User:Matt Crypto/CryptoStats/ArticleHits

From Wikipedia, the free encyclopedia

Rank Article Hits Size (bytes) Redirects Images
1 Enigma machine 6535 32450 Naval Engima -- Enigma code machine -- Enigma (machine) -- ENIGMA -- Enigma cryptography machine -- Enigma code -- Enigma cipher machine -- Enigma cypher machine -- Enigma cipher -- Enigma cypher -- Naval Enigma -- Enigma Machine
Image:Enigma ratchet.png Image:Enigma rotor exploded view.png Image:Enigma rotor set.png Image:Enigma-action.png Image:Enigma-logo.jpg Image:Nsa-enigma-exhibit.jpg Image:Nsa-enigma.jpg Image:Scherbius-1928-patent.png Image:empty-plugboard.jpg Image:enigma-rotors.jpg Image:four-rotor-enigma.jpg Image:rotor-assembly.jpg Image:rotors-through-window.jpg
2 Cryptanalysis of the Enigma 1993 22520
Image:Bombe-wh.700px.jpg Image:enigma-baldwin.jpg
3 Cryptanalysis 1993 18187 CryptanalysiS -- Cryptanalytic -- Cryptoanalysis -- Codebreaking -- Codebreaker -- Cryptanalyst -- Code-breaking -- Cryptanalysts
Image:Al-kindi-cryptanalysis.png Image:Bombe-wh.700px.jpg Image:Zimmermann-telegramm-offen.jpg
4 Alan Turing 1579 15031 Turing, A.M. -- Alan Mathison Turing
Image:Alan Turing Memorial Closer.jpg Image:Alan Turing.jpg Image:Bombe-wh.700px.jpg Image:Turing_Plaque.jpg
5 History of cryptography 1450 20091
6 ECHELON 1322 13300 EcheloN -- Eschelon
7 Cryptography 1290 17810 CryptologY -- CryptographY -- Cryptology -- CryptographY/Hashfunctions -- Cryptographic -- Codes and ciphers -- Decrypting -- Crypto -- Data encryption -- Cyptography
8 Digital rights management 1255 24954 Digital Rights Management -- Digital-rights management -- Digital restrictions management -- Digital Restrictions Management
9 MD5 1059 7679 Md5 -- MD5 - A Message Digest Algorithm -- Md5sum
Image:MD5.png
10 RSA 986 13207 RSA Cryptosystem
11 Bombe 786 6929
Image:Bombe-wh.700px.jpg Image:US-bombe.jpg
12 Steganography 766 11798 Secret writing -- Stegonagraphy -- Stegotext
Image:StenographyOriginal.png Image:StenographyRecovered.png
13 Encryption 668 4549 CipheR -- Cipher -- Cyphertext -- Ciphertext -- Cipher text -- Decryption -- Encryption key -- Encryption algorithm -- Codetext -- Encrypt -- Encrypted -- Encipher
Image:Cipher-taxonomy.svg
14 Ultra 580 26381 UltrA -- Ultra secret -- ULTRA
15 Bletchley Park 525 9696 Bletchley Park Museum -- Station X
Image:Bletchleypk.700px.jpg
16 Blowfish (cipher) 487 6891 Blowfish encryption algorithm
Image:BlowfishDiagram.png Image:BlowfishFFunction.svg
17 Colossus computer 480 9965 Colossus (computer)
Image:colossus.jpg
18 National Security Agency 432 11249 NSA -- Armed Forces Security Agency -- AFSA -- No such agency -- The Puzzle Palace
Image:National_Security_Agency_seal.png Image:NSAHQ.jpg
19 Advanced Encryption Standard 431 10743 AES -- Rijndael -- Rijndael encryption algorithm
20 Data Encryption Standard 421 29907 DataEncryptionStandard -- Data Encryption Algorithm -- DES
Image:Board300.jpg Image:DES-f-function.png Image:DES-key-schedule.png Image:DES-main-network.png
21 Quantum cryptography 414 16077 Quantum Cryptography
22 Topics in cryptography 409 18271 Topics in Cryptography
23 Cryptographic hash function 403 9408 Message digest -- Cryptographic hash -- Cryptographic message digest -- One-way hash -- Modification Detection Code
Image:Merkle-damgard.png
24 Cryptonomicon 384 3079 Neal Stephenson/Cryptonomicon
25 Wi-Fi Protected Access 376 3319
26 Digital signature 357 11899 Digital signatures -- Digitally Signed -- Cryptographic signature
27 One-time pad 342 18815 OneTimePads -- One time pads -- One time pad -- Vernam cipher
28 Block cipher 328 4828 Codebook algorithm
Image:Decryption.svg Image:Encryption.png
29 Zimmermann Telegram 325 9474 Zimmermann telegram -- Zimmerman telegram -- Zimmerman Note -- The Zimmermann Telegram
Image:Zimmermann-telegramm-offen.jpg Image:Ztel1b.jpg Image:Ztel2.jpg
30 Integer factorization 324 7283 Prime factorization -- Prime factorisation -- Prime decomposition -- Integer factorization problem -- Integer factorisation
31 HTTPS 324 2053 Https
32 Rotor machine 323 12564 Rotor cypher machine
