User:Matt Crypto/CryptoStats/ArticleHits
From Wikipedia, the free encyclopedia
<
User:Matt Crypto
| CryptoStats
Rank
Article
Hits
Size (bytes)
Redirects
Images
1
Enigma machine
6535
32450
Naval Engima
--
Enigma code machine
--
Enigma (machine)
--
ENIGMA
--
Enigma cryptography machine
--
Enigma code
--
Enigma cipher machine
--
Enigma cypher machine
--
Enigma cipher
--
Enigma cypher
--
Naval Enigma
--
Enigma Machine
Image:Enigma ratchet.png
Image:Enigma rotor exploded view.png
Image:Enigma rotor set.png
Image:Enigma-action.png
Image:Enigma-logo.jpg
Image:Nsa-enigma-exhibit.jpg
Image:Nsa-enigma.jpg
Image:Scherbius-1928-patent.png
Image:empty-plugboard.jpg
Image:enigma-rotors.jpg
Image:four-rotor-enigma.jpg
Image:rotor-assembly.jpg
Image:rotors-through-window.jpg
2
Cryptanalysis of the Enigma
1993
22520
Image:Bombe-wh.700px.jpg
Image:enigma-baldwin.jpg
3
Cryptanalysis
1993
18187
CryptanalysiS
--
Cryptanalytic
--
Cryptoanalysis
--
Codebreaking
--
Codebreaker
--
Cryptanalyst
--
Code-breaking
--
Cryptanalysts
Image:Al-kindi-cryptanalysis.png
Image:Bombe-wh.700px.jpg
Image:Zimmermann-telegramm-offen.jpg
4
Alan Turing
1579
15031
Turing, A.M.
--
Alan Mathison Turing
Image:Alan Turing Memorial Closer.jpg
Image:Alan Turing.jpg
Image:Bombe-wh.700px.jpg
Image:Turing_Plaque.jpg
5
History of cryptography
1450
20091
6
ECHELON
1322
13300
EcheloN
--
Eschelon
7
Cryptography
1290
17810
CryptologY
--
CryptographY
--
Cryptology
--
CryptographY/Hashfunctions
--
Cryptographic
--
Codes and ciphers
--
Decrypting
--
Crypto
--
Data encryption
--
Cyptography
8
Digital rights management
1255
24954
Digital Rights Management
--
Digital-rights management
--
Digital restrictions management
--
Digital Restrictions Management
9
MD5
1059
7679
Md5
--
MD5 - A Message Digest Algorithm
--
Md5sum
Image:MD5.png
10
RSA
986
13207
RSA Cryptosystem
11
Bombe
786
6929
Image:Bombe-wh.700px.jpg
Image:US-bombe.jpg
12
Steganography
766
11798
Secret writing
--
Stegonagraphy
--
Stegotext
Image:StenographyOriginal.png
Image:StenographyRecovered.png
13
Encryption
668
4549
CipheR
--
Cipher
--
Cyphertext
--
Ciphertext
--
Cipher text
--
Decryption
--
Encryption key
--
Encryption algorithm
--
Codetext
--
Encrypt
--
Encrypted
--
Encipher
Image:Cipher-taxonomy.png
14
Ultra
580
26381
UltrA
--
Ultra secret
--
ULTRA
15
Bletchley Park
525
9696
Bletchley Park Museum
--
Station X
Image:Bletchleypk.700px.jpg
16
Blowfish (cipher)
487
6891
Blowfish encryption algorithm
Image:BlowfishDiagram.png
Image:BlowfishFFunction.png
17
Colossus computer
480
9965
Colossus (computer)
Image:colossus.jpg
18
National Security Agency
432
11249
NSA
--
Armed Forces Security Agency
--
AFSA
--
No such agency
--
The Puzzle Palace
Image:National_Security_Agency_seal.png
Image:NSAHQ.jpg
19
Advanced Encryption Standard
431
10743
AES
--
Rijndael
--
Rijndael encryption algorithm
20
Data Encryption Standard
421
29907
DataEncryptionStandard
--
Data Encryption Algorithm
--
DES
Image:Board300.jpg
Image:DES-f-function.png
Image:DES-key-schedule.png
Image:DES-main-network.png
21
Quantum cryptography
414
16077
Quantum Cryptography
22
Topics in cryptography
409
18271
Topics in Cryptography
23
Cryptographic hash function
403
9408
Message digest
--
Cryptographic hash
--
Cryptographic message digest
--
One-way hash
--
Modification Detection Code
Image:Merkle-damgard.png
24
Cryptonomicon
384
3079
Neal Stephenson/Cryptonomicon
25
Wi-Fi Protected Access
376
3319
26
Digital signature
357
11899
Digital signatures
--
Digitally Signed
--
Cryptographic signature
27
One-time pad
342
18815
OneTimePads
--
One time pads
--
One time pad
--
Vernam cipher
28
Block cipher
328
4828
Codebook algorithm
Image:Decryption.png
Image:Encryption.png
29
Zimmermann Telegram
325
9474
Zimmermann telegram
--
Zimmerman telegram
--
Zimmerman Note
--
The Zimmermann Telegram
Image:Zimmermann-telegramm-offen.jpg
Image:Ztel1b.jpg
Image:Ztel2.jpg
30
Integer factorization
324
7283
Prime factorization
--
Prime factorisation
--
Prime decomposition
--
Integer factorization problem
--
Integer factorisation
31
HTTPS
324
2053
Https
32
Rotor machine
