125 relations: Adi Shamir, Algorithm, Algorithmic efficiency, Alice and Bob, ARPANET, Authentication, Authentication protocol, Bitcoin, Books on cryptography, Brute-force attack, CERN, Certificate authority, Charles Babbage Institute, Claude Shannon, Clifford Cocks, Confidentiality, Cramer–Shoup cryptosystem, CRC Press, Cryptographic hash function, Cryptographic protocol, Cryptography, Cryptosystem, Denial-of-service attack, Diffie–Hellman key exchange, Digital currency, Digital signature, Digital Signature Algorithm, Discrete logarithm, ElGamal encryption, Elliptic-curve cryptography, Encryption, Ernest Nagel, Exclusive or, Factorization, Forward secrecy, GNU Privacy Guard, Government Communications Headquarters, Hash function, Hierarchy, History of cryptography, Hybrid cryptosystem, ID-based encryption, Information security, Information technology, Integer factorization, Internet, Internet Engineering Task Force, Internet Key Exchange, James H. Ellis, John Wiley & Sons, ..., Key (cryptography), Key distribution, Key escrow, Key exchange, Key size, Key-agreement protocol, Leonard Adleman, Letter box, Malcolm J. Williamson, Man-in-the-middle attack, Martin Hellman, Massachusetts Institute of Technology, Mathematics, McEliece cryptosystem, Merkle's Puzzles, Merkle–Hellman knapsack cryptosystem, Michael O. Rabin, Modular exponentiation, National Institute of Standards and Technology, National Security Agency, Neal Koblitz, Non-repudiation, NTRUEncrypt, Object identifier, Off-the-Record Messaging, One-time pad, One-way function, Over-the-air rekeying, Padlock, Paillier cryptosystem, Password-authenticated key agreement, PGP word list, PKCS 1, Policy, Pretty Good Privacy, Prime number, Pseudonymity, Public key certificate, Public key fingerprint, Public key infrastructure, Quantum computing, Quantum cryptography, Rabin cryptosystem, Ralph Benjamin, Ralph Merkle, Ron Rivest, RSA (cryptosystem), S/MIME, Seal (emblem), Secure channel, Secure Shell, Session key, Side-channel attack, SILC (protocol), Simple public-key infrastructure, Solomon W. Golomb, Symmetric-key algorithm, Taher Elgamal, The Code Book, Three-pass protocol, Threshold cryptosystem, Tim Berners-Lee, Transport Layer Security, Trapdoor function, Trusted third party, Trusted timestamping, Victor S. Miller, Voice over IP, Web browser, Web of trust, Whitfield Diffie, William Stanley Jevons, X.509, YAK (cryptography), ZRTP. Expand index (75 more) » « Shrink index
Adi Shamir (עדי שמיר; born July 6, 1952) is an Israeli cryptographer.
In mathematics and computer science, an algorithm is an unambiguous specification of how to solve a class of problems.
In computer science, algorithmic efficiency is a property of an algorithm which relates to the number of computational resources used by the algorithm.
Alice and Bob are fictional characters commonly used as placeholder names in cryptology, as well as science and engineering literature.
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP.
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities.
Bitcoin (₿) is the world's first cryptocurrency, a form of electronic cash.
Books on cryptography have been published sporadically and with highly variable quality for a long time.
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.
The European Organization for Nuclear Research (Organisation européenne pour la recherche nucléaire), known as CERN (derived from the name Conseil européen pour la recherche nucléaire), is a European research organization that operates the largest particle physics laboratory in the world.
In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates.
The Charles Babbage Institute is a research center at the University of Minnesota specializing in the history of information technology, particularly the history of digital computing, programming/software, and computer networking since 1935.
Claude Elwood Shannon (April 30, 1916 – February 24, 2001) was an American mathematician, electrical engineer, and cryptographer known as "the father of information theory".
Clifford Christopher Cocks CB FRS (born 28 December 1950) is a British mathematician and cryptographer.
Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits access or places restrictions on certain types of information.
The Cramer–Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions.
The CRC Press, LLC is a publishing group based in the United States that specializes in producing technical books.
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives.
Cryptography or cryptology (from κρυπτός|translit.
In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption).
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
Diffie–Hellman key exchange (DH)Synonyms of Diffie–Hellman key exchange include.
Digital currency (digital money or electronic money or electronic currency) is a type of currency available only in digital form, not in physical (such as banknotes and coins).
A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.
The Digital Signature Algorithm (DSA) is a Federal Information Processing Standard for digital signatures.
In the mathematics of the real numbers, the logarithm logb a is a number x such that, for given numbers a and b. Analogously, in any group G, powers bk can be defined for all integers k, and the discrete logarithm logb a is an integer k such that.
In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie–Hellman key exchange.
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
Ernest Nagel (November 16, 1901 – September 20, 1985) was an American philosopher of science.
