digplanet beta 1: Athena
Share digplanet:

Applications of cryptography

Classical cryptography

Cryptographers

Cryptographic algorithms

Cryptographic attacks

Cryptographic hardware

Cryptographic primitives

Cryptographic protocols

Cryptographic software

Cryptography contests

Cryptography law

Cryptography lists and comparisons

Cryptography organizations

Cryptography publications

Cryptography standards

Cryptologic education

Disk encryption

History of cryptography

Key management

Kleptography

Post-quantum cryptography

Public-key cryptography

Quantum cryptography

Randomness

Steganography

Symmetric-key cryptography

Theory of cryptography

 

Agriculture

Applied sciences

Arts

Belief

Business

Chronology

Culture

Education

Environment

Geography

Health

History

Humanities

Language

Law

Life

Mathematics

Nature

People

Politics

Science

Society

Technology

The main article for this category is Cryptography.

Cryptography is, traditionally, the study of ways to convert information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge — the practice of encryption. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, the field of cryptography has expanded its remit. Examples include schemes like digital signatures and digital cash, digital rights management for intellectual property protection, and securing electronic commerce. Cryptography is now often built into the infrastructure for computing and telecommunications; users may not even be aware of its presence.

Portals

Cryptography

    

Sections

Applications of cryptography

Classical cryptography

Cryptographers

Cryptographic algorithms

Cryptographic attacks

Cryptographic hardware

Cryptographic primitives

Cryptographic protocols

Cryptographic software

Cryptography contests

Cryptography law

Cryptography lists and comparisons

Cryptography organizations

Cryptography publications

Cryptography standards

Cryptography stubs

Cryptologic education

Disk encryption

History of cryptography

Key management

Kleptography

Post-quantum cryptography

Public-key cryptography

Quantum cryptography

Randomness

Steganography

Symmetric-key cryptography

Theory of cryptography

  

Pages

6th Special Security Communications Team (United States)

Accumulator (cryptography)

Anonymous matching

Array controller based encryption

Atlantic City algorithm

BREACH (security exploit)

Backdoor (computing)

Batch cryptography

Bcrypt

Blacker (security)

Blind credential

Blinding (cryptography)

Bus encryption

CRIME

Cipher

Ciphertext

Ciphertext expansion

Civision

Client-side encryption

Code (cryptography)

Code word

Codebook

Codress message

Cohen's cryptosystem

Communications security

Comparison of cryptographic hash functions

Completeness (cryptography)

Computer security

Concrete security

Conjugate coding

Convergent encryption

Correlation immunity

Cover (telecommunications)

Cover-coding

Critical Security Parameter

CrySyS Lab

CrypTool

Cryptanalysis

CryptoParty

Cryptochannel

Cryptographic High Value Product

Cryptographic Module Testing Laboratory

Cryptographic Service Provider

Cryptographic engineering

Cryptographic hash function

Cryptographic nonce

Cryptography

Cryptosystem

Cryptovirology

Cypherpunks (book)

Data at Rest

Data in Use

Database encryption

Decipherment

Deniable encryption

Designated verifier signature

Digital credential

Digital signature forgery

Dining cryptographers problem

Diplomatic bag

Direct Anonymous Attestation

Discrete logarithm

EFF DES cracker

Electronic signature

Encrypted function

Encryption

End-to-end encryption

Enigma machine

Entropic security

Ephemeral key

Export of cryptography from the United States

Factorization of polynomials over finite fields

Feedback with Carry Shift Registers

Floradora

Forking lemma

Forward anonymity

Frederick Edward Hulme

Friend-to-friend

Fully undetectable

Functional encryption

Generic group model

Geometric cryptography

Group key

HTTP Strict Transport Security

Hardware random number generator

HashClash

Honey Encryption

Hybrid cryptosystem

Hyper-encryption

Index of coincidence

Information leakage

Initialization vector

Jötunvillur

KY-7

Kerckhoffs's principle

Key (cryptography)

Key Ceremony

Key number method

Keyring (cryptography)

Kiss (cryptanalysis)

Knapsack problem

Lattice-based cryptography

Learning with errors

Length extension attack

Letter frequency

MDS matrix

Malleability (cryptography)