323
12564
Rotor cypher machine
33
X.509
320
4415
34
Brute force attack
319
3623
Combinatorial explosion
35
Triple DES
315
2454
3DES
--
Triple-DES
36
DeCSS
313
8286
DeCSS source code
--
Decss
Image:DeCSS.PNG
37
Birthday attack
312
3250
38
Public-key cryptography
298
7275
Private key
--
Public key
--
Public key cryptography
--
Asymmetric key cryptography
--
Public key encyption
--
Public key crytography
--
Public key encryption
--
Public-key encryption
--
Public-key
--
PKC
--
Non-secret encryption
39
Frequency analysis
286
7354
40
Substitution cipher
274
18038
Substitution ciphers
--
Substitution alphabet
--
Letter-substitution cipher
--
Simple substitution cipher
--
Monoalphabetic substitution cipher
Image:ROT13.png
41
Asymmetric key algorithm
267
7622
Asymmetric Algorithms
--
Asymmetric algorithm
--
Public key algorithm
--
Asymmetric key
--
Asymmetric key encryption algorithm
--
Asymmetric key encryption
--
Asymmetric cryptography
42
Authentication
264
4953
Authenticate
43
ROT13
262
14597
Rot13
--
ROT-13
--
ROT-47
--
Rot47
--
Rot-13
--
Rot-47
--
ROT47
--
ROT 13
--
ROT26
--
Double ROT13
--
Ebg13
--
Memfrob
--
Furrfu
Image:Pan.png
Image:ROT13.png
44
Kerberos (protocol)
247
4528
45
Elliptic curve cryptography
241
6894
Elliptical Curve Cryptography
46
Pseudorandom number generator
238
6097
Pseudorandom number generators
--
Pseudo-random number generator
--
Pseudorandom sequence
--
PRNG
--
Pseudo Random
--
Pseudo-random
--
Pseudo-randomness
47
Stream cipher
231
2999
Key stream
--
Combiner-type algorithm
48
RC4
230
9179
RC4 Cipher
--
ARCFOUR
--
RC4 cipher
--
RC4 (cipher)
Image:RC4.png
49
Kryptos
219
3030
Image:Pd cia krypt-lg.jpg
50
Symmetric key algorithm
216
1699
Symmetric Algorithms
--
Symmetric algorithm
--
Symmetric key
--
Symmetric encryption
--
Symmetric key cryptography
--
Symmetric cypher
--
Shared key
--
Symmetric cipher
51
Claude E. Shannon
216
5503
Claude Shannon
--
Claude Elwood Shannon
52
Transport Layer Security
207
5380
Secure Sockets Layer
--
Transport Layer Security Protocol
--
Transport layer security
--
Secure Socket Layer
53
Bomba (cryptography)
202
3402
54
Electronic voting
198
16364
E-voting
--
EVoting
--
E voting
--
Computer voting
--
Electronic Voting
--
Online voting
--
Paper trail
55
List of cryptography topics
196
33375
List of cryptology topics
56
International Data Encryption Algorithm
194
4461
IDEA encryption algorithm
--
IDEA (cipher)
--
Idea encryption
57
Differential cryptanalysis
192
4864
Differential attack
58
Caesar cipher
188
7402
Shift cipher
--
Caesar shift cipher
--
Caesar cypher
59
Typex
186
4242
Type X
--
TypeX
60
Marian Rejewski
185
4990
61
Hardware random number generator
180
21945
True random number generator
--
Random device
--
Entropy pool
--
TRNG
--
True Random Number Generator
62
Perforated sheets
179
1010
Zygalski sheets
--
Perforated sheet
63
TEMPEST
178
4065
Van Eck Phreaking
--
Emission security
--
Van Eck radiation
--
Emissions security
--
EMSEC
64
Numbers station
171
3510
Numbers stations
--
Number station
65
Crypto-anarchism
168
4574
Crypto-anarchy
66
Man in the middle attack
167
2950
Man-in-the-middle attack
--
Man in the middle
--
MITM
67
Block cipher modes of operation
165
5509
Electronic codebook
--
Cipher-block chaining
--
Cipher feedback
--
Output feedback
--
Counter mode
--
Modes of operation
--
Block cipher mode of operation
68
Password cracking
164
10256
69
Password
164
15629
Passcode
70
VENONA project
160
9320
VENONA
--
Venona
--
VENONA Project
--
Venona project
--
Venona Project
71
Twofish
156
1747
Twofish encryption algorithm
72
Information security
156
4644
Information systems security
--
Information assurance
--
INFOSEC
--
It security
73
Atbash
156
911
Atbash cipher
--
Atbash cypher
74
Digital Signature Algorithm
155
2167
DSA
75
Code talkers
152
5603
Codetalker
--
Navajo code
--
Codetalkers
Image:Navaho-enlistment-letter-page01.jpg
Image:Navaho-enlistment-letter-page02.jpg
76
Public key infrastructure
151
9476
PKI
--
Public Key Infrastructure
--
Pki
77
Codebook
145
950
Code book
Image:codebook.jpg
78
Cryptographically secure pseudo-random number generator
