List of cryptography topics

From Wikipedia, the free encyclopedia

This page aims to alphabetically list articles that are primarily related to cryptography. There is a categorised and (somewhat) annotated list of the same articles in subject groupings at Topics in cryptography; it will probably be more useful to those attempting to make some sense of the field. This page is intended to be useful to those monitoring Wikipedia's coverage of the subject (e.g. for editing or maintenance purposes) by providing an easy way to track changes in the indexed articles by clicking on "Related changes" in the sidebar or the link below:

This list does not necessarily include all cryptography-related articles in the Wikipedia, though there is a concerted effort to keep it so. Nevertheless, if you see an article that should be here, but isn't (or one that shouldn't be here but is), please do update the list accordingly.


Note 1: This page is also being made somewhat redundant by the new category system. See Category:Cryptography and its subcategories.

Note 2: The purpose of the hidden talk page links to each page in this list is so also the talk pages become visible in the related/recent changes.

[edit] See also

Contents: Top - 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


[edit] Digits and symbols

3-D Secure --
3-Way --
40-bit encryption --
5-UCO --

[edit] A

A5/1 --
A5/2 --
ABA digital signature guidelines --
Abraham Sinkov --
Acoustic cryptanalysis --
Adaptive chosen-ciphertext attack --
Adaptive chosen plaintext and chosen ciphertext attack --
ADFGVX cipher --
Adi Shamir --
Advanced Access Content System --
Advanced Encryption Standard --
Advanced Encryption Standard process --
Adversary --
AEAD block cipher modes of operation --
Affine cipher --
Agnes Meyer Driscoll --
AKA (security) --
Akelarre (cipher) --
Alan Turing --
Alastair Denniston --
Al Bhed language --
Alfred Menezes --
Alice and Bob --
All-or-nothing transform --
Alphabetum Kaldeorum --
American Cryptogram Association --
AN/CYZ-10 --
Anonymous internet banking --
Anonymous publication --
Anonymous remailer --
Antoni Palluth --
Anubis (cipher) --
Arlington Hall --
Arne Beurling --
Arnold Cipher --
Arthur Scherbius --
Arvid Gerhard Damm --
Asiacrypt --
Atbash --
Attack model --
Auguste Kerckhoffs --
Authenticated encryption --
Authentication --
Authorization certificate --
Autokey cipher --
Avalanche effect --
AxCrypt --

[edit] B

Babington Plot --
Baby-step giant-step --
Bacon's cipher --
Banburismus --
Bart Preneel --
BATON --
B-Dienst --
Beale ciphers --
Beaufort cipher --
Beaumanor Hall --
Berlekamp-Massey algorithm --
Bernstein v. United States --
BestCrypt --
BID/60 --
BID 770 --
Bifid cipher --
Biometric word list --
Birthday attack --
Bit-flipping attack --
BitTorrent protocol encryption --
Biuro Szyfrów --
Black Chamber --
Blaise de Vigenère --
Bletchley Park --
Blind credential --
Blinding (cryptography) --
Blind signature --
Block cipher --
Block cipher modes of operation --
Block size (cryptography) --
Blowfish (cipher) --
Blum Blum Shub --
Blum-Goldwasser cryptosystem --
Bomba (cryptography) --
Bombe --
Book cipher --
Books on cryptography --
Boomerang attack --
Boris Hagelin --
Bouncy castle (cryptography) --
Broadcast encryption --
Bruce Schneier --
Brute force attack --
Brute Force: Cracking the Data Encryption Standard --
Burrows-Abadi-Needham logic --