33 X.509 320 4415
34 Brute force attack 319 3623 Combinatorial explosion
35 Triple DES 315 2454 3DES -- Triple-DES
36 DeCSS 313 8286 DeCSS source code -- Decss
Image:DeCSS.PNG
37 Birthday attack 312 3250
38 Public-key cryptography 298 7275 Private key -- Public key -- Public key cryptography -- Asymmetric key cryptography -- Public key encyption -- Public key crytography -- Public key encryption -- Public-key encryption -- Public-key -- PKC -- Non-secret encryption
39 Frequency analysis 286 7354
40 Substitution cipher 274 18038 Substitution ciphers -- Substitution alphabet -- Letter-substitution cipher -- Simple substitution cipher -- Monoalphabetic substitution cipher
Image:ROT13.png
41 Asymmetric key algorithm 267 7622 Asymmetric Algorithms -- Asymmetric algorithm -- Public key algorithm -- Asymmetric key -- Asymmetric key encryption algorithm -- Asymmetric key encryption -- Asymmetric cryptography
42 Authentication 264 4953 Authenticate
43 ROT13 262 14597 Rot13 -- ROT-13 -- ROT-47 -- Rot47 -- Rot-13 -- Rot-47 -- ROT47 -- ROT 13 -- ROT26 -- Double ROT13 -- Ebg13 -- Memfrob -- Furrfu
Image:NonFreeImageRemoved.svg Image:ROT13.png
44 Kerberos (protocol) 247 4528
45 Elliptic curve cryptography 241 6894 Elliptical Curve Cryptography
46 Pseudorandom number generator 238 6097 Pseudorandom number generators -- Pseudo-random number generator -- Pseudorandom sequence -- PRNG -- Pseudo Random -- Pseudo-random -- Pseudo-randomness
47 Stream cipher 231 2999 Key stream -- Combiner-type algorithm
48 RC4 230 9179 RC4 Cipher -- ARCFOUR -- RC4 cipher -- RC4 (cipher)
Image:RC4.png
49 Kryptos 219 3030
Image:Pd cia krypt-lg.jpg
50 Symmetric key algorithm 216 1699 Symmetric Algorithms -- Symmetric algorithm -- Symmetric key -- Symmetric encryption -- Symmetric key cryptography -- Symmetric cypher -- Shared key -- Symmetric cipher
51 Claude E. Shannon 216 5503 Claude Shannon -- Claude Elwood Shannon
52 Transport Layer Security 207 5380 Secure Sockets Layer -- Transport Layer Security Protocol -- Transport layer security -- Secure Socket Layer
53 Bomba (cryptography) 202 3402
54 Electronic voting 198 16364 E-voting -- EVoting -- E voting -- Computer voting -- Electronic Voting -- Online voting -- Paper trail
55 List of cryptography topics 196 33375 List of cryptology topics
56 International Data Encryption Algorithm 194 4461 IDEA encryption algorithm -- IDEA (cipher) -- Idea encryption
57 Differential cryptanalysis 192 4864 Differential attack
58 Caesar cipher 188 7402 Shift cipher -- Caesar shift cipher -- Caesar cypher
59 Typex 186 4242 Type X -- TypeX
60 Marian Rejewski 185 4990
61 Hardware random number generator 180 21945 True random number generator -- Random device -- Entropy pool -- TRNG -- True Random Number Generator
62 Perforated sheets 179 1010 Zygalski sheets -- Perforated sheet
63 TEMPEST 178 4065 Van Eck Phreaking -- Emission security -- Van Eck radiation -- Emissions security -- EMSEC
64 Numbers station 171 3510 Numbers stations -- Number station
65 Crypto-anarchism 168 4574 Crypto-anarchy
66 Man in the middle attack 167 2950 Man-in-the-middle attack -- Man in the middle -- MITM
67 Block cipher modes of operation 165 5509 Electronic codebook -- Cipher-block chaining -- Cipher feedback -- Output feedback -- Counter mode -- Modes of operation -- Block cipher mode of operation
68 Password cracking 164 10256
69 Password 164 15629 Passcode
70 VENONA project 160 9320 VENONA -- Venona -- VENONA Project -- Venona project -- Venona Project
71 Twofish 156 1747 Twofish encryption algorithm
72 Information security 156 4644 Information systems security -- Information assurance -- INFOSEC -- It security
73 Atbash 156 911 Atbash cipher -- Atbash cypher
74 Digital Signature Algorithm 155 2167 DSA
75 Code talkers 152 5603 Codetalker -- Navajo code -- Codetalkers
Image:Navaho-enlistment-letter-page01.jpg Image:Navaho-enlistment-letter-page02.jpg
76 Public key infrastructure 151 9476 PKI -- Public Key Infrastructure -- Pki
77 Codebook 145 950 Code book
Image:codebook.jpg