144
5972
CSPRNG
79
Certificate authority
144
3173
Certificate Authority
80
Cypherpunk
143
1621
Cypherpunks
81
Polyalphabetic cipher
142
4159
Polyalphabetic substitution
82
Knapsack problem
139
2223
0/1 knapsack problem
83
Adi Shamir
135
2830
Image:Adi-shamir.jpg
Image:Adi-shamir.jpg
84
Skipjack (cipher)
134
3692
Skipjack encryption algorithm
85
Secure shell
134
3626
SSH
--
Secure Shell
--
Ssh
86
Transposition cipher
133
7779
Transposition (cryptography)
--
Columnar disposition
--
Transposition (cipher)
87
Pretty Good Privacy
133
28570
PrettyGoodPrivacy
--
PGP
--
Pgp
88
Meet-in-the-middle attack
129
2170
89
Key (cryptography)
128
7368
CryptographY/Keys
--
Cryptography/Key
--
Secret key
--
Cryptographic keys
--
Cryptographic key
90
RIPEMD
126
2604
RIPEMD-160
91
Illegal prime
126
3745
Illegal prime number
Image:DeCSS.PNG
Image:Illegal Prime.PNG
92
Blum Blum Shub
126
2513
Blum Blum Shub generator
93
Fritz-chip
124
11332
94
Scytale
123
4652
Skytale
95
Invisible ink
123
3893
96
Advanced Encryption Standard process
121
2512
AES process
--
AES competition
--
AES contest
--
Advanced Encryption Standard competition
--
AES candidate
97
Deniable encryption
119
2060
Deniable Encryption
98
Voynich manuscript
117
38042
Voynich Manuscript
--
Voynich
--
Voynich MS
Image:f34r.jpg
Image:f75r.jpg
Image:f78r.jpg
Image:voynich.png
99
Rabin cryptosystem
117
10488
100
Plaintext
115
5249
101
National Cryptologic Museum
114
545
National cryptologic museum
Image:National-cryptologic-museum.jpg
102
Confidentiality
114
2056
Data confidentiality
103
Weak key
113
3961
104
Diffie-Hellman key exchange
113
9947
Diffie-Hellman
--
Diffie Hellman
--
Diffie-Hellman-Merkle key exchange
--
Diffie-Hellman-Merkle
--
Diffie-Hellman key agreement
105
Content-scrambling system
112
2426
Content Scrambling System
--
Content scrambling system
106
RC2
110
3383
107
Geheimfernschreiber
110
3255
STURGEON (cryptography)
Image:STURGEON.jpg
108
Security engineering
107
2579
109
SIGABA
106
9000
Sigaba
--
ECM Mark II
Image:SIGABA-patent.png
Image:Sigaba.jpg
Image:Sigaba2.jpg
110
Public key certificate
105
4773
Digital certificate
--
Digital Certificate
--
Identity certificate
--
Digital identity certificate
111
XSL attack
103
9990
Image:New-sci-xsl.png
112
Security through obscurity
103
8332
Security by obscurity
113
Autokey cipher
103
3820
114
Magic (cryptography)
101
12477
Magic cryptography
115
ElGamal discrete log cryptosystem
101
2938
Elgamal discrete logarithm cryptosystem
--
El Gamal discrete log cryptosystem
--
ElGamal
--
El Gamal
--
Elgamal
--
Elgamal discrete log cryptosystem
116
Dmitry Sklyarov
99
2832
Dmitri Sklyarov
--
Dimitri Sklyarov
--
Dimitri Skylarov
--
Sklyarov
--
Dimitry Sklyarov
--
Dimitry Sklyarov
--
Dimitry Sklyarov
117
SHA family
96
10977
SHA
--
SHA1
--
SHA-256
--
SHA-384
--
SHA-512
--
SHA-1
--
Secure Hash Algorithm family
--
Secure Hash Algorithm
--
SHA-0
--
SHA512
Image:SHA-1.png
118
EFF DES cracker
96
3960
Deep Crack
--
Deep crack
--
DES cracker
Image:Board300.jpg
Image:Chip300.jpg
119
SIGINT
95
2944
Signals intelligence
--
Sigint
--
Signals Intelligence
--
Signal intelligence
120
RSA number
93
13287
RSA numbers
121
Key size
93
8328
Cryptography/key length
--
Cryptographic key length
--
Key length
122
RC5
92
2767
RC5 cipher
--
RC5 encryption algorithm
Image:RC5-round.png
123
Collision attack
92
348
124
Alice and Bob
92
4303
Characters in cryptography
125
OpenSSL
91
970
Openssl
126
Web of trust
90
6797
Web of Trust
127
The Gold Bug
90
2121
128
Digital Fortress
90
1184
129
Crib
90
1334
Cribbing
130
SEED
89
419
SEED (cipher)
131
Beale ciphers
89
6121
Beale Ciphers
132
Linear cryptanalysis
88
1758
133
S/MIME
87
902
Smime
--
SMIME
134
Pseudonymity
87
2790
135
SSH file transfer protocol
86
1672
Secure file transfer program
136
OpenSSH
85
3512
Openssh
137
802.11i
85
1135
IEEE 802.11i
--
WEP2
--
WPA2
138
MD4
84
1360
139
Electronic money
84
1651
Digital cash
--
EFT
--
Electronic cash
140
Cryptographic protocol
84
1514
Cyptographic protocol
--
Security protocol
141
Code (cryptography)
84
7701
Codetext
142
Adversary