Exclusive or or exclusive disjunction is a logical operation that outputs true only when inputs differ (one is true, the other is false).
In mathematics, factorization (also factorisation in some forms of British English) or factoring consists of writing a number or another mathematical object as a product of several factors, usually smaller or simpler objects of the same kind.
In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key agreement protocols that gives assurances your session keys will not be compromised even if the private key of the server is compromised.
GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite.
The Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance to the government and armed forces of the United Kingdom.
A hash function is any function that can be used to map data of arbitrary size to data of a fixed size.
A hierarchy (from the Greek hierarchia, "rule of a high priest", from hierarkhes, "leader of sacred rites") is an arrangement of items (objects, names, values, categories, etc.) in which the items are represented as being "above", "below", or "at the same level as" one another A hierarchy can link entities either directly or indirectly, and either vertically or diagonally.
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago.
In cryptography, a hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem.
ID-based encryption, or identity-based encryption (IBE), is an important primitive of ID-based cryptography.
Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Information technology (IT) is the use of computers to store, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise.
In number theory, integer factorization is the decomposition of a composite number into a product of smaller integers.
The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.
The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).
In computing, Internet Key Exchange (IKE, sometimes IKEv1 or IKEv2, depending on version) is the protocol used to set up a security association (SA) in the IPsec protocol suite.
James Henry Ellis (25 September 1924 – 25 November 1997) was a British engineer and cryptographer.
John Wiley & Sons, Inc., also referred to as Wiley, is a global publishing company that specializes in academic publishing.
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.
In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption.
Key escrow (also known as a “fair” cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys.
Key exchange (also key establishment) is any method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.
In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher).
In cryptography, a key-agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome.
Leonard Adleman (born December 31, 1945) is an American computer scientist.
A letter box, letterbox, letter plate, letter hole, mail slot or mailbox is a receptacle for receiving incoming mail at a private residence or business.
Malcolm John Williamson was a British mathematician and cryptographer.
In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
Martin Edward Hellman (born October 2, 1945) is an American cryptologist, best known for his invention of public key cryptography in cooperation with Whitfield Diffie and Ralph Merkle.
The Massachusetts Institute of Technology (MIT) is a private research university located in Cambridge, Massachusetts, United States.
Mathematics (from Greek μάθημα máthēma, "knowledge, study, learning") is the study of such topics as quantity, structure, space, and change.
In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece.
In cryptography, Merkle's puzzles is an early construction for a public-key cryptosystem, a protocol devised by Ralph Merkle in 1974 and published in 1978.
The Merkle–Hellman knapsack cryptosystem was one of the earliest public key cryptosystems invented by Ralph Merkle and Martin Hellman in 1978.
Michael Oser Rabin (מִיכָאֵל עוזר רַבִּין, born September 1, 1931) is an Israeli computer scientist and a recipient of the Turing Award.
Modular exponentiation is a type of exponentiation performed over a modulus.
The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.
Neal I. Koblitz (born December 24, 1948) is a Professor of Mathematics at the University of Washington.
Non-repudiation refers to a state of affairs where the author of a statement will not be able to successfully challenge the authorship of the statement or validity of an associated contract.
The NTRUEncrypt public key cryptosystem, also known as the NTRU encryption algorithm, is a lattice-based alternative to RSA and ECC and is based on the shortest vector problem in a lattice (which is not known to be breakable using quantum computers).
In computing, object identifiers or OIDs are an identifier mechanism standardized by the International Telecommunications Union (ITU) and ISO/IEC for naming any object, concept, or "thing" with a globally unambiguous persistent name.
Off-the-Record Messaging (OTR) is a cryptographic protocol that provides encryption for instant messaging conversations.
In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a one-time pre-shared key the same size as, or longer than, the message being sent.
In computer science, a one-way function is a function that is easy to compute on every input, but hard to invert given the image of a random input.
Over-the-air rekeying (OTAR) refers to transmitting or updating encryption keys (rekeying) in secure information systems by conveying the keys via encrypted electronic communication channels (“over the air”).
Padlocks are portable locks with a shackle that may be passed through an opening (such as a chain link, or hasp staple) to prevent use, theft, vandalism or harm.
The Paillier cryptosystem, invented by and named after Pascal Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography.
In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party's knowledge of a password.
The PGP Word List ("Pretty Good Privacy word list", also called a biometric word list for reasons explained below) is a list of words for conveying data bytes in a clear unambiguous way via a voice channel.
In cryptography, PKCS #1 is the first of a family of standards called Public-Key Cryptography Standards (PKCS), published by RSA Laboratories.
A policy is a deliberate system of principles to guide decisions and achieve rational outcomes.
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication.
A prime number (or a prime) is a natural number greater than 1 that cannot be formed by multiplying two smaller natural numbers.