78 Cryptographically secure pseudo-random number generator 144 5972 CSPRNG
79 Certificate authority 144 3173 Certificate Authority
80 Cypherpunk 143 1621 Cypherpunks
81 Polyalphabetic cipher 142 4159 Polyalphabetic substitution
82 Knapsack problem 139 2223 0/1 knapsack problem
83 Adi Shamir 135 2830
Image:Adi-shamir.jpg
Image:Adi-shamir.jpg
84 Skipjack (cipher) 134 3692 Skipjack encryption algorithm
85 Secure shell 134 3626 SSH -- Secure Shell -- Ssh
86 Transposition cipher 133 7779 Transposition (cryptography) -- Columnar disposition -- Transposition (cipher)
87 Pretty Good Privacy 133 28570 PrettyGoodPrivacy -- PGP -- Pgp
88 Meet-in-the-middle attack 129 2170
89 Key (cryptography) 128 7368 CryptographY/Keys -- Cryptography/Key -- Secret key -- Cryptographic keys -- Cryptographic key
90 RIPEMD 126 2604 RIPEMD-160
91 Illegal prime 126 3745 Illegal prime number
Image:DeCSS.PNG Image:Illegal Prime.PNG
92 Blum Blum Shub 126 2513 Blum Blum Shub generator
93 Fritz-chip 124 11332
94 Scytale 123 4652 Skytale
95 Invisible ink 123 3893
96 Advanced Encryption Standard process 121 2512 AES process -- AES competition -- AES contest -- Advanced Encryption Standard competition -- AES candidate
97 Deniable encryption 119 2060 Deniable Encryption
98 Voynich manuscript 117 38042 Voynich Manuscript -- Voynich -- Voynich MS
Image:f34r.jpg Image:f75r.jpg Image:f78r.jpg Image:voynich.png
99 Rabin cryptosystem 117 10488
100 Plaintext 115 5249
101 National Cryptologic Museum 114 545 National cryptologic museum
Image:National-cryptologic-museum.jpg
102 Confidentiality 114 2056 Data confidentiality
103 Weak key 113 3961
104 Diffie-Hellman key exchange 113 9947 Diffie-Hellman -- Diffie Hellman -- Diffie-Hellman-Merkle key exchange -- Diffie-Hellman-Merkle -- Diffie-Hellman key agreement
105 Content-scrambling system 112 2426 Content Scrambling System -- Content scrambling system
106 RC2 110 3383
107 Geheimfernschreiber 110 3255 STURGEON (cryptography)
Image:STURGEON.jpg
108 Security engineering 107 2579
109 SIGABA 106 9000 Sigaba -- ECM Mark II
Image:SIGABA-patent.png Image:Sigaba.jpg Image:Sigaba2.jpg
110 Public key certificate 105 4773 Digital certificate -- Digital Certificate -- Identity certificate -- Digital identity certificate
111 XSL attack 103 9990
Image:NonFreeImageRemoved.svg
112 Security through obscurity 103 8332 Security by obscurity
113 Autokey cipher 103 3820
114 Magic (cryptography) 101 12477 Magic cryptography
115 ElGamal discrete log cryptosystem 101 2938 Elgamal discrete logarithm cryptosystem -- El Gamal discrete log cryptosystem -- ElGamal -- El Gamal -- Elgamal -- Elgamal discrete log cryptosystem
116 Dmitry Sklyarov 99 2832 Dmitri Sklyarov -- Dimitri Sklyarov -- Dimitri Skylarov -- Sklyarov -- Dimitry Sklyarov -- Dimitry Sklyarov -- Dimitry Sklyarov
117 SHA family 96 10977 SHA -- SHA1 -- SHA-256 -- SHA-384 -- SHA-512 -- SHA-1 -- Secure Hash Algorithm family -- Secure Hash Algorithm -- SHA-0 -- SHA512
Image:SHA-1.png
118 EFF DES cracker 96 3960 Deep Crack -- Deep crack -- DES cracker
Image:Board300.jpg Image:Chip300.jpg
119 SIGINT 95 2944 Signals intelligence -- Sigint -- Signals Intelligence -- Signal intelligence
120 RSA number 93 13287 RSA numbers
121 Key size 93 8328 Cryptography/key length -- Cryptographic key length -- Key length
122 RC5 92 2767 RC5 cipher -- RC5 encryption algorithm
Image:RC5-round.png
123 Collision attack 92 348
124 Alice and Bob 92 4303 Characters in cryptography
125 OpenSSL 91 970 Openssl
126 Web of trust 90 6797 Web of Trust
127 The Gold Bug 90 2121
128 Digital Fortress 90 1184
129 Crib 90 1334 Cribbing
130 SEED 89 419 SEED (cipher)
131 Beale ciphers 89 6121 Beale Ciphers
132 Linear cryptanalysis 88 1758
133 S/MIME 87 902 Smime -- SMIME
134 Pseudonymity 87 2790
135 SSH file transfer protocol 86 1672 Secure file transfer program
136 OpenSSH 85 3512 Openssh
137 802.11i 85 1135 IEEE 802.11i -- WEP2 -- WPA2
138 MD4 84 1360
139 Electronic money 84 1651 Digital cash -- EFT -- Electronic cash
140 Cryptographic protocol 84 1514 Cyptographic protocol -- Security protocol
141 Code (cryptography) 84 7701 Codetext