84
1877
143
XTEA
83
4138
144
Discrete logarithm
83
2293
Discrete log problem
--
Discrete logarithm problem
--
Discrete logarithms
--
Discrete log
145
Anonymous remailer
83
14590
Anonymous Remailer
--
Remailer
146
OpenPGP
82
688
RFC 2440
147
MD5CRK
82
2781
Image:Aboutmd5_sm.png
148
Traffic analysis
81
7292
149
Computer surveillance
80
7294
150
Communications Security Establishment
80
2100
151
Preimage attack
79
382
152
MI8
78
1266
153
Bruce Schneier
78
2342
Schneier
154
Decipherment
77
1480
Decipher
--
Decypher
155
Ron Rivest
76
2132
Rivest
--
Ronald Rivest
--
Ronald L. Rivest
Image:Ron_Rivest.jpg
156
Linear feedback shift register
76
2242
LFSR
157
Secret sharing
75
10531
Key splitting
158
GNU Privacy Guard
75
6251
Gnu Privacy Guard
--
GPG
--
GnuPG
--
Gnupg
--
GNUPG
Image:GNUPG_logo.png
159
Confusion and diffusion
75
1716
Diffusion (cryptography)
--
Confusion (cryptography)
--
Diffusion and confusion
160
Avalanche effect
75
1879
Avalanche (cryptography)
161
The Magic Words are Squeamish Ossifrage
73
2685
Squeamish ossifrage
162
TKIP
71
1195
163
Defence Signals Directorate
71
943
164
Wikipedia:WikiProject Cryptography
70
12011
User:Matt Crypto/prop
--
Wikipedia:WikiProject Cryptology
165
TICOM
70
1185
166
RC6
70
1421
RC6 cipher
--
RC6 encryption algorithm
167
List of famous ciphertexts
70
548
Famous ciphertexts
168
Cryptogram
70
1215
169
KL-7
69
3814
Image:KL-7.afca-museum.jpg
170
IPsec
69
8845
RFC 2401
--
IPSEC
--
Authentication Header
--
Encapsulating Security Payload
--
IPSec
--
IPsec implementations
171
William F. Friedman
68
11954
William Friedman
--
William Frederick Friedman
--
Wolfe Frederick Friedman
Image:Friedman pic.jpg
172
Khufu and Khafre
68
4898
Khafre (cipher)
--
Khufu (cipher)
173
Replay attack
67
1595
174
Initialization vector
67
1874
Initialisation vector
175
FISH (cryptography)
67
1311
176
Dictionary attack
67
2734
177
Computer insecurity
67
13931
178
Polybius square
66
3213
179
Lucifer (cipher)
65
3954
Lucifer cipher
180
Export of cryptography
65
11772
181
Feistel cipher
64
3491
Feistel network
--
Feistel scheme
--
Feistel
182
Classical cipher
64
800
Classical cryptography
183
Block size (cryptography)
64
2183
184
A5/1
64
7257
A5 (cryptography)
Image:A5-1.png
185
Substitution-permutation network
63
1087
SP-network
--
SPN
--
Substitution-Permutation network
186
Hebern rotor machine
63
6767
Hebern Rotor Machine
Image:Hebern-patent.png
187
Quadratic sieve
62
11164
Multiple Polynomial Quadratic Sieve
188
Johannes Trithemius
62
4041
Image:Polygraphiae.jpg
189
Leone Battista Alberti
61
5229
Leone Battista Alrerti
--
Leon Battista Alberti
--
Alberti, Leone Battista
--
Leone Alberti
190
Chosen plaintext attack
61
2016
Chosen plaintext
--
Chosen-text attack
--
Chosen-plaintext attack
--
Chosen-plaintext
--
Adaptive chosen-plaintext attack
--
Adaptive chosen plaintext attack
191
Zero-knowledge proof
60
6332
Zero knowledge proof
--
Zero-knowledge
192
Chaffing and winnowing
60
716
193
Dorabella Cipher
59
490
Image:Dorabella.gif
194
Tiger (hash)
58
731
Tiger hash function
--
Tiger (cryptography)
195
Government Communications Headquarters
58
4047
GCHQ
--
GC&CS
--
Government Code and Cypher School
--
Government Code and Cipher School
--
Communications-Electronics Security Group
--
CESG
196
CAST-128
58
2790
CAST5
--
CAST
--
CAST-5
Image:CAST-128-large.png
197
Books on cryptography
58
16355
Image:Polygraphiae.jpg
198
Rubber-hose cryptanalysis
57
2543
Rubber hose cryptanalysis
199
Ross Anderson
57
1709
Ross J. Anderson
200
Distributed.net
57
1137
201
Wired Equivalent Privacy
56
3326
WEP
202
Null cipher
56
1124
Null cypher
203
Max Newman
56
1516
Maxwell Newman
204
Hashcash
55
3076
205
Fortezza
55
1280
KOV-8
Image:Mykotronx Fortezza card.navy.jpg
206
Gardening (cryptanalysis)
54
1048
207
Clifford Cocks
54
1942
208
Clipper chip
53
4545
Clipper Chip
209
Playfair cipher
52
5154
Playfair
--
Playfair square
210
Message Authentication Code
52
1309
Message authentication code
211
Substitution box
50
6284
S-box
--
Cryptography/s-box
--
Substitution boxes
212
Snake oil (cryptography)
50
9433
Snake oil cryptography