[edit] C

C2Net --
C-36 (cipher machine) --
C-52 (cipher machine) --
CAcert.org --
Caesar cipher --
Camellia (cipher) --
Capstone (cryptography) --
Cardan grille --
Card catalog (cryptology) --
CAST-128 --
CAST-256 --
Cayley-Purser algorithm --
CBC-MAC --
CCM mode --
CCMP --
CD-57 --
Cellular Message Encryption Algorithm --
Centiban --
Central Security Service --
Centre for Applied Cryptographic Research --
Certicom --
Certificate authority --
Certificate-based encryption --
Certificateless cryptography --
Certificate revocation list --
Certificate signing request --
Certification path validation algorithm --
Chaffing and winnowing --
Challenge-handshake authentication protocol --
Challenge-response authentication --
CHES --
Chosen-ciphertext attack --
Chosen-plaintext attack --
Cipher disk --
Cipher runes --
CipherSaber --
Cipherspace --
Ciphertext expansion --
Ciphertext indistinguishability --
Ciphertext-only attack --
Ciphertext stealing --
Classical cipher --
Claude Elwood Shannon --
Claw-free permutation --
Cleartext --
Clifford Cocks --
Clipper chip --
Clock (cryptography) --
Clock drift --
CMVP --
Codebook --
Code (cryptography) --
Code talker --
Codress message --
Collision attack --
Collision resistance --
Colossus computer --
Combined Cipher Machine --
Commitment scheme --
Common Scrambling Algorithm --
Communications security --
Communications Security Establishment --
Communication Theory of Secrecy Systems --
Comparison of SSH clients --
Completeness (cryptography) --
Computational Diffie-Hellman assumption --
Computer insecurity --
Computer surveillance --
COMSEC equipment --
Conch (SSH) --
Concrete security --
Conel Hugh O'Donel Alexander --
Confidentiality --
Confusion and diffusion --
Content-scrambling system --
Controlled Cryptographic Item --
Corkscrew (program) --
Correlation immunity --
Covert channel --
Cover (telecommunications) --
Cramer-Shoup cryptosystem --
CRAM-MD5 --
CRHF --
Crib (cryptanalysis) --
CrossCrypt --
Crowds --
Cryptanalysis --
Cryptanalysis of the Enigma --
Cryptanalytic computer --
Cryptarchiver --
Cryptex --
Cryptico --
Crypto AG --
Crypto-anarchism --
CryptoAPI --
Crypto API --
CryptoBuddy --
Cryptochannel --
CRYPTO (conference) --
Cryptogram --
Cryptographically Generated Addresses --
Cryptographically secure pseudorandom number generator --
Cryptographically strong --
Cryptographic Application Programming Interface --
Cryptographic engineering --
Cryptographic hash function --
Cryptographic key types --
Cryptographic Message Syntax --
Cryptographic primitive --
Cryptographic protocol --
Cryptographic Service Provider --
Cryptographie indéchiffrable --
Cryptography --
Cryptography in Japan --
Cryptography newsgroups --
Cryptography standards --
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age --
Cryptologia --
Cryptology ePrint Archive --
Cryptomail --
Cryptomathic --
Cryptome --
Cryptomeria cipher --
Cryptonomicon --
Cryptool --
Crypto-society --
CryptoStick --
Cryptosystem --
Cryptovirology --
CRYPTREC --
CS-Cipher --
Custom hardware attack --
Cyclometer --
Cypherpunk --
Cyrillic Projector --

[edit] D

D'Agapeyeff cipher --
Daniel J. Bernstein --
Data Authentication Code --
Data Encryption Standard --
Datagram Transport Layer Security --
David Chaum --
David Kahn --
David Wagner --
David Wheeler --
Davies-Meyer hash --
DEAL --
Decimal sequences for cryptography --
Decipherment --
Decisional Diffie-Hellman assumption --
Decrypt --
DeCSS --
Defence Signals Directorate --
Degree of anonymity --
Delegated Path Discovery --
Delegated Path Validation --
Deniable encryption --
Derek Taunt --
DES Challenges --
DES supplementary material --
DES-X --
Deterministic encryption --
Dictionary attack --
Differential cryptanalysis --
Differential-linear attack --
Differential power analysis --
Diffie-Hellman key exchange --
Diffie-Hellman problem --
DigiCipher 2 --
Digital Fortress --
Digital rights management --
Digital signature --
Digital Signature Algorithm --
Digital timestamping --
Digital watermarking --
Dilly Knox --
Dining cryptographers protocol --
Diplomatic bag --
Direct anonymous attestation --
Discrete logarithm --
Disk encryption --
Disk encryption hardware --
Disk encryption software --
Distributed.net --
Dmitry Sklyarov --
DomainKeys --
Don Coppersmith --
Dorabella Cipher --
Dragon (cipher) --
DRYAD --
Dvorak encoding --