142 Adversary 84 1877
143 XTEA 83 4138
144 Discrete logarithm 83 2293 Discrete log problem -- Discrete logarithm problem -- Discrete logarithms -- Discrete log
145 Anonymous remailer 83 14590 Anonymous Remailer -- Remailer
146 OpenPGP 82 688 RFC 2440
147 MD5CRK 82 2781
Image:MD5CRK-Pollard.svg
148 Traffic analysis 81 7292
149 Computer surveillance 80 7294
150 Communications Security Establishment 80 2100
151 Preimage attack 79 382
152 MI8 78 1266
153 Bruce Schneier 78 2342 Schneier
154 Decipherment 77 1480 Decipher -- Decypher
155 Ron Rivest 76 2132 Rivest -- Ronald Rivest -- Ronald L. Rivest
Image:Ron_Rivest.jpg
156 Linear feedback shift register 76 2242 LFSR
157 Secret sharing 75 10531 Key splitting
158 GNU Privacy Guard 75 6251 Gnu Privacy Guard -- GPG -- GnuPG -- Gnupg -- GNUPG
Image:NonFreeImageRemoved.svg
159 Confusion and diffusion 75 1716 Diffusion (cryptography) -- Confusion (cryptography) -- Diffusion and confusion
160 Avalanche effect 75 1879 Avalanche (cryptography)
161 The Magic Words are Squeamish Ossifrage 73 2685 Squeamish ossifrage
162 TKIP 71 1195
163 Defence Signals Directorate 71 943
164 Wikipedia:WikiProject Cryptography 70 12011 User:Matt Crypto/prop -- Wikipedia:WikiProject Cryptology
165 TICOM 70 1185
166 RC6 70 1421 RC6 cipher -- RC6 encryption algorithm
167 List of famous ciphertexts 70 548 Famous ciphertexts
168 Cryptogram 70 1215
169 KL-7 69 3814
Image:KL-7.afca-museum.jpg
170 IPsec 69 8845 RFC 2401 -- IPSEC -- Authentication Header -- Encapsulating Security Payload -- IPSec -- IPsec implementations
171 William F. Friedman 68 11954 William Friedman -- William Frederick Friedman -- Wolfe Frederick Friedman
Image:Friedman pic.jpg
172 Khufu and Khafre 68 4898 Khafre (cipher) -- Khufu (cipher)
173 Replay attack 67 1595
174 Initialization vector 67 1874 Initialisation vector
175 FISH (cryptography) 67 1311
176 Dictionary attack 67 2734
177 Computer insecurity 67 13931
178 Polybius square 66 3213
179 Lucifer (cipher) 65 3954 Lucifer cipher
180 Export of cryptography 65 11772
181 Feistel cipher 64 3491 Feistel network -- Feistel scheme -- Feistel
182 Classical cipher 64 800 Classical cryptography
183 Block size (cryptography) 64 2183
184 A5/1 64 7257 A5 (cryptography)
Image:A5-1.png
185 Substitution-permutation network 63 1087 SP-network -- SPN -- Substitution-Permutation network
186 Hebern rotor machine 63 6767 Hebern Rotor Machine
Image:Hebern-patent.png
187 Quadratic sieve 62 11164 Multiple Polynomial Quadratic Sieve
188 Johannes Trithemius 62 4041
Image:Polygraphiae.jpg
189 Leone Battista Alberti 61 5229 Leone Battista Alrerti -- Leon Battista Alberti -- Alberti, Leone Battista -- Leone Alberti
190 Chosen plaintext attack 61 2016 Chosen plaintext -- Chosen-text attack -- Chosen-plaintext attack -- Chosen-plaintext -- Adaptive chosen-plaintext attack -- Adaptive chosen plaintext attack
191 Zero-knowledge proof 60 6332 Zero knowledge proof -- Zero-knowledge
192 Chaffing and winnowing 60 716
193 Dorabella Cipher 59 490
Image:Dorabella.gif
194 Tiger (hash) 58 731 Tiger hash function -- Tiger (cryptography)
195 Government Communications Headquarters 58 4047 GCHQ -- GC&CS -- Government Code and Cypher School -- Government Code and Cipher School -- Communications-Electronics Security Group -- CESG
196 CAST-128 58 2790 CAST5 -- CAST -- CAST-5
Image:CAST-128-large.png
197 Books on cryptography 58 16355
Image:Polygraphiae.jpg
198 Rubber-hose cryptanalysis 57 2543 Rubber hose cryptanalysis
199 Ross Anderson 57 1709 Ross J. Anderson
200 Distributed.net 57 1137
201 Wired Equivalent Privacy 56 3326 WEP
202 Null cipher 56 1124 Null cypher
203 Max Newman 56 1516 Maxwell Newman
204 Hashcash 55 3076
205 Fortezza 55 1280 KOV-8
Image:Mykotronx Fortezza card.navy.jpg
206 Gardening (cryptanalysis) 54 1048
207 Clifford Cocks 54 1942
208 Clipper chip 53 4545 Clipper Chip
209 Playfair cipher 52 5154 Playfair -- Playfair square
210 Message Authentication Code 52 1309 Message authentication code
211 Substitution box 50 6284 S-box -- Cryptography/s-box -- Substitution boxes
