User:Matt Crypto/Crypto hits March-2004
From Wikipedia, the free encyclopedia
Page accesses for articles in cryptography, sorted by number of hits, in March 2004. Counts for redirects have been absorbed into that of the main article.
Hits Article name ------------------------------------- 3794 Cryptography 2160 Alan Turing 1743 Digital rights management 1477 Zimmermann Telegram 1437 RSA 1368 Public-key cryptography 1272 Steganography 1254 Enigma machine 1175 One-time pad 1123 Knapsack problem 1118 Polyalphabetic cipher 1099 Data Encryption Standard 1036 Pseudorandom number generator 1035 National Security Agency 1013 Code 1006 Advanced Encryption Standard 954 Digital signature 928 RC4 cipher 916 Voynich Manuscript 876 ROT13 873 Man in the middle attack 872 Transport Layer Security 830 DeCSS 827 ECHELON 826 MD5 802 Encryption 795 Asymmetric key algorithm 792 Diffie-Hellman key exchange 791 Dictionary attack 791 Exclusive disjunction 782 Topics in cryptography 738 Key signature 728 Cipher 717 Zimmermann Telegram 704 Symmetric key algorithm 702 Secure shell 697 Quantum cryptography 679 Wired Equivalent Privacy 651 IPSec 638 Triple DES 615 Substitution cipher 610 SHA-1 609 Cryptanalysis 599 List of cryptography topics 596 Wi-Fi Protected Access 592 Illegal prime 566 Fritz-chip 563 Block cipher 555 Elliptic curve cryptography 547 Password cracking 545 Invisible ink 540 ElGamal discrete log cryptosystem 538 Feistel cipher 505 Discrete logarithm 497 Colossus computer 484 Birthday attack 482 Information security 474 HTTPS 448 Digital Signature Algorithm 448 Brute force attack 448 Caesar cipher 447 Hardware random number generator 445 Content-scrambling system 442 TEMPEST 426 Claude Shannon 424 Purple code 423 Stream cipher 409 Security through obscurity 397 Frequency analysis 396 Babington plot 386 Encode 384 Authentication 377 Adi Shamir 373 Cryptographic key 370 International Data Encryption Algorithm 365 Kerckhoffs' law 362 Bletchley Park 357 Blum Blum Shub 357 Electronic voting 348 Cryptonomicon 343 Plaintext 336 Differential cryptanalysis 335 Crypto-anarchism 331 Atbash cipher 324 Government Communications Headquarters 321 Ron Rivest 318 Rijndael 314 VENONA project 313 Block cipher modes of operation 313 Ultra 311 Cryptographic hash function 311 Linear feedback shift register 303 Electronic money 303 Password 300 Leonard Adleman 299 SIGINT 294 Pretty Good Privacy 288 X.509 284 William F. Friedman 280 Kerberos 279 GNU Privacy Guard 277 Snake oil 275 List of cryptographers 274 Polybius square 273 Cryptographically secure pseudo-random number generator 270 Leone Battista Alberti 265 Decipherment 259 Blowfish encryption algorithm 245 Message digest 243 Substitution box 231 Public key infrastructure 226 Cypherpunk 215 Certificate authority 214 Security engineering 213 RC5 212 Secure cryptoprocessor 212 Computer surveillance 210 Cyphertext 208 DigiCipher 2 204 Linear cryptanalysis 199 Computer insecurity 194 Bruce Schneier 188 Key size 186 OpenSSH 185 Transposition cipher 175 Marian Rejewski 170 Pseudonymity 168 Playfair cipher 168 Keyed-hash message authentication code 165 RC6 163 PKI 161 Secret sharing 160 Daniel J. Bernstein 159 Whitfield Diffie 158 Microdot 157 Scytale 156 SIGABA 148 RIPEMD-160 148 Code talkers 146 JN-25 146 Public key certificate 146 Rotor machine 145 Dmitry Sklyarov 144 Typex 139 Twofish 138 Index of coincidence 137 Famous ciphertexts 136 Autokey cipher 134 History of cryptography 132 Covert channel 131 Crypto system 131 Phil Zimmermann 131 Zero-knowledge proof 129 Null cipher 126 