[edit] E

E0 (cipher) --
E4M --
EAP-AKA --
EAP-SIM --
EAX mode --
ECC patents --
ECHELON --
ECRYPT --
Edouard Fleissner von Wostrowitz --
Edward Hebern --
Edward Scheidt --
Edward Travis --
EFF DES cracker --
Efficient Probabilistic Public-Key Encryption Scheme --
EKMS --
Electronic Communications Act 2000 --
Electronic money --
Electronic signature --
Electronic voting --
ElGamal encryption --
ElGamal signature scheme --
Eli Biham --
Elizebeth Friedman --
Elliptic curve cryptography --
Elliptic Curve Diffie-Hellman --
Elliptic Curve DSA --
Elonka Dunin --
Encrypted filesystem --
Encrypted function --
Encrypted key exchange --
Encrypting File System --
Encryption --
Encryption software --
Enigmail --
Enigma machine --
Enigma rotor details --
Entrust --
Ernst Fetterlein --
eSTREAM --
Étienne Bazeries --
Eurocrypt --
EuroCrypt --
Existential forgery --
Export of cryptography --
Extensible Authentication Protocol --

[edit] F

Fast Software Encryption --
FEAL --
Feistel cipher --
Felix Delastelle --
Fialka --
Filesystem-level encryption --
FileVault --
Fill device --
Financial cryptography --
FIPS 140 --
FIPS 140-2 --
FIREFLY --
Firefly (protocol) --
FISH (cipher) --
Fish (cryptography) --
Floradora --
Fortezza --
Fort George G. Meade --
Fortuna (PRNG) --
Four-square cipher --
Franciszek Pokorny --
Frank A. Stevenson --
Frank Rowlett --
Freenet --
FreeOTFE --
FreeS/WAN --
Frequency analysis --
Friedrich Kasiski --
Fritz-chip --
FROG --
FROSTBURG --
FTP over SSH --
Full disk encryption --
Full Domain Hash --
F. W. Winterbotham --

[edit] G

Garble --
Gardening (cryptanalysis) --
GCHQ CSO Morwenstow --
GDES --
George Blakley --
George Scovell --
GGH encryption algorithm --
GGH signature scheme --
Gilbert Vernam --
GMR (cryptography) --
GNU Privacy Guard --
GnuTLS --
Goldwasser-Micali cryptosystem --
Gordon Welchman --
GOST 28147-89 --
Gost-Hash --
Government Communications Headquarters --
Government Communications Security Bureau --
Grain (cipher) --
Grand Cru (cipher) --
Great Cipher --
Grill (cryptology) --
Grille (cryptography) --
Group signature --
Gustave Bertrand --
Gwido Langer --

[edit] H

H.235 --
HAIPE --
Hans Dobbertin --
Hans-Thilo Schmidt --
Hard-core predicate --
Hardware random number generator --
Hardware Security Module --
Harold Keen --
Harry Hinsley --
Harvest (computer) --
HAS-160 --
Hashcash --
Hash functions based on block ciphers --
Hash list --
Hash tree --
HAVAL --
HC-256 --
HC-9 --
Heath Robinson (codebreaking machine) --
Hebern rotor machine --
Henri Braquenié --
Henryk Zygalski --
Herbert Yardley --
Hidden Field Equations --
High-Bandwidth Digital Content Protection --
Higher order differential cryptanalysis --
Hill cipher --
History of cryptography --
HMAC --
Horst Feistel --
HOTP --
Https --
Hugo Hadwiger --
Hugo Koch --
Hushmail --
Hut 6 --
Hut 8 --
HX-63 --
Hyperelliptic curve cryptography --
Hyper-encryption --