212 Snake oil (cryptography) 50 9433 Snake oil cryptography
213 Physical security 50 1596 Physical Security
214 Lorenz cypher 50 2646 Tunny (cryptography) -- Lorenz cipher -- Fish cyphers -- TUNNY -- Fish ciphers -- Lorentz Cipher -- Lorentz Cypher -- Lorenz Machine -- Lorentz Machine
Image:TUNNY.jpg
215 JN-25 50 2478
216 Secure cryptoprocessor 49 2889
217 Kasiski examination 48 2760 Kasiski test
218 Steganalysis 47 4527
219 STU-III 47 4236
Image:STU-III.png
220 Leonard Adleman 47 2595 Len Adleman -- Adleman -- Leonard M. Adleman -- Adleman, Leonard
Image:Fi-len-mankin-pic-small.jpg
Image:fi-len-mankin-pic-small.jpg
221 KASUMI 47 1494 Kasumi (cipher)
222 Daniel J. Bernstein 47 919 Dan Bernstein -- D. J. Bernstein -- Daniel Bernstein -- Djb
223 Secret decoder ring 45 897
224 RSA Factoring Challenge 44 1530
225 NSA encryption systems 44 15126
226 Chosen ciphertext attack 44 1013
227 Affine cipher 44 1486
228 Serpent (cipher) 43 1364 Serpent encryption algorithm
229 Permutation cipher 43 2076
230 MARS 43 996 Mars (cipher)
231 List of cryptographers 43 11426 Cryptographer -- Cryptographers -- Cryptologist -- List of cryptologists
232 Enigmail 43 914
Image:SignedAndEncryptedMessage.png
233 S-1 42 882 S-1 block cipher
234 Merkle-Hellman 42 2370
235 Key schedule 42 1316 Key scheduling -- Subkey
Image:DES-key-schedule.png
236 HAVAL 42 2183
237 New Zealand Government Communications Security Bureau 41 1262 Government Communications Security Bureau
238 Index of coincidence 41 2858 Coincidence counting
239 Cipherspace 41 923
240 Adaptive chosen ciphertext attack 41 2203 Adaptive chosen-ciphertext attack
241 GOST 40 3123
Image:GOSTDiagram.png
242 FEAL 40 4829
243 Diplomatic bag 40 1456 Diplomatic pouch
244 Challenge-response authentication 40 2274
245 Book cipher 40 831
246 Arthur Scherbius 40 1865
247 Square (cipher) 39 1181
248 MD2 39 1149 Message Digest Algorithm 2
249 Covert channel 39 1439
250 The Codebreakers 38 1110
251 SAFER 38 5605 SAFER-K -- SAFER (cipher) -- SAFER SK -- SAFER plus -- SAFER plus plus
Image:SAFER.png
252 RSA Security 38 777 RSA Data Security -- RSA Laboratories
253 MacGuffin (cipher) 38 3265
Image:MacGuffinDiagram.png
254 KW-26 38 4250
Image:kw-26-2.jpg Image:kw-26.jpg
255 Cipher Block Chaining 38 1548
256 Cardan grille 38 494
257 CRYPTREC 38 9428
258 Tabula recta 37 1685
259 Red Pike 37 1489 Red pike
260 NESSIE 37 3611
261 Key exchange 37 4058
262 ADFGVX cipher 37 3542 ADFGVX
263 Shugborough House inscription 36 1557
264 Room 40 36 2720
265 PC Bruno 36 1809
266 One way function 36 2565 One-way -- One way
267 Microdot 36 1685
Image:Microdot_camera_markiv.jpg
268 Security protocol notation 35 973
269 Secure channel 35 3599
270 Secure FTP 35 1315
271 SIGSALY 35 6480
Image:SIGSALY.jpg
272 Product cipher 35 921
273 Padding (cryptography) 35 2881
274 Key management 35 1579 Key management protocol
275 Iraqi block cipher 35 580 Iraqi Block Cipher
276 EKMS 35 5662 Electronic Key Management System
Image:LMD-KP.nsa-cf.jpg
277 Decrypt 35 731
278 Cryptography standards 35 4621
279 A5/2 35 601
280 Whitfield Diffie 34 2304 Diffie
281 Unicity distance 34 2667 Spurious key
282 Tiny Encryption Algorithm 34 4516 TEA
Image:TEA.png
283 Russian copulation 34 1445
284 PKCS 34 3734
285 KY-57 34 999 VINSON device
286 CAST-256 34 1469
287 Arne Beurling 34 1412
288 40-bit encryption 34 2334 40 bit encryption
289 Side channel attack 33 6001
290 Running key cipher 33 7964
291 NewDES 33 3291
292 NTLM 33 1975
293 Mod n cryptanalysis 33 2531 Mod-n cryptanalysis
294 Key authentication 33 2643
295 GnuTLS 33 743
296 Cleartext 33 1477 Clear message -- In clear -- In the clear
297 Auguste Kerckhoffs 33 2927
298 Yarrow algorithm 32 1117
299 Salt (cryptography) 32 759
300 Key escrow 32 1779
301 GMR 32 1135
302 Camellia (cipher) 32 1704
303 Bernstein v. United States 32 1489 Bernstein v. U.S. Dept. of State
304 Trusted third party 31 3564 Trusted Third Party
305 Taher ElGamal 31 1824 Taher El-Gamal -- Taher Elgamal
306 Snuffle 31 1107
307 Cryptographic engineering 31 7785
308 Ciphertext-only attack 31 1019 Ciphertext only attack -- Ciphertext-only
