49 relations: Abraham Sinkov, Adaptive chosen-ciphertext attack, Advanced Encryption Standard, Algorithm, Attack model, Babington Plot, Beale ciphers, Block cipher, Brute-force attack, Caesar cipher, Certified Information Systems Security Professional, Chosen-ciphertext attack, Chosen-plaintext attack, Cipher, Ciphertext-only attack, Classical cipher, Code (cryptography), Cryptogram, Cryptography, Cryptosystem, Data Encryption Standard, David Kahn (writer), Encryption, Enigma machine, History of cryptography, Key (cryptography), Known-plaintext attack, Kryptos, One-time pad, Password cracking, Permutation, Plaintext, Playfair cipher, Polyalphabetic cipher, Polygraphic substitution, Public-key cryptography, Rail fence cipher, Related-key attack, RSA (cryptosystem), Shugborough inscription, Stream cipher, Substitution cipher, Symmetric-key algorithm, The Gold-Bug, The Magic Words are Squeamish Ossifrage, Transposition cipher, Vigenère cipher, Zimmermann Telegram, Zodiac Killer.
Abraham Sinkov
Abraham "Abe" Sinkov (August 22, 1907 – January 19, 1998) was a US cryptanalyst.
New!!: Ciphertext and Abraham Sinkov · See more »
Adaptive chosen-ciphertext attack
An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker sends a number of ciphertexts to be decrypted, then uses the results of these decryptions to select subsequent ciphertexts.
New!!: Ciphertext and Adaptive chosen-ciphertext attack · See more »
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
New!!: Ciphertext and Advanced Encryption Standard · See more »
Algorithm
In mathematics and computer science, an algorithm is an unambiguous specification of how to solve a class of problems.
New!!: Ciphertext and Algorithm · See more »
Attack model
In cryptanalysis, attack models or attack types are a classification of cryptographic attacks specifying the kind of access a cryptanalyst has to a system under attack when attempting to "break" an encrypted message (also known as ciphertext) generated by the system.
New!!: Ciphertext and Attack model · See more »
Babington Plot
The Babington Plot was a plan in 1586 to assassinate Queen Elizabeth I, a Protestant, and put Mary, Queen of Scots, her Roman Catholic cousin, on the English throne.
New!!: Ciphertext and Babington Plot · See more »
Beale ciphers
The Beale ciphers, also referred to as the Beale Papers, are a set of three ciphertexts, one of which allegedly states the location of a buried treasure of gold, silver and jewels estimated to be worth over US$43 million.
New!!: Ciphertext and Beale ciphers · See more »
Block cipher
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.
New!!: Ciphertext and Block cipher · See more »
Brute-force attack
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.
New!!: Ciphertext and Brute-force attack · See more »
Caesar cipher
E in the plaintext becomes B in the ciphertext.
New!!: Ciphertext and Caesar cipher · See more »
Certified Information Systems Security Professional
Certified Information Systems Security Professional (CISSP) is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)².
New!!: Ciphertext and Certified Information Systems Security Professional · See more »
Chosen-ciphertext attack
A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis where the cryptanalyst can gather information by obtaining the decryptions of chosen ciphertexts.
New!!: Ciphertext and Chosen-ciphertext attack · See more »
Chosen-plaintext attack
A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts.
New!!: Ciphertext and Chosen-plaintext attack · See more »
Cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.
New!!: Ciphertext and Cipher · See more »
Ciphertext-only attack
In cryptography, a ciphertext-only attack (COA) or known ciphertext attack is an attack model for cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts.
New!!: Ciphertext and Ciphertext-only attack · See more »
Classical cipher
In cryptography, a classical cipher is a type of cipher that was used historically but now has fallen, for the most part, into disuse.
New!!: Ciphertext and Classical cipher · See more »
Code (cryptography)
Cryptography in simple terms means the use of any alphabet or numerical statement which has a meaning or stores a message.
New!!: Ciphertext and Code (cryptography) · See more »
Cryptogram
A cryptogram is a type of puzzle that consists of a short piece of encrypted text.
New!!: Ciphertext and Cryptogram · See more »
Cryptography
Cryptography or cryptology (from κρυπτός|translit.
New!!: Ciphertext and Cryptography · See more »
Cryptosystem
In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption).
New!!: Ciphertext and Cryptosystem · See more »
Data Encryption Standard
The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.