[edit] I

Ian Goldberg --
IBM 4758 --
ICE (cipher) --
ID-based cryptography --
IDEA NXT --
Identification friend or foe --
IEEE 802.11i --
IEEE P1363 --
I. J. Good --
Illegal prime --
Impossible differential cryptanalysis --
Index of coincidence --
Indifferent chosen-ciphertext attack --
Information leakage --
Information theoretic security --
Initialization vector --
Integer factorization --
Integral cryptanalysis --
Integrated Encryption Scheme --
Integrated Windows Authentication --
Interlock Protocol --
International Association for Cryptologic Research --
International Data Encryption Algorithm --
Internet key exchange --
Internet Security Association and Key Management Protocol --
Interpolation attack --
Invisible ink --
IPsec --
Iraqi block cipher --
ISAAC (cipher) --
ISO 19092-2 --
Ivan Damgård --

[edit] J

JADE --
James Gillogly --
James H. Ellis --
Jan Graliński --
Jan Kowalewski --
Java Cryptography Architecture --
Jefferson disk --
Jennifer Seberry --
Jerzy Różycki --
JN-25 --
Joan Daemen --
Johannes Trithemius --
John Herivel --
John Kelsey (cryptanalyst) --
John R. F. Jeffreys --
John Tiltman --
Jon Lech Johansen --
Josef Pieprzyk --
JOSEKI (cipher) --
Joseph Desch --
Joseph Mauborgne --
Joseph Rochefort --
Journal of Cryptology --
Jpegx --

[edit] K

Kasiski examination --
KASUMI (block cipher) --
KCDSA --
KeePass --
Kerberos protocol --
Kerckhoffs' principle --
Key-agreement protocol --
Key authentication --
Key clustering --
Key (cryptography) --
Key derivation function --
Key distribution center --
Key escrow --
Key exchange --
Keyfile --
Key generation --
Key generator --
Key management --
Keymat --
Key schedule --
Key server (cryptographic) --
Key signature (cryptography) --
Keysigning --
Key signing party --
Key size --
Key space --
Key strengthening --
Key whitening --
KG-84 --
KHAZAD --
Khufu and Khafre --
Kiss (cryptanalysis) --
KL-43 --
KL-51 --
KL-7 --
Knapsack problem --
Known-plaintext attack --
KnownSafe --
KOI-18 --
KOV-14 --
Kryha --
Kryptos --
KSD-64 --
KW-26 --
KW-37 --
KY-3 --
KY-57 --
KY-58 --
KY-68 --
KYK-13 --

[edit] L

Lacida --
Lamport signature --
Lars Knudsen --
Laurance Safford --
LCS35 --
Leo Marks --
Leonard Adleman --
Leone Battista Alberti --
Leo Rosen --
Leslie Yoxall --
LEVIATHAN (cipher) --
LEX (cipher) --
Libelle (cipher) --
LibTom Project --
Linear cryptanalysis --
Linear feedback shift register --
Link encryption --
List of cryptographers --
List of cryptographic key types --
List of cryptography topics --
List of encrypting filesystems --
List of famous ciphertexts --
List of people associated with Bletchley Park --
List of SFTP clients --
List of SFTP servers --
LOKI --
LOKI97 --
Lorenz SZ 40/42 --
Louis W. Tordella --
Lucifer (cipher) --