213
Physical security
50
1596
Physical Security
214
Lorenz cypher
50
2646
Tunny (cryptography)
--
Lorenz cipher
--
Fish cyphers
--
TUNNY
--
Fish ciphers
--
Lorentz Cipher
--
Lorentz Cypher
--
Lorenz Machine
--
Lorentz Machine
Image:TUNNY.jpg
215
JN-25
50
2478
216
Secure cryptoprocessor
49
2889
217
Kasiski examination
48
2760
Kasiski test
218
Steganalysis
47
4527
219
STU-III
47
4236
Image:STU-III.png
220
Leonard Adleman
47
2595
Len Adleman
--
Adleman
--
Leonard M. Adleman
--
Adleman, Leonard
Image:fi-len-mankin-pic-small.jpg
221
KASUMI
47
1494
Kasumi (cipher)
222
Daniel J. Bernstein
47
919
Dan Bernstein
--
D. J. Bernstein
--
Daniel Bernstein
--
Djb
223
Secret decoder ring
45
897
224
RSA Factoring Challenge
44
1530
225
NSA encryption systems
44
15126
226
Chosen ciphertext attack
44
1013
227
Affine cipher
44
1486
228
Serpent (cipher)
43
1364
Serpent encryption algorithm
229
Permutation cipher
43
2076
230
MARS
43
996
Mars (cipher)
231
List of cryptographers
43
11426
Cryptographer
--
Cryptographers
--
Cryptologist
--
List of cryptologists
232
Enigmail
43
914
Image:SignedAndEncryptedMessage.png
233
S-1
42
882
S-1 block cipher
234
Merkle-Hellman
42
2370
235
Key schedule
42
1316
Key scheduling
--
Subkey
Image:DES-key-schedule.png
236
HAVAL
42
2183
237
New Zealand Government Communications Security Bureau
41
1262
Government Communications Security Bureau
238
Index of coincidence
41
2858
Coincidence counting
239
Cipherspace
41
923
240
Adaptive chosen ciphertext attack
41
2203
Adaptive chosen-ciphertext attack
241
GOST
40
3123
Image:GOSTDiagram.png
242
FEAL
40
4829
243
Diplomatic bag
40
1456
Diplomatic pouch
244
Challenge-response authentication
40
2274
245
Book cipher
40
831
246
Arthur Scherbius
40
1865
247
Square (cipher)
39
1181
248
MD2
39
1149
Message Digest Algorithm 2
249
Covert channel
39
1439
250
The Codebreakers
38
1110
251
SAFER
38
5605
SAFER-K
--
SAFER (cipher)
--
SAFER SK
--
SAFER plus
--
SAFER plus plus
Image:SAFER.png
252
RSA Security
38
777
RSA Data Security
--
RSA Laboratories
253
MacGuffin (cipher)
38
3265
Image:MacGuffinDiagram.png
254
KW-26
38
4250
Image:kw-26-2.jpg
Image:kw-26.jpg
255
Cipher Block Chaining
38
1548
256
Cardan grille
38
494
257
CRYPTREC
38
9428
258
Tabula recta
37
1685
259
Red Pike
37
1489
Red pike
260
NESSIE
37
3611
261
Key exchange
37
4058
262
ADFGVX cipher
37
3542
ADFGVX
263
Shugborough House inscription
36
1557
264
Room 40
36
2720
265
PC Bruno
36
1809
266
One way function
36
2565
One-way
--
One way
267
Microdot
36
1685
Image:Microdot_camera_markiv.jpg
268
Security protocol notation
35
973
269
Secure channel
35
3599
270
Secure FTP
35
1315
271
SIGSALY
35
6480
Image:SIGSALY.jpg
272
Product cipher
35
921
273
Padding (cryptography)
35
2881
274
Key management
35
1579
Key management protocol
275
Iraqi block cipher
35
580
Iraqi Block Cipher
276
EKMS
35
5662
Electronic Key Management System
Image:LMD-KP.nsa-cf.jpg
277
Decrypt
35
731
278
Cryptography standards
35
4621
279
A5/2
35
601
280
Whitfield Diffie
34
2304
Diffie
281
Unicity distance
34
2667
Spurious key
282
Tiny Encryption Algorithm
34
4516
TEA
Image:TEA.png
283
Russian copulation
34
1445
284
PKCS
34
3734
285
KY-57
34
999
VINSON device
286
CAST-256
34
1469
287
Arne Beurling
34
1412
288
40-bit encryption
34
2334
40 bit encryption
289
Side channel attack
33
6001
290
Running key cipher
33
7964
291
NewDES
33
3291
292
NTLM
33
1975
293
Mod n cryptanalysis
33
2531
Mod-n cryptanalysis
294
Key authentication
33
2643
295
GnuTLS
33
743
296
Cleartext
33
1477
Clear message
--
In clear
--
In the clear
297
Auguste Kerckhoffs
33
2927
298
Yarrow algorithm
32
1117
299
Salt (cryptography)
32
759
300
Key escrow
32
1779
301
GMR
32
1135
302
Camellia (cipher)
32
1704
303
Bernstein v. United States
32
1489
Bernstein v. U.S. Dept. of State
304
Trusted third party
31
3564
Trusted Third Party
305
Taher ElGamal
31
1824
Taher El-Gamal
--
Taher Elgamal
306
Snuffle
31
1107
307
Cryptographic engineering
31
7785
308
Ciphertext-only attack
31
1019
Ciphertext only attack
--
Ciphertext-only
309
Kerckhoffs' law
30
4087
Kerckhoff's principle
--