New!!: Ciphertext and Data Encryption Standard · See more »
David Kahn (writer)
David Kahn (b. February 7, 1930*) is a US historian, journalist and writer.
New!!: Ciphertext and David Kahn (writer) · See more »
Encryption
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
New!!: Ciphertext and Encryption · See more »
Enigma machine
The Enigma machines were a series of electro-mechanical rotor cipher machines developed and used in the early- to mid-20th century to protect commercial, diplomatic and military communication.
New!!: Ciphertext and Enigma machine · See more »
History of cryptography
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago.
New!!: Ciphertext and History of cryptography · See more »
Key (cryptography)
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.
New!!: Ciphertext and Key (cryptography) · See more »
Known-plaintext attack
The known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib), and its encrypted version (ciphertext).
New!!: Ciphertext and Known-plaintext attack · See more »
Kryptos
Kryptos is a sculpture by the American artist Jim Sanborn located on the grounds of the Central Intelligence Agency (CIA) in Langley, Virginia.
New!!: Ciphertext and Kryptos · See more »
One-time pad
In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a one-time pre-shared key the same size as, or longer than, the message being sent.
New!!: Ciphertext and One-time pad · See more »
Password cracking
In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.
New!!: Ciphertext and Password cracking · See more »
Permutation
In mathematics, the notion of permutation relates to the act of arranging all the members of a set into some sequence or order, or if the set is already ordered, rearranging (reordering) its elements, a process called permuting.
New!!: Ciphertext and Permutation · See more »
Plaintext
In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.
New!!: Ciphertext and Plaintext · See more »
Playfair cipher
The Playfair cipher or Playfair square or Wheatstone-Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher.
New!!: Ciphertext and Playfair cipher · See more »
Polyalphabetic cipher
A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets.
New!!: Ciphertext and Polyalphabetic cipher · See more »
Polygraphic substitution
A polygraphic substitution is a cipher in which a uniform substitution is performed on blocks of letters.
New!!: Ciphertext and Polygraphic substitution · See more »
Public-key cryptography
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
New!!: Ciphertext and Public-key cryptography · See more »
Rail fence cipher
The rail fence cipher (also called a zigzag cipher) is a form of transposition cipher.
New!!: Ciphertext and Rail fence cipher · See more »
Related-key attack
In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the keys is known to the attacker.
New!!: Ciphertext and Related-key attack · See more »
RSA (cryptosystem)
RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.
New!!: Ciphertext and RSA (cryptosystem) · See more »
Shugborough inscription
The Shugborough Inscription is a sequence of letters – O U O S V A V V, between the letters D M – carved on the 18th-century Shepherd's Monument in the grounds of Shugborough Hall in Staffordshire, England, below a mirror image of Nicolas Poussin's painting, the Shepherds of Arcadia.
New!!: Ciphertext and Shugborough inscription · See more »
Stream cipher
A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).
New!!: Ciphertext and Stream cipher · See more »
Substitution cipher
In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth.
New!!: Ciphertext and Substitution cipher · See more »
Symmetric-key algorithm
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
New!!: Ciphertext and Symmetric-key algorithm · See more »
The Gold-Bug
"The Gold-Bug" is a short story by Edgar Allan Poe published in 1843.
New!!: Ciphertext and The Gold-Bug · See more »
The Magic Words are Squeamish Ossifrage
The text "The Magic Words are Squeamish Ossifrage" was the solution to a challenge ciphertext posed by the inventors of the RSA cipher in 1977.
New!!: Ciphertext and The Magic Words are Squeamish Ossifrage · See more »
Transposition cipher
In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext.
New!!: Ciphertext and Transposition cipher · See more »
Vigenère cipher
The Vigenère cipher is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers based on the letters of a keyword.
New!!: Ciphertext and Vigenère cipher · See more »
Zimmermann Telegram
The Zimmermann Telegram (or Zimmermann Note or Zimmerman Cable) was a secret diplomatic communication issued from the German Foreign Office in January 1917 that proposed a military alliance between Germany and Mexico in the event that the United States entered World War I against Germany.
New!!: Ciphertext and Zimmermann Telegram · See more »
Zodiac Killer
The Zodiac Killer or Zodiac was a serial killer who operated in Northern California from at least the late 1960s to the early 1970s.
New!!: Ciphertext and Zodiac Killer · See more »
Redirects here:
References
[1] https://en.wikipedia.org/wiki/Ciphertext