[edit] M

M-209 --
M-325 --
M-94 --
MacGuffin (cipher) --
Madryga --
MAGENTA --
Magic (cryptography) --
Maksymilian Ciężki --
Malcolm J. Williamson --
Malleability (cryptography) --
Man-in-the-middle attack --
Marian Rejewski --
Markovian Parallax Denigrate --
MARS --
Martin Hellman --
MaruTukku --
Massey-Omura cryptosystem --
Matt Blaze --
Max Newman --
McEliece cryptosystem --
MCrypt --
MD2 --
MD4 --
MD5 --
MD5CRK --
MDC-2 --
Mean Shortest Distance --
Meet-in-the-middle attack --
Mental poker --
Mercury (cipher machine) --
Meredith Gardner --
Merkle-Damgård hash function --
Merkle-Hellman --
Merkle's Puzzles --
Message authentication code --
Message forgery --
Message Integrity Code --
MI8 --
MICKEY-128 --
Microdot --
Military Cryptanalysis (book) (William F. Friedman) --
Military Cryptanalytics --
Mimic function --
Mirror writing --
MISTY1 --
Mitsuru Matsui --
MMB --
Mod n cryptanalysis --
MQV --
MS-CHAP --
MUGI --
MULTI-S01 --

[edit] N

National Communications Centre --
National Cryptologic Museum --
National Security Agency --
National Cipher Challenge --
Navajo I --
Neal Koblitz --
Needham-Schroeder --
Negligible function (cryptography) --
NEMA (machine) --
NESSIE --
Network Security Services --
NewDES --
N-Hash --
Nicolas Courtois --
Niels Ferguson --
Nigel de Grey --
Nihilist cipher --
NLFSR --
NOEKEON --
Noreen --
Nothing up my sleeve number --
NSA encryption algorithms --
NSA encryption systems --
NSA in fiction --
NSAKEY --
NSA Suite A --
NSA Suite B --
NTRU Cryptosystems, Inc. --
NTRUEncrypt --
NTRUSign --
Null cipher --
Numbers station --

[edit] O

Oblivious transfer --
OCB mode --
Oded Goldreich --
Off-the-record messaging --
OMI cryptograph --
OMNI (SCIP) --
One-key MAC --
One-time pad --
One-time password --
One-way function --
One-way permutation --
Onion routing --
Online Certificate Status Protocol --
OP-20-G --
OpenSSH --
OpenSSL --
Openswan --
OpenVPN --
Operation Ruthless --
Optimal Asymmetric Encryption Padding --
OTAR --
OTFE --
Otway-Rees --

[edit] P

Padding (cryptography) --
Paillier cryptosystem --
PANAMA --
Passive attack --
Passphrase --
Password --
Password-authenticated key agreement --
Password cracking --
Paul Kocher --
Paulo Pancatuccio --
Paulo S. L. M. Barreto --
PBKDF2 --
PC Bruno --
Perfect forward secrecy --
Perforated sheets --
Permutation cipher --
Peter Gutmann --
Peter Twinn --
PGP Corporation --
PGPDisk --
PGPfone --
Phelix --
Phil Zimmermann --
Photuris (protocol) --
Physical security --
Pig Latin --
Pigpen cipher --
Pike (cipher) --
Piling-up lemma --
Pinwheel (cryptography) --
Piotr Smoleński --
Pirate decryption --
PKC (conference) --
PKCS --
PKIX --
Plaintext --
Plaintext-aware encryption --
Playfair cipher --
Plugboard --
PMAC --
Poem code --
Pohlig-Hellman algorithm --
Point-to-point tunneling protocol --
Poly1305-AES --
Polyalphabetic cipher --
Polybius square --
Portex --
Power analysis --
Preimage attack --
Pre-shared key --
Pretty Good Privacy --
Printer steganography --
Privacy-enhanced Electronic Mail --
Private Communications Technology --
Private information retrieval --
Probabilistic encryption --
Product cipher --
ProjectSCIM --
Proof-of-work system --
Protected Extensible Authentication Protocol --
Provable security --
Proxy re-encryption --
Pseudo-Hadamard transform --
Pseudonymity --
Pseudorandom function --
Pseudorandom number generator --
Public key certificate --
Public-key cryptography --
Public key fingerprint --
Public key infrastructure --
PURPLE --
PuTTY --
Py (cipher) --