Kerckhoffs' principle
--
Shannon's maxim
--
Kerkhoffs' law
--
Kerkhoffs law
--
Kerckhoffs law
--
Kirckhoffs law
--
Kerkchoffs law
--
Kerchoffs law
--
Kerchoff's law
--
Kerchoff's Law
--
Shannon's Maxim
--
Kerchoffs' Law
--
Kerckhoffs' Law
--
Kerchkoffs' Law
--
Kerkhoffs' Law
310
3-Way
30
1777
3-WAY
311
Tommy Flowers
29
1962
Tommy flowers
--
Thomas Flowers
--
Thomas Harold Flowers
312
Straddling checkerboard
29
5879
313
RSA-2048
29
2509
314
Needham-Schroeder
29
1892
315
Wide Mouth Frog
28
1002
316
Ralph Merkle
28
1792
317
Piling-up lemma
28
4106
Piling up lemma
318
Phil Zimmermann
28
2321
PhilZimmermann
--
Philip Zimmermann
319
PURPLE
28
4151
Purple code
--
Purple (cryptography)
Image:PURPLE.jpg
320
Hushmail
28
1489
321
Friedrich Kasiski
28
2803
Kasiski
--
Friedrich Wilhelm Kasiski
322
David Kahn
28
1931
323
Type 1 encryption
27
980
Type 1 algorithm
--
Type 1 product
--
High-grade encryption
--
Type I encryption
324
RSA-100
27
522
325
Malleability
27
633
Malleable
--
Maellability
326
Hans Thilo-Schmidt
27
1850
Asch
--
Hans Thilo Schmidt
327
Financial cryptography
27
347
328
Communication Theory of Secrecy Systems
27
662
329
Secure Terminal Equipment
26
1721
STE
Image:STE telephone.nsa.jpg
330
Passphrase
26
5716
Pass-phrase
--
Pass phrase
331
OMAC
26
637
332
Josef Pieprzyk
26
176
333
Horst Feistel
26
2462
334
FNBDT
26
5772
335
SEAL (cipher)
25
436
SEAL (cryptography)
336
MISTY1
25
1644
MISTY-1
--
MISTY
337
Known-plaintext attack
25
767
Known plaintext attack
--
Known plaintext
338
Elliptic Curve DSA
25
759
ECDSA
339
DigiCipher 2
25
1545
340
David Chaum
25
339
341
The Alphabet Cipher
24
3442
342
Tamper resistance
24
1959
Tamper-resistant
--
Tamper resistant
--
Tamper-resistance
343
Secure multiparty computation
24
3172
Millionaire problem
344
RSA-640
24
735
345
RSA-129
24
1222
346
Madryga
24
4492
347
Keyed-hash message authentication code
24
1171
HMAC
--
Keyed-Hashing Message Authentication
--
Hmac
348
Key generation
24
1562
349
DES-X
24
1683
DESX
350
RSA-140
23
1230
351
RSA-1024
23
872
352
Martin Hellman
23
1329
Image:Martin-Hellman.jpg
353
ISAAC (cipher)
23
1698
ISAAC
--
ISAAC (cryptography)
354
Helix (cipher)
23
1765
355
Elizebeth Friedman
23
11786
Elizabeth Friedman
Image:E friedman pic.jpg
356
David Wagner
23
1933
357
Cryptome
23
1173
Cryptome.org
358
Cryptologia
23
451
359
Common Scrambling Algorithm
23
1971
360
Blind signature
23
3755
361
Al Bhed
23
2510
362
VIC cipher
22
1121
363
Session key
22
1592
364
SHARK
22
1468
Shark (cipher)
--
SHARK (cipher)
365
Poem code
22
1570
366
Leo Marks
22
7538
Leopold Samuel Marks
367
KHAZAD
22
1480
Khazad (cipher)
--
KHAZAD (cipher)
368
Henryk Zygalski
22
627
369
Central Security Service
22
947
370
TWIRL
21
1770
371
SHACAL
21
2710
SHACAL-1
--
Shacal-2
372
RSA-576
21
1119
373
KW-37
21
3688
KWR-37
--
KWT-37
374
John Tiltman
21
3149
375
Jerzy Rozycki
21
1088
Jerzy R�życki
376
EFS
21
1523
377
David Wheeler
21
814
378
DES supplementary material
21
7677
Image:DES-e.png
Image:DES-ip-1.png
Image:DES-ip.png
Image:DES-p.png
Image:DES-pc1.png
Image:DES-pc2.png
379
Agnes Meyer Driscoll
21
3301
380
TrueCrypt
20
1478
Truecrypt
381
Shrinking generator
20
1152
382
Electronic signature
20
1367
383
DEAL
20
1447
384
CAcert
20
392
385
Baby-step giant-step
20
1142
BSGS
386
Arlington Hall
20
1590
Image:Arlington-hall.jpg
387
Visual cryptography
19
986
388
Snefru
19
1116
Snefru (cryptography)
389
RSA-130
19
1351
390
Lars Knudsen
19
1668
Lars R. Knudsen
Image:Lrk2.jpg
391
Great Cypher
19
829
Great Cipher
392
CRYPTO
19
756
393
CCMP
19
286
394
Semantic security
18
1643
395
Scrambler
18
2458
Descrambler
396
Pike (cipher)
18
637
Pike (cryptography)
397
Oblivious transfer
18
899
398
M-209
18
16425
Image:M-209.jpg
Image:M209_Internal_components.jpg
Image:M209_Key_wheels.jpg
Image:M209_Key_wheels_removed.jpg
Image:M209_guide_arm_springs.png
Image:M209_guide_arm_touching_lug.png
399
Internet Security Association and Key Management Protocol
18
486
ISAKMP
400
Frank Rowlett
18
2867
Image:Rowlett_pic.jpg
401
Don Coppersmith
18
829
Donald Coppersmith
402
Burrows-Abadi-Needham logic
18
9097
BAN logic
--