309 Kerckhoffs' law 30 4087 Kerckhoff's principle -- Kerckhoffs' principle -- Shannon's maxim -- Kerkhoffs' law -- Kerkhoffs law -- Kerckhoffs law -- Kirckhoffs law -- Kerkchoffs law -- Kerchoffs law -- Kerchoff's law -- Kerchoff's Law -- Shannon's Maxim -- Kerchoffs' Law -- Kerckhoffs' Law -- Kerchkoffs' Law -- Kerkhoffs' Law
310 3-Way 30 1777 3-WAY
311 Tommy Flowers 29 1962 Tommy flowers -- Thomas Flowers -- Thomas Harold Flowers
312 Straddling checkerboard 29 5879
313 RSA-2048 29 2509
314 Needham-Schroeder 29 1892
315 Wide Mouth Frog 28 1002
316 Ralph Merkle 28 1792
317 Piling-up lemma 28 4106 Piling up lemma
318 Phil Zimmermann 28 2321 PhilZimmermann -- Philip Zimmermann
319 PURPLE 28 4151 Purple code -- Purple (cryptography)
Image:PURPLE.jpg
320 Hushmail 28 1489
321 Friedrich Kasiski 28 2803 Kasiski -- Friedrich Wilhelm Kasiski
322 David Kahn 28 1931
323 Type 1 encryption 27 980 Type 1 algorithm -- Type 1 product -- High-grade encryption -- Type I encryption
324 RSA-100 27 522
325 Malleability 27 633 Malleable -- Maellability
326 Hans Thilo-Schmidt 27 1850 Asch -- Hans Thilo Schmidt
327 Financial cryptography 27 347
328 Communication Theory of Secrecy Systems 27 662
329 Secure Terminal Equipment 26 1721 STE
Image:STE telephone.nsa.jpg
330 Passphrase 26 5716 Pass-phrase -- Pass phrase
331 OMAC 26 637
332 Josef Pieprzyk 26 176
333 Horst Feistel 26 2462
334 FNBDT 26 5772
335 SEAL (cipher) 25 436 SEAL (cryptography)
336 MISTY1 25 1644 MISTY-1 -- MISTY
337 Known-plaintext attack 25 767 Known plaintext attack -- Known plaintext
338 Elliptic Curve DSA 25 759 ECDSA
339 DigiCipher 2 25 1545
340 David Chaum 25 339
341 The Alphabet Cipher 24 3442
342 Tamper resistance 24 1959 Tamper-resistant -- Tamper resistant -- Tamper-resistance
343 Secure multiparty computation 24 3172 Millionaire problem
344 RSA-640 24 735
345 RSA-129 24 1222
346 Madryga 24 4492
347 Keyed-hash message authentication code 24 1171 HMAC -- Keyed-Hashing Message Authentication -- Hmac
348 Key generation 24 1562
349 DES-X 24 1683 DESX
350 RSA-140 23 1230
351 RSA-1024 23 872
352 Martin Hellman 23 1329
Image:Martin-Hellman.jpg
353 ISAAC (cipher) 23 1698 ISAAC -- ISAAC (cryptography)
354 Helix (cipher) 23 1765
355 Elizebeth Friedman 23 11786 Elizabeth Friedman
Image:E friedman pic.jpg
356 David Wagner 23 1933
357 Cryptome 23 1173 Cryptome.org
358 Cryptologia 23 451
359 Common Scrambling Algorithm 23 1971
360 Blind signature 23 3755
361 Al Bhed 23 2510
362 VIC cipher 22 1121
363 Session key 22 1592
364 SHARK 22 1468 Shark (cipher) -- SHARK (cipher)
365 Poem code 22 1570
366 Leo Marks 22 7538 Leopold Samuel Marks
367 KHAZAD 22 1480 Khazad (cipher) -- KHAZAD (cipher)
368 Henryk Zygalski 22 627
369 Central Security Service 22 947
370 TWIRL 21 1770
371 SHACAL 21 2710 SHACAL-1 -- Shacal-2
372 RSA-576 21 1119
373 KW-37 21 3688 KWR-37 -- KWT-37
374 John Tiltman 21 3149
375 Jerzy Rozycki 21 1088 Jerzy Różycki
376 EFS 21 1523
377 David Wheeler 21 814
378 DES supplementary material 21 7677
Image:DES-ee.svg Image:DES-ip-1.svg Image:DES-ip.svg Image:DES-pp.svg Image:DES-pc1.svg Image:DES-pc2.svg
379 Agnes Meyer Driscoll 21 3301
380 TrueCrypt 20 1478 Truecrypt
381 Shrinking generator 20 1152
382 Electronic signature 20 1367
383 DEAL 20 1447
384 CAcert 20 392
385 Baby-step giant-step 20 1142 BSGS
386 Arlington Hall 20 1590
Image:Arlington-hall.jpg
387 Visual cryptography 19 986
388 Snefru 19 1116 Snefru (cryptography)
389 RSA-130 19 1351
390 Lars Knudsen 19 1668 Lars R. Knudsen
Image:Lrk2.jpg
391 Great Cypher 19 829 Great Cipher
392 CRYPTO 19 756
393 CCMP 19 286
394 Semantic security 18 1643
395 Scrambler 18 2458 Descrambler
396 Pike (cipher) 18 637 Pike (cryptography)
397 Oblivious transfer 18 899
398 M-209 18 16425
Image:M-209.jpg Image:M209_Internal_components.jpg Image:M209_Key_wheels.jpg Image:M209_Key_wheels_removed.jpg Image:M209_guide_arm_springs.png Image:M209_guide_arm_touching_lug.png
399 Internet Security Association and Key Management Protocol 18 486 ISAKMP
400 Frank Rowlett 18 2867
Image:Rowlett_pic.jpg