[edit] Q

Qrpff --
Quadratic sieve --
Quantum cryptography --
Quantum fingerprinting --

[edit] R

Rabbit (cipher) --
Rabin cryptosystem --
Rabin-Williams encryption --
Rail Fence Cipher --
Rainbow table --
Ralph Merkle --
Random function --
Random number generator attack --
Random oracle --
RC2 --
RC4 --
RC5 --
RC6 --
Reciprocal cipher --
RED/BLACK concept --
REDOC --
Red Pike --
Reflector (cipher machine) --
Regulation of Investigatory Powers Act 2000 --
Reihenschieber --
Rekeying --
Related-key attack --
Replay attack --
Reservehandverfahren --
Residual block termination --
Rijndael key schedule --
Rijndael S-box --
Ring signature --
RIPEMD --
Rip van Winkle cipher --
Robert Morris (cryptographer) --
Robot certificate authority --
Rockex --
Ron Rivest --
Room 40 --
Root certificate --
Ross Anderson --
Rossignols --
ROT13 --
Rotor machine --
RSA --
RSA-100 --
RSA-1024 --
RSA-110 --
RSA-120 --
RSA-129 --
RSA-130 --
RSA-140 --
RSA-150 --
RSA-1536 --
RSA-155 --
RSA-160 --
RSA-170 --
RSA-180 --
RSA-190 --
RSA-200 --
RSA-2048 --
RSA-210 --
RSA-220 --
RSA-230 --
RSA-232 --
RSA-240 --
RSA-250 --
RSA-260 --
RSA-270 --
RSA-280 --
RSA-290 --
RSA-300 --
RSA-309 --
RSA-310 --
RSA-320 --
RSA-330 --
RSA-340 --
RSA-350 --
RSA-360 --
RSA-370 --
RSA-380 --
RSA-390 --
RSA-400 --
RSA-410 --
RSA-420 --
RSA-430 --
RSA-440 --
RSA-450 --
RSA-460 --
RSA-470 --
RSA-480 --
RSA-490 --
RSA-500 --
RSA-576 --
RSA-617 --
RSA-640 --
RSA-704 --
RSA-768 --
RSA-896 --
RSA Factoring Challenge --
RSA problem --
RSA-PSS --
RSA Secret-Key Challenge --
RSA Security --
Rubber-hose cryptanalysis --
Running key cipher --
Russian copulation --

