Cipher/Related Articles: Difference between revisions
< Cipher
Jump to navigation
Jump to search
imported>Sandy Harris (Advanced Encryption "System" corrected to "Standard") |
imported>Sandy Harris (move some things from subtopic to related topics) |
||
Line 9: | Line 9: | ||
==Subtopics== | ==Subtopics== | ||
{{r|Advanced Encryption Standard}} | {{r|Advanced Encryption Standard}} | ||
{{r|Block cipher}} | {{r|Block cipher}} | ||
{{r|Caesar cipher}} | {{r|Caesar cipher}} | ||
Line 15: | Line 14: | ||
{{r|Enigma machine}} | {{r|Enigma machine}} | ||
{{r|Feistel cipher}} | {{r|Feistel cipher}} | ||
{{r|One-time pad}} | {{r|One-time pad}} | ||
{{r|Playfair cipher}} | {{r|Playfair cipher}} | ||
{{r|Polyalphabetic substitution}} | {{r|Polyalphabetic substitution}} | ||
{{r|PURPLE machine}} | {{r|PURPLE machine}} | ||
{{r|Stream cipher}} | {{r|Stream cipher}} | ||
==Other related topics== | ==Other related topics== | ||
{{r|Symmetrical cryptosystem}} | |||
{{r|Asymmetrical cryptosystem}} | |||
{{r|Key management (cryptography)}} | |||
{{r|Code (cryptography)}} | {{r|Code (cryptography)}} | ||
{{r|Communications intelligence}} | {{r|Communications intelligence}} | ||
Line 31: | Line 31: | ||
{{r|Federal Agency for Government Communications & Information}} | {{r|Federal Agency for Government Communications & Information}} | ||
{{r|Hash (computing)}} | {{r|Hash (computing)}} | ||
{{r|Pretty Good Privacy}} | |||
{{r|Government Communications Headquarters}} | {{r|Government Communications Headquarters}} | ||
{{r|Government Communications Security Bureau}} | {{r|Government Communications Security Bureau}} | ||
{{r|National Security Agency}} | {{r|National Security Agency}} | ||
{{r|ULTRA}} | {{r|ULTRA}} |
Revision as of 01:39, 26 October 2008
- See also changes related to Cipher, or pages that link to Cipher or to this page or whose text contains "Cipher".
Parent topics
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Information theory [r]: Theory of the probability of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to transmission failure, distortion, and accidental additions. [e]
Subtopics
- Advanced Encryption Standard [r]: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
- Block cipher [r]: A symmetric cipher that operates on fixed-size blocks of plaintext, giving a block of ciphertext for each [e]
- Caesar cipher [r]: One of the first ciphers, developed by Julius Caesar [e]
- Data Encryption Standard [r]: A block cipher specification issued by the U.S. government in 1976, intended for sensitive but unclassified data. It is now obsolescent, succeeded by the Advanced Encryption Standard, but still used in commercial systems. [e]
- Enigma machine [r]: The primary high-security cryptographic communications security machine of Nazi Germany. Unknown to the Germans, it had been substantially cryptanalyzed by the British Government Code and Cipher School, with French, Polish, and U.S. help. [e]
- Feistel cipher [r]: Add brief definition or description
- One-time pad [r]: A cipher system in which the cryptographic key, i.e. the secret used to encrypt and decrypt messages, is a sequence of random values, each one of which is only ever used once, and only to encrypt one particular letter or word. [e]
- Playfair cipher [r]: Add brief definition or description
- Polyalphabetic substitution [r]: Add brief definition or description
- PURPLE machine [r]: Add brief definition or description
- Stream cipher [r]: A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step. [e]
- Symmetrical cryptosystem [r]: Add brief definition or description
- Asymmetrical cryptosystem [r]: Add brief definition or description
- Key management (cryptography) [r]: Add brief definition or description
- Code (cryptography) [r]: A means of substituting, for the linguistically meaningful symbols of plaintext composed of words or other symbols meaningful to humans, into inherently meaningless numbers, letters, or words that make no sense to a recipient who is not in possession of a codebook or other means of reversing the substitution of symbols [e]
- Communications intelligence [r]: Add brief definition or description
- Communications security [r]: Add brief definition or description
- Communications Security Establishment [r]: The Canadian government organization responsible for communications security and signals intelligence [e]
- Federal Agency for Government Communications & Information [r]: Add brief definition or description
- Hash (computing) [r]: Add brief definition or description
- Pretty Good Privacy [r]: Add brief definition or description
- Government Communications Headquarters [r]: Add brief definition or description
- Government Communications Security Bureau [r]: Add brief definition or description
- National Security Agency [r]: Add brief definition or description
- ULTRA [r]: Add brief definition or description