BAN Logic
403
Bifid cipher
18
1536
404
WAKE
17
650
405
Vincent Rijmen
17
1325
406
Secure copy
17
1690
SCP
--
Scp
--
Secure Copy Protocol
--
Secure Copy
407
Online Certificate Status Protocol
17
495
Ocsp
--
OCSP
408
M-94
17
3032
M-94 (cypher)
Image:Wheel cipher.png
Image:simpledevices.jpg
409
Internet key exchange
17
807
IKE
--
Internet Key Exchange
410
Herbert Yardley
17
6638
Herbert O. Yardley
Image:Yardley pic.jpg
411
Digital timestamping
17
2011
412
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
17
525
413
Certificate revocation list
17
3553
CRL
--
Certificate Revocation List
--
Compromised key list
414
W. T. Tutte
16
1698
Bill Tutte
415
Trapdoor function
16
1463
Trapdoor one way function
--
Trapdoor permutation
416
Secure Communication based on Quantum Cryptography
16
978
SECOQC
417
RED/BLACK concept
16
806
RED signal
418
Merkle's Puzzles
16
1684
Merkle's puzzles
--
Ralph Merkle puzzle cryptographic system
419
MAGENTA
16
1736
MAGENTA (cipher)
420
LOKI
16
2934
LOKI91
--
LOKI89
421
Key signing party
16
1514
Keysigning party
Image:Keysigning_party.jpg
422
Key distribution center
16
2297
KDC
423
Eli Biham
16
725
424
AxCrypt
16
299
425
Zeroise
15
2504
Zeroization
426
Type 4 encryption
15
627
Type 4 algorithm
427
Timing attack
15
1795
428
TWINKLE
15
2690
429
Stunnel
15
564
430
SYSKEY
15
1055
431
Root certificate
15
1548
432
RSA-768
15
767
433
RSA-160
15
1212
434
PMAC
15
706
435
Louis W. Tordella
15
3060
436
LOKI97
15
1553
437
Key-agreement protocol
15
1529
438
Babington Plot
15
1437
Babington plot
--
Anthony Babington's plot
439
Type 2 encryption
14
1060
Type 2 product
440
Simple public key infrastructure
14
462
Simple Public Key Infrastructure
--
SPKI
441
RSA-1536
14
1046
442
RSA-150
14
880
443
RSA-120
14
561
444
Privacy-enhanced Electronic Mail
14
308
Privacy-enhanced electronic mail
--
Privacy Enhanced Mail
445
NTRUEncrypt
14
1404
NTRU
446
Key server
14
1197
447
Joan Daemen
14
512
448
James H. Ellis
14
2321
449
ID-based cryptography
14
2316
ID Based Cryptography
450
Hugo Hadwiger
14
859
451
Ciphony
14
811
452
The Code Book
13
2658
453
RSA-170
13
491
454
Niels Ferguson
13
659
455
Mitsuru Matsui
13
758
456
McEliece
13
1155
457
Communications security
13
2069
COMSEC
458
BATON
13
1708
459
Yuliang Zheng
12
373
460
World War II cryptography
12
1944
461
RSA-110
12
542
462
Paillier cryptosystem
12
1005
Paillier
463
N-Hash
12
1076
N-hash
464
MMB
12
1170
465
Joseph Mauborgne
12
352
466
Gilbert Vernam
12
1441
467
Dining cryptographers protocol
12
973
Dining cryptographers
--
Dining cryptographer
--
Dining Cryptographers Protocol
--
Dining cryptographer protocol
--
Dining cryptographer's protocol
468
Cryptographic Message Syntax
12
843
469
Crypto system
12
1975
Cryptosystem
470
Boris Hagelin
12
1360
Image:M-209.jpg
471
Blind credential
12
992
472
Attacker
12
285
473
Strict avalanche criterion
11
681
Strict Avalanche Criterion
474
Shafi Goldwasser
11
1774
Shafrira Goldwasser
475
Secrets and Lies
11
198
476
SAVILLE
11
1267
Saville (cipher)
477
RSA-896
11
805
478
RSA-704
11
735
479
RSA-480
11
849
480
RSA-310
11
655
481
KOV-14
11
668
Fortezza Plus
482
KCDSA
11
858
EC-KCDSA
483
Edward Hebern
11
1838
Edward Hugh Hebern
484
Challenge-response test
11
825
Challenge-response system
485
Certification path validation algorithm
11
306
486
Certicom
11
717
487
COMSEC equipment
11
340
488
AN/CYZ-10
11
1214
AN/CYZ-10 DTD
Image:CYZ-10 DTD.jpg
489
Superencryption
10
202
490
Schnorr signature
10
1205
491
Random oracle
10
1139
Random oracle model
492
RSA-410
10
767
493
RSA-250
10
571
494
RSA-155
10
1406
495
Probabilistic encryption
10
1442
Probabilistic Encryption
496
Message forgery
10
240
497
Information-theoretically secure
10
946
498
FreeLIP
10
134
499
Direct anonymous attestation
10
285
500
Dilly Knox
10
720
Dilwyn Knox
501
Cellular Message Encryption Algorithm
10
1222
CMEA (cipher)
502
VINSON
9
626
503
SecurID
9
1457
504
RSA-617
9
1022
505
RSA-500
9
869
506
RSA-440
9
797
507
RSA-330
9
675
508
RSA-230
9
563
509
RSA-200
9
521
510
Power analysis
9
3461
511
Otway-Rees
9
1274
512
NSA encryption algorithms
9
4758
513
I. J. Good