Chaffing and winnowing 124 Anonymous remailer 122 Internet key exchange 122 Message Authentication Code 122 Web of trust 119 Ross Anderson 114 Lucifer cipher 113 Tiger hash function 112 MD5CRK 112 Kryptos 112 Cryptogram 111 Cryptographic engineering 110 Initialization vector 108 Books on cryptography 106 One way function 105 Key escrow 103 Merkle-Hellman 101 Chosen plaintext attack 100 Advanced Encryption Standard process 100 Meet-in-the-middle attack 99 Arne Beurling 98 CAST-128 96 OpenPGP 94 Financial cryptography 93 Lorenz cypher 89 Burrows-Abadi-Needham logic 89 Physical security 88 Confidentiality 87 Ralph Merkle 87 Clipper chip 86 CRYPTREC 85 Known-plaintext attack 80 Affine cipher 80 Beale ciphers 79 Martin Hellman 78 Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age 78 The Gold Bug 77 Max Newman 77 Herbert Yardley 76 Traffic analysis 75 NESSIE 75 Distributed.net 74 Vincent Rijmen 74 Unicity distance 73 Permutation cipher 71 The Magic Words are Squeamish Ossifrage 71 40-bit encryption 70 Communication Theory of Secrecy Systems 70 Communications security 70 Geheimfernschreiber 70 Iraqi block cipher 70 RSA Security 68 Codebook 67 Auguste Kerckhoffs 66 Regulation of Investigatory Powers Act 2000 65 Dorabella Cipher 65 Skipjack encryption algorithm 63 Friedrich Kasiski 63 Tamper resistance 61 ADFGVX cipher 61 Ciphertext-only attack 61 Leo Marks 58 Cipherspace 57 Hebern Rotor Machine 57 Privacy-enhanced Electronic Mail 56 Crypto-society 55 Abraham Sinkov 55 Substitution-permutation network 54 Book cipher 54 OpenSSL 53 Eli Biham 53 Digital timestamping 53 Arlington Hall 52 Bernstein v. United States 52 W. T. Tutte 51 David Wagner 51 LibTom Project 50 Tabula recta 50 Security protocol notation 50 Chosen ciphertext attack 50 Tiny Encryption Algorithm 49 Elliptic Curve DSA 49 Confusion and diffusion 48 Yarrow algorithm 48 MARS 47 The Codebreakers 46 VIC cipher 46 Random oracle 45 Rubber-hose cryptanalysis 45 Adaptive chosen ciphertext attack 45 3-Way 45 Certificate Revocation List 44 Visual cryptography 44 Frank Rowlett 44 David Chaum 43 Scrambler 42 Henryk Zygalski 41 Session key 41 Paillier cryptosystem 41 Key authentication 41 Elizebeth Friedman 40 Pass phrase 40 Hushmail 40 Glossary of telecommunications encryption terms 40 Decrypt 40 Blind credential 40 Attacker 40 Agnes Meyer Driscoll 40 Zeroise 39 XTEA 38 S-1 37 Poem code 37 Niels Ferguson 37 CAcert 37 International Association for Cryptologic Research 36 Straddling checkerboard 36 Schnorr signature 36 GOST 36 Cryptome 35 Key derivation function 35 Jerzy Rozycki 35 Self-certifying key 34 Trapdoor function 34 Rabin cryptosystem 34 Certificate-based encryption 34 Serpent encryption algorithm 33 Passive attack 33 NTRUEncrypt 32 Shrinking generator 31 David Wheeler 31 Commitment scheme 30 Key distribution center 29 Don Coppersmith 29 CRYPTO 26 SYSKEY 26 Blind signature 26 Bit-flipping attack 26 Dining cryptographers protocol 25 Timing attack 25 Running key cipher 25 Key signing party 25 Hyperelliptic curve cryptography 25 Horst Feistel 24 COMSEC equipment 24 Snefru 23 Needham-Schroeder 23 Key-agreement protocol 23 Cipher Block Chaining 23 ID-based cryptography 22 Root certificate 22 KY-57 21 Solomon Kullback 21 Joan Daemen 21 Enigmail 20 Oblivious transfer 20 Cryptomathic 19 Undeniable signature 19 Garble 18 Laurence Safford 18 Journal of Cryptology 18 Magic cryptography 17 Cryptographically strong 17 Baby-step giant-step 15 Wide Mouth Frog 15 WHIRLPOOL 15 Otway-Rees 15 Type 1 product 13 A5/1 9 Red pike 7 Taher ElGamal 7 Trusted third party