401 Don Coppersmith 18 829 Donald Coppersmith
402 Burrows-Abadi-Needham logic 18 9097 BAN logic -- BAN Logic
403 Bifid cipher 18 1536
404 WAKE 17 650
405 Vincent Rijmen 17 1325
406 Secure copy 17 1690 SCP -- Scp -- Secure Copy Protocol -- Secure Copy
407 Online Certificate Status Protocol 17 495 Ocsp -- OCSP
408 M-94 17 3032 M-94 (cypher)
Image:Wheel cipher.png Image:simpledevices.jpg
409 Internet key exchange 17 807 IKE -- Internet Key Exchange
410 Herbert Yardley 17 6638 Herbert O. Yardley
Image:Yardley pic.jpg
411 Digital timestamping 17 2011
412 Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age 17 525
413 Certificate revocation list 17 3553 CRL -- Certificate Revocation List -- Compromised key list
414 W. T. Tutte 16 1698 Bill Tutte
415 Trapdoor function 16 1463 Trapdoor one way function -- Trapdoor permutation
416 Secure Communication based on Quantum Cryptography 16 978 SECOQC
417 RED/BLACK concept 16 806 RED signal
418 Merkle's Puzzles 16 1684 Merkle's puzzles -- Ralph Merkle puzzle cryptographic system
419 MAGENTA 16 1736 MAGENTA (cipher)
420 LOKI 16 2934 LOKI91 -- LOKI89
421 Key signing party 16 1514 Keysigning party
Image:Keysigning_party.jpg
422 Key distribution center 16 2297 KDC
423 Eli Biham 16 725
424 AxCrypt 16 299
425 Zeroise 15 2504 Zeroization
426 Type 4 encryption 15 627 Type 4 algorithm
427 Timing attack 15 1795
428 TWINKLE 15 2690
429 Stunnel 15 564
430 SYSKEY 15 1055
431 Root certificate 15 1548
432 RSA-768 15 767
433 RSA-160 15 1212
434 PMAC 15 706
435 Louis W. Tordella 15 3060
436 LOKI97 15 1553
437 Key-agreement protocol 15 1529
438 Babington Plot 15 1437 Babington plot -- Anthony Babington's plot
439 Type 2 encryption 14 1060 Type 2 product
440 Simple public key infrastructure 14 462 Simple Public Key Infrastructure -- SPKI
441 RSA-1536 14 1046
442 RSA-150 14 880
443 RSA-120 14 561
444 Privacy-enhanced Electronic Mail 14 308 Privacy-enhanced electronic mail -- Privacy Enhanced Mail
445 NTRUEncrypt 14 1404 NTRU
446 Key server 14 1197
447 Joan Daemen 14 512
448 James H. Ellis 14 2321
449 ID-based cryptography 14 2316 ID Based Cryptography
450 Hugo Hadwiger 14 859
451 Ciphony 14 811
452 The Code Book 13 2658
453 RSA-170 13 491
454 Niels Ferguson 13 659
455 Mitsuru Matsui 13 758
456 McEliece 13 1155
457 Communications security 13 2069 COMSEC
458 BATON 13 1708
459 Yuliang Zheng 12 373
460 World War II cryptography 12 1944
461 RSA-110 12 542
462 Paillier cryptosystem 12 1005 Paillier
463 N-Hash 12 1076 N-hash
464 MMB 12 1170
465 Joseph Mauborgne 12 352
466 Gilbert Vernam 12 1441
467 Dining cryptographers protocol 12 973 Dining cryptographers -- Dining cryptographer -- Dining Cryptographers Protocol -- Dining cryptographer protocol -- Dining cryptographer's protocol
468 Cryptographic Message Syntax 12 843
469 Crypto system 12 1975 Cryptosystem
470 Boris Hagelin 12 1360
Image:M-209.jpg
471 Blind credential 12 992
472 Attacker 12 285
473 Strict avalanche criterion 11 681 Strict Avalanche Criterion
474 Shafi Goldwasser 11 1774 Shafrira Goldwasser
475 Secrets and Lies 11 198
476 SAVILLE 11 1267 Saville (cipher)
477 RSA-896 11 805
478 RSA-704 11 735
479 RSA-480 11 849
480 RSA-310 11 655
481 KOV-14 11 668 Fortezza Plus
482 KCDSA 11 858 EC-KCDSA
483 Edward Hebern 11 1838 Edward Hugh Hebern
484 Challenge-response test 11 825 Challenge-response system
485 Certification path validation algorithm 11 306
486 Certicom 11 717
487 COMSEC equipment 11 340
488 AN/CYZ-10 11 1214 AN/CYZ-10 DTD
Image:CYZ-10 DTD.jpg
489 Superencryption 10 202
490 Schnorr signature 10 1205
491 Random oracle 10 1139 Random oracle model
492 RSA-410 10 767
493 RSA-250 10 571
494 RSA-155 10 1406
495 Probabilistic encryption 10 1442 Probabilistic Encryption
496 Message forgery 10 240
497 Information-theoretically secure 10 946
498 FreeLIP 10 134
499 Direct anonymous attestation 10 285
500 Dilly Knox 10 720 Dilwyn Knox
501 Cellular Message Encryption Algorithm 10 1222 CMEA (cipher)
502 VINSON 9 626
503 SecurID 9 1457
504 RSA-617 9 1022
505 RSA-500 9 869
506 RSA-440 9 797
507 RSA-330 9 675