Pseudonymity, a word derived from pseudonym, meaning 'false name', is a state of disguised identity.
In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a public key.
In public-key cryptography, a public key fingerprint is a short sequence of bytes used to identify a longer public key.
A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
Quantum computing is computing using quantum-mechanical phenomena, such as superposition and entanglement.
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks.
The Rabin cryptosystem is an asymmetric cryptographic technique, whose security, like that of RSA, is related to the difficulty of factorization.
Ralph Benjamin FRSA (born 17 November 1922) is a British scientist and electrical engineer.
Ralph C. Merkle (born February 2, 1952) is a computer scientist.
Ronald Linn Rivest (born May 6, 1947) is a cryptographer and an Institute Professor at MIT.
RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.
S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key encryption and signing of MIME data.
A seal is a device for making an impression in wax, clay, paper, or some other medium, including an embossment on paper, and is also the impression thus made.
In cryptography, a secure channel is a way of transferring data that is resistant to overhearing and tampering.
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
A session key is a single-use symmetric key used for encrypting all messages in one communication session.
In computer security, a side-channel attack is any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs).
SILC (Secure Internet Live Conferencing protocol) is a protocol that provides secure synchronous conferencing services (very much like IRC) over the Internet.
Simple public key infrastructure (SPKI, pronounced spoo-key) was an attempt to overcome the complexity of traditional X.509 public key infrastructure.
Solomon Wolf Golomb (May 30, 1932 – May 1, 2016) was an American mathematician, engineer, and professor of electrical engineering at the University of Southern California, best known for his works on mathematical games.
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
Taher Elgamal (Arabic: طاهر الجمل) (born 18 August 1955) is an Egyptian cryptographer.
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography is a book by Simon Singh, published in New York in 1999 by Doubleday.
In cryptography, a three-pass protocol for sending messages is a framework which allows one party to securely send a message to a second party without the need to exchange or distribute encryption keys.
In cryptography, a cryptosystem is called a threshold cryptosystem, if in order to decrypt an encrypted message or to sign a message, several parties (more than some threshold number) must cooperate in the decryption or signature protocol.
Sir Timothy John Berners-Lee (born 8 June 1955), also known as TimBL, is an English engineer and computer scientist, best known as the inventor of the World Wide Web.
Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.
A trapdoor function is a function that is easy to compute in one direction, yet difficult to compute in the opposite direction (finding its inverse) without special information, called the "trapdoor".
In cryptography, a trusted third party (TTP) is an entity which facilitates interactions between two parties who both trust the third party; the Third Party reviews all critical transaction communications between the parties, based on the ease of creating fraudulent digital content.
Trusted timestamping is the process of securely keeping track of the creation and modification time of a document.
Victor Saul Miller (born 3 March 1947 in Brooklyn, New York) is an American mathematician at the Center for Communications Research (CCR) of the Institute for Defense Analyses in Princeton, New Jersey, U.S. He received his A.B. in mathematics from Columbia University in 1968, and his Ph.D. in mathematics from Harvard University in 1975.
Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
A web browser (commonly referred to as a browser) is a software application for accessing information on the World Wide Web.
In cryptography, a web of trust is a concept used in PGP, GnuPG, and other OpenPGP-compatible systems to establish the authenticity of the binding between a public key and its owner.
Bailey Whitfield 'Whit' Diffie (born June 5, 1944) is an American cryptographer and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle.
William Stanley Jevons FRS (1 September 1835 – 13 August 1882) was an English economist and logician.
In cryptography, X.509 is a standard that defines the format of public key certificates.
The YAK is a public-key authenticated key agreement protocol, proposed by Feng Hao in 2010.
ZRTP (composed of Z and Real-time Transport Protocol) is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end points in a Voice over Internet Protocol (VoIP) phone telephony call based on the Real-time Transport Protocol.
Assymetric key cryptography, Asymmetric Algorithms, Asymmetric algorithm, Asymmetric cipher, Asymmetric crypto, Asymmetric cryptography, Asymmetric cryptosystem, Asymmetric cypher, Asymmetric encryption, Asymmetric key, Asymmetric key algorithm, Asymmetric key algorithms, Asymmetric key cryptography, Asymmetric key encryption, Asymmetric key encryption algorithm, Asymmetric-key algorithm, Asymmetric-key cryptography, Asymmetric-key cryptosystem, Asynchronous encryption, Key Pair, Key pair, Key pairs, Keypair, Keypair cryptography, Non-secret encryption, Private Key Encryption, Private key, Private key encryption, PubKey, Public Key Cryptography, Public Key Encryption, Public encryption key, Public key, Public key algorithm, Public key cryptography, Public key cryptosystem, Public key crytography, Public key encryption, Public key encyption, Public key pair, Public-key, Public-key cryptosystem, Public-key encryption, Public-key encrytption, Public/private key cryptography, Secret-key, Tux.key.