[edit] S

S-1 --
SAFER --
Salsa20 --
Salt (cryptography) --
SAM card --
SAML --
SAVILLE --
Schnorr group --
Schnorr signature --
Schoof-Elkies-Atkin algorithm --
SCIP --
Scott Vanstone --
Scrambler --
Scramdisk --
Scream (cipher) --
Scytale --
Seahorse (software) --
SEAL (cipher) --
SECG --
Secret broadcast --
Secret decoder ring --
Secrets and Lies (Schneier) --
Secret sharing --
Sectéra Secure Module --
Secure Access Module --
Secure channel --
Secure Communication based on Quantum Cryptography --
Secure copy --
Secure cryptoprocessor --
Secure electronic transaction --
Secure hypertext transfer protocol --
SecureIM --
Secure key issuing cryptography --
Secure multiparty computation --
Secure Neighbor Discovery --
Secure Real-time Transport Protocol --
Secure remote password protocol --
Secure Shell --
Secure telephone --
Secure Terminal Equipment --
Secure voice --
SecurID --
Security association --
Security engineering --
Security parameter --
Security protocol notation --
Security through obscurity --
Security token --
SEED --
Self-certifying key --
Self-shrinking generator --
Self-signed certificate --
Semantic security --
Serge Vaudenay --
Serpent (cipher) --
Session key --
SFTPPlus --
SHACAL --
Shafi Goldwasser --
SHA hash functions --
SHARK --
Shrinking generator --
Shugborough House inscription --
Side channel attack --
Siemens and Halske T52 --
SIGABA --
SIGCUM --
SIGINT --
Signals Intelligence Service --
Signcryption --
SIGSALY --
SILC (protocol) --
Silvio Micali --
Simple Authentication and Security Layer --
Simple public key infrastructure --
Simple XOR cipher --
S/KEY --
Skipjack (cipher) --
Slide attack --
Small subgroup confinement attack --
S/MIME --
SMS4 --
Snake oil (cryptography) --
Snefru --
SNOW --
Snuffle --
SOBER-128 --
Solitaire (cipher) --
Solomon Kullback --
SOSEMANUK --
SPEKE (cryptography) --
Square (cipher) --
Ssh-agent --
SSH file transfer protocol --
SSLeay --
Ståle Schumacher Ytteborg --
Station-to-Station protocol --
Statistical cryptanalysis --
Stefan Lucks --
Steganalysis --
Steganography --
Straddling checkerboard --
Stream cipher --
Stream cipher attack --
Strong cryptography --
Strong RSA assumption --
Stuart Milner-Barry --
STU-II --
STU-III --
Stunnel --
StunTour --
Substitution box --
Substitution cipher --
Substitution-permutation network --
Superencryption --
Swedish National Defence Radio Establishment --
Symmetric-key algorithm --
SYSKEY --

[edit] T

Tabula recta --
Taher Elgamal --
Tamper resistance --
Television encryption --
TEMPEST --
Thawte --
The Alphabet Cipher --
The Code Book --
The Codebreakers --
The Gold Bug --
The Magic Words are Squeamish Ossifrage --
Theory of Cryptography Conference --
The world wonders --
Threshold shadow scheme --
TICOM --
Tiger (hash) --
Timeline of cryptography --
Timing attack --
Tiny Encryption Algorithm --
TKIP --
Tommy Flowers --
Topics in cryptography --
Tor (anonymity network) --
Torus-based cryptography --
Traffic analysis --
Traffic-flow security --
Traitor tracing --
Transmission security --
Transport Layer Security --
Transposition cipher --
Trapdoor function --
Trench code --
Trifid cipher --
Triple DES --
Trivium (cipher) --
TrueCrypt --
Trusted third party --
Turing (cipher) --
TWINKLE --
TWIRL --
Twofish --
Two-square cipher --
Type 1 encryption --
Type 2 encryption --
Type 3 encryption --
Type 4 encryption --
Typex --

[edit] U

Ultra --
UMAC --
Undeniable signature --
Unicity distance --
UOWHF --

[edit] V

VENONA project --
Verifiable secret sharing --
VeriSign --
VEST --
VIC cipher --
VideoCrypt --
Vigenère cipher --
Vincent Rijmen --
VINSON --
Virtual private network --
Visual cryptography --
Voynich manuscript --

[edit] W

WAKE --
WAPI --
Watermark (data file) --
Watermarking attack --
Weak key --
Web of trust --
WHIRLPOOL --
Whitfield Diffie --
Wide Mouth Frog --
Wi-Fi Protected Access --
William F. Friedman --
William Montgomery (cryptographer) --
WinSCP --
Wired Equivalent Privacy --
Wireless Transport Layer Security --
World War II cryptography --
W. T. Tutte --

[edit] X

X.509 --
XDH Assumption --
Xiaoyun Wang --
XICE --
XML Encryption --
XML Signature --
XSL attack --
XTEA --
XTR --

[edit] Y

Yarrow algorithm --
Yuliang Zheng --

[edit] Z

Zeroisation --
Zero-knowledge password proof --
Zero-knowledge proof --
Zfone --
ZRTP --
Zimmermann-Sassaman key-signing protocol --
Zimmermann Telegram --