508 RSA-230 9 563
509 RSA-200 9 521
510 Power analysis 9 3461
511 Otway-Rees 9 1274
512 NSA encryption algorithms 9 4758
513 I. J. Good 9 1665 I.J. Good -- Irving Good
514 Crypto-society 9 1048 Crypto-societies
515 Blinding (cryptography) 9 1631 Blinding
516 Bazeries cylinder 9 12555 Bazeries Cylinder
517 Abraham Sinkov 9 6920
518 Type 3 encryption 8 500 Type 3 algorithm
519 Trench code 8 4412
520 Torus based cryptography 8 677
521 Solomon Kullback 8 368
522 RSA-450 8 807
523 RSA-370 8 715
524 RSA-350 8 695
525 RSA-300 8 633
526 RSA-270 8 603
527 RSA-210 8 531
528 Peter Gutmann 8 1128
529 Paul Kocher 8 1185
530 Passive attack 8 667
531 CrossCrypt 8 1560
532 S/KEY 7 514 S/Key
533 RSA-470 7 839
534 RSA-460 7 829
535 RSA-400 7 757
536 RSA-360 7 705
537 RSA-280 7 613
538 RSA-260 7 593
539 RSA-240 7 573
540 RSA-232 7 565
541 RSA-190 7 511
542 Jefferson disk 7 1440
Image:Jefferson's_disk_cipher.jpg
543 George Scovell 7 842
544 Cryptology ePrint Archive 7 425 EPrint
545 Crypto AG 7 921
546 CipherSaber 7 804
547 Certificate-based encryption 7 1471
548 Cayley-Purser algorithm 7 997
549 Bit-flipping attack 7 1225
550 Self-signed certificate 6 2570 Self signed certificate
551 RSA-490 6 859
552 RSA-420 6 777
553 RSA-390 6 747
554 RSA-340 6 685
555 RSA-320 6 665
556 RSA-309 6 654
557 RSA-220 6 541
558 RSA-180 6 501
559 List of cryptographic key types 6 5044 Transmission security key
560 Link encryption 6 928 End-to-end encryption -- Bulk encryption
561 Key derivation function 6 2370
562 Journal of Cryptology 6 320 Journal of cryptology
563 Joseph Rochefort 6 5292 John Joseph Rochefort
564 Hyperelliptic curve cryptography 6 1355
565 HAS-160 6 395
566 Garble 6 929
567 Cryptomathic 6 367
568 CryptoStick 6 505
569 Cryptanalytic computer 6 341
570 Anonymous publication 6 1617
571 WHIRLPOOL 5 610 Whirlpool (hash) -- Whirlpool (algorithm)
572 Undeniable signature 5 1055
573 RSA-380 5 725
574 RSA-290 5 623
575 OTFE 5 188
576 Frank A. Stevenson 5 268
577 CryptoBuddy 5 516
578 Commitment scheme 5 1875 Bit commitment
579 Codress message 5 206
580 Self-certifying key 4 1148 Self-Certifying Keys
581 RSA-430 4 786
582 LibTom Project 4 1860 LibTomNet -- LibTomCrypt -- LibTomPoly -- LibTomMath
583 Laurence Safford 4 3148
Image:Safford pic.jpg
584 Harold Keen 4 1533
585 H.235 4 648
586 FIREFLY 4 340
587 DRYAD 4 2595 DRYAD (Cryptography)
Image:KTV1400D.jpg
588 Cryptographically strong 4 1263
589 Cover (telecommunications) 4 545
590 Adaptive chosen plaintext and chosen ciphertext attack 4 809
591 Scott Vanstone 3 213
592 International Association for Cryptologic Research 3 512 IACR
593 Harvest (computer) 3 2270 Harvest computer
594 Cryptography newsgroups 3 1966 Sci.crypt
595 Certificateless cryptography 3 1144 Certificateless Cryptography
596 ABA digital signature guidelines 3 909
597 Template:Block ciphers 2 2018 MediaWiki:Block ciphers
598 Cryptochannel 2 693
599 Secure key issuing cryptography 1 1183 Secure Key Issuing Cryptography
600 Derek Taunt 1 862
601 Zimmermann-Sassaman key-signing protocol 0 479 Zimmmermann-Sassaman key signing protocol -- Zimmerman-Sassaman protocol -- Zimmerman-Sassaman key-signing protocol
602 Vigenère cipher 0 8533 Vigenère Cipher -- Vigenère cypher -- Vigenere cipher
603 Transmission security 0 922 TRANSEC
604 Template:Classical cryptography 0 1116 MediaWiki:Classical cryptography
605 Ståle Schumacher Ytteborg 0 877 Ståle Schumacher -- Stale Schumacher
606 Simple XOR cipher 0 1683 Simple XOR Cipher
607 SOBER-128 0 950
608 Robert Tappan Morris, Sr. 0 568
609 NEMA (machine) 0 1682
610 Malcolm J. Williamson 0 551 Malcolm Williamson (cryptographer)
611 List of telecommunications encryption terms 0 1607 Glossary of telecommunications encryption terms
612 Le chiffre indéchiffrable 0 2606 The unbreakable cypher -- Le chifffre indechiffrable
613 Hill cipher 0 7707
614 Cryptographie indéchiffrable 0 663
615 Blaise de Vigenère 0 1386
Image:Vigenere.jpg
616 Biuro Szyfrów 0 2266 Biuro Szyfrow
617 Akelarre 0 1241
618 Étienne Bazeries 0 2633 Bazeries -- Etienne Bazeries
Image:Bazeries.jpg
Image:Bazeries.jpg