9
1665
I.J. Good
--
Irving Good
514
Crypto-society
9
1048
Crypto-societies
515
Blinding (cryptography)
9
1631
Blinding
516
Bazeries cylinder
9
12555
Bazeries Cylinder
517
Abraham Sinkov
9
6920
518
Type 3 encryption
8
500
Type 3 algorithm
519
Trench code
8
4412
520
Torus based cryptography
8
677
521
Solomon Kullback
8
368
522
RSA-450
8
807
523
RSA-370
8
715
524
RSA-350
8
695
525
RSA-300
8
633
526
RSA-270
8
603
527
RSA-210
8
531
528
Peter Gutmann
8
1128
529
Paul Kocher
8
1185
530
Passive attack
8
667
531
CrossCrypt
8
1560
532
S/KEY
7
514
S/Key
533
RSA-470
7
839
534
RSA-460
7
829
535
RSA-400
7
757
536
RSA-360
7
705
537
RSA-280
7
613
538
RSA-260
7
593
539
RSA-240
7
573
540
RSA-232
7
565
541
RSA-190
7
511
542
Jefferson disk
7
1440
Image:Jefferson's_disk_cipher.jpg
543
George Scovell
7
842
544
Cryptology ePrint Archive
7
425
EPrint
545
Crypto AG
7
921
546
CipherSaber
7
804
547
Certificate-based encryption
7
1471
548
Cayley-Purser algorithm
7
997
549
Bit-flipping attack
7
1225
550
Self-signed certificate
6
2570
Self signed certificate
551
RSA-490
6
859
552
RSA-420
6
777
553
RSA-390
6
747
554
RSA-340
6
685
555
RSA-320
6
665
556
RSA-309
6
654
557
RSA-220
6
541
558
RSA-180
6
501
559
List of cryptographic key types
6
5044
Transmission security key
560
Link encryption
6
928
End-to-end encryption
--
Bulk encryption
561
Key derivation function
6
2370
562
Journal of Cryptology
6
320
Journal of cryptology
563
Joseph Rochefort
6
5292
John Joseph Rochefort
564
Hyperelliptic curve cryptography
6
1355
565
HAS-160
6
395
566
Garble
6
929
567
Cryptomathic
6
367
568
CryptoStick
6
505
569
Cryptanalytic computer
6
341
570
Anonymous publication
6
1617
571
WHIRLPOOL
5
610
Whirlpool (hash)
--
Whirlpool (algorithm)
572
Undeniable signature
5
1055
573
RSA-380
5
725
574
RSA-290
5
623
575
OTFE
5
188
576
Frank A. Stevenson
5
268
577
CryptoBuddy
5
516
578
Commitment scheme
5
1875
Bit commitment
579
Codress message
5
206
580
Self-certifying key
4
1148
Self-Certifying Keys
581
RSA-430
4
786
582
LibTom Project
4
1860
LibTomNet
--
LibTomCrypt
--
LibTomPoly
--
LibTomMath
583
Laurence Safford
4
3148
Image:Safford pic.jpg
584
Harold Keen
4
1533
585
H.235
4
648
586
FIREFLY
4
340
587
DRYAD
4
2595
DRYAD (Cryptography)
Image:KTV1400D.jpg
588
Cryptographically strong
4
1263
589
Cover (telecommunications)
4
545
590
Adaptive chosen plaintext and chosen ciphertext attack
4
809
591
Scott Vanstone
3
213
592
International Association for Cryptologic Research
3
512
IACR
593
Harvest (computer)
3
2270
Harvest computer
594
Cryptography newsgroups
3
1966
Sci.crypt
595
Certificateless cryptography
3
1144
Certificateless Cryptography
596
ABA digital signature guidelines
3
909
597
Template:Block ciphers
2
2018
MediaWiki:Block ciphers
598
Cryptochannel
2
693
599
Secure key issuing cryptography
1
1183
Secure Key Issuing Cryptography
600
Derek Taunt
1
862
601
Zimmermann-Sassaman key-signing protocol
0
479
Zimmmermann-Sassaman key signing protocol
--
Zimmerman-Sassaman protocol
--
Zimmerman-Sassaman key-signing protocol
602
Vigen�re cipher
0
8533
Vigen�re Cipher -- Vigen�re cypher --
Vigenere cipher
603
Transmission security
0
922
TRANSEC
604
Template:Classical cryptography
0
1116
MediaWiki:Classical cryptography
605
St�le Schumacher Ytteborg
0
877
St�le Schumacher --
Stale Schumacher
606
Simple XOR cipher
0
1683
Simple XOR Cipher
607
SOBER-128
0
950
608
Robert Tappan Morris, Sr.
0
568
609
NEMA (machine)
0
1682
610
Malcolm J. Williamson
0
551
Malcolm Williamson (cryptographer)
611
List of telecommunications encryption terms
0
1607
Glossary of telecommunications encryption terms
612
Le chiffre ind�chiffrable
0
2606
The unbreakable cypher
--
Le chifffre indechiffrable
613
Hill cipher
0
7707
614
Cryptographie ind�chiffrable
0
663
615
Blaise de Vigen�re
0
1386
Image:Vigenere.jpg
616
Biuro Szyfr�w
0
2266
Biuro Szyfrow
617
Akelarre
0
1241
618
�tienne Bazeries
0
2633
Bazeries
--
Etienne Bazeries
Image:Bazeries.jpg
Views
User page
Discussion
Current revision
Navigation
Main Page
Community Portal
Featured content
Current events
Help
Contact Wikipedia
Donations
Search