Hash_function https://en.wikipedia.org/wiki/Encryption https://en.wikipedia.org/wiki/Sedition |
https://en.wikipedia.org/wiki/MD4 | https://en.wikipedia.org/wiki/MD4 https://en.wikipedia.org/wiki/MD5 https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/MD5 | https://en.wikipedia.org/wiki/MD5 https://en.wikipedia.org/wiki/MD4 https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/National_Security_Agency | https://en.wikipedia.org/wiki/National_Security_Agency https://en.wikipedia.org/wiki/Information_security https://en.wikipedia.org/wiki/Sedition |
https://en.wikipedia.org/wiki/SHA-1 | https://en.wikipedia.org/wiki/SHA-1 https://en.wikipedia.org/wiki/SHA-3 https://en.wikipedia.org/wiki/SHA-2 |
https://en.wikipedia.org/wiki/SHA-2 | https://en.wikipedia.org/wiki/SHA-2 https://en.wikipedia.org/wiki/SHA-3 https://en.wikipedia.org/wiki/SHA-1 |
https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology | https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology https://en.wikipedia.org/wiki/National_Security_Agency https://en.wikipedia.org/wiki/Data_Encryption_Standard |
https://en.wikipedia.org/wiki/Cryptography#cite_note-39 | https://en.wikipedia.org/wiki/Cryptography#cite_note-39 https://en.wikipedia.org/wiki/Cryptography#cite_note-32 https://en.wikipedia.org/wiki/Cryptography#cite_note-31 |
39 | |
Thus, a |
Thus, a |
https://en.wikipedia.org/wiki/NIST_hash_function_competition | https://en.wikipedia.org/wiki/NIST_hash_function_competition https://en.wikipedia.org/wiki/Hash_function https://en.wikipedia.org/wiki/Cryptographic_hash_functions |
https://en.wikipedia.org/wiki/SHA-3 | https://en.wikipedia.org/wiki/SHA-3 https://en.wikipedia.org/wiki/SHA-2 https://en.wikipedia.org/wiki/SHA-1 |
https://en.wikipedia.org/wiki/Keccak | https://en.wikipedia.org/wiki/Keccak https://en.wikipedia.org/wiki/PHP https://en.wikipedia.org/wiki/Md5 |
https://en.wikipedia.org/wiki/Cryptography#cite_note-40 | https://en.wikipedia.org/wiki/Cryptography#cite_note-40 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 https://en.wikipedia.org/wiki/Cryptography#cite_note-39 |
40 | |
https://en.wikipedia.org/wiki/Message_authentication_code | https://en.wikipedia.org/wiki/Message_authentication_code https://en.wikipedia.org/wiki/Authentication https://en.wikipedia.org/wiki/Mathematics |
https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 | https://en.wikipedia.org/wiki/Cryptography#cite_note-hac-4 https://en.wikipedia.org/wiki/Cryptography#cite_note-40 https://en.wikipedia.org/wiki/Cryptography#cite_note-1 |
https://en.wikipedia.org/wiki/Md5 | https://en.wikipedia.org/wiki/Md5 https://en.wikipedia.org/wiki/MD5 https://en.wikipedia.org/wiki/MD4 |
https://en.wikipedia.org/wiki/Topics_in_Cryptography | https://en.wikipedia.org/wiki/Topics_in_Cryptography https://en.wikipedia.org/wiki/Key_(cryptography) https://en.wikipedia.org/wiki/Code_(cryptography) |
https://en.wikipedia.org/wiki/File:Public_key_encryption.svg https://en.wikipedia.org/wiki/File:Symmetric_key_encryption.svg https://en.wikipedia.org/wiki/Encryption |
|
https://en.wikipedia.org/wiki/Key_management | https://en.wikipedia.org/wiki/Key_management https://en.wikipedia.org/wiki/Key_length https://en.wikipedia.org/wiki/Digital_rights_management |
https://en.wikipedia.org/wiki/Square_(algebra) | https://en.wikipedia.org/wiki/Square_(algebra) https://en.wikipedia.org/wiki/Spy https://en.wikipedia.org/wiki/Abstract_algebra |
https://en.wikipedia.org/wiki/File:Diffie_and_Hellman.jpg https://en.wikipedia.org/wiki/Diffie-Hellman https://en.wikipedia.org/wiki/Martin_Hellman |