Master/Session

Mean Shortest Distance

Mental poker

Mimic function

Mix network

Mulabhadra

Multiple encryption

Musical cryptogram

NIPRNet

Naor-Reingold Pseudorandom Function

Neil Leslie Webster

Noisy-storage model

Non-commutative cryptography

Normal basis

Nothing up my sleeve number

Off-line Root CA

One-time pad

One-way function

Outline of cryptography

PGP word list

PKIoverheid

Padding (cryptography)

Passphrase

Password Authenticated Key Exchange by Juggling

Password psychology

Password strength

Password-based cryptography

Pizzino

Plaintext

Polygraphic substitution

Post-quantum cryptography

PrivateCore

Privilege Management Infrastructure

Proof-of-stake

Proof-of-work system

Protocol composition logic

Provable security

Proxy re-encryption

Pseudorandom ensemble

Pseudorandom generator

Quantum Byzantine agreement

Quantum cryptography

Quantum key distribution

Randomness

Red/black concept

S/MIME

SFINKS

SIGINT Activity Designator

SIPRNet

SPKAC

Sacher hexachord

Salt (cryptography)

Scrambler

Secure Hash Algorithm

Secure Hash Standard

Secure cryptoprocessor

Secure voice

Security association

Security engineering

Security parameter

Security through obscurity

Self-shrinking generator

Server gated cryptography

Server-based signatures

Signals intelligence

Signatures with efficient protocols

Snake oil (cryptography)

SnapTag

Software token

Standard model (cryptography)

Statistically close

Strong cryptography

Strong secrecy

Subliminal channel

Superincreasing sequence

Symmetric Boolean function

TRESOR

Tamper resistance

Texas Instruments signing key controversy

Thawte Crypto Challenge

Tokenization (data security)

Trace Zero Cryptography

Transmission security

Trapdoor function

Trusted Computing

Trusted third party

Two-way security

Undeniable signature

Unicity distance

Unknown key-share attack

Variably Modified Permutation Composition

Verifiable secret sharing

Visual cryptography

Vocoder

Voice inversion

Vormetric

WYSIWYS

X.1035

YAK (cryptography)

Yao's test

   

Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Category:Cryptography — Please support Wikipedia.
This page uses Creative Commons Licensed content from Wikipedia. A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
45855 videos foundNext > 

Cryptography 101 - The Basics

In this video we cover basic terminology in cryptography, including what is a ciphertext, plaintext, keys, public key crypto, and private key crypto.

Lecture 1: Introduction to Cryptography by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com. The book chapter "Introduction" for this video is also available ...

Public Key Cryptography - Computerphile

Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography note1: Yes, it should have been 'Obi...

Theory and Practice of Cryptography

Google Tech Talks November, 28 2007 Topics include: Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and...

Public Key Cryptography: Diffie-Hellman Key Exchange

Diffie-Hellman key exchange was one of the earliest practical implementations of key exchange within the field of cryptography. It relies on the discrete log...

James Lyne: Cryptography and the power of randomness

James Lyne is the Director of Technology Strategy at Sophos, a research firm concerned with cyber security. He works with law enforcement and other defense o...

CISSP Training - Cryptography

PalaestraTraining.com This video on Cryptography (Part 1 of 3) is part of our CISSP certification Training Series. (ISC)2 CISSP certification is one of the t...

Cryptography: Unbroken Codes

While cryptography has progressed by leaps and bounds, some codes still haven't been broken. Tune in to learn more about some of history's strangest unbroken...

Public Key Cryptography: Secrecy in Public │ Professor Raymond Flood │

Public Key Cryptography Secrecy in Public Professor Raymond Flood Public Key Cryptography: Secrecy in Public - Professor Raymond Flood 13:00 Tuesday 22nd Oct...

Information Security—Before & After Public-Key Cryptography

[Recorded Jan 26, 2005] Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through the 20t...

45855 videos foundNext > 

We're sorry, but there's no news about "Cryptography" right now.

Loading

Oops, we seem to be having trouble contacting Twitter

Talk About Cryptography

You can talk about Cryptography with people all over the world in our discussions.

Support Wikipedia

A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia!