Cryptology: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (Proposal for structuring articles in cryptology) |
imported>Howard C. Berkowitz (More headings and prerequisites) |
||
Line 1: | Line 1: | ||
{{subpages}} | {{subpages}} | ||
==Underlying principles== | |||
*Information theory | |||
*Random numbers | |||
*Statistical characteristics of language | |||
==Methods of proving information is correct or has been transferred== | ==Methods of proving information is correct or has been transferred== | ||
===Authentication=== | ===Authentication=== | ||
Line 21: | Line 25: | ||
*Symmetric, asymmetric, and both | *Symmetric, asymmetric, and both | ||
*Key management protocols | *Key management protocols | ||
====Specific cipher implementations==== | ====Specific cipher implementations==== | ||
=====Manual===== | |||
*Monoalphabetic substitutions | |||
*Polyalphabetic substitutions | |||
**Straddling methods | |||
*Transposition | |||
*Superencipherment | |||
=====Mechanical/Electromechanical===== | =====Mechanical/Electromechanical===== | ||
*Jefferson/Bazeries cylinder, strip ciphers | *Jefferson/Bazeries cylinder, strip ciphers | ||
Line 34: | Line 43: | ||
*AES | *AES | ||
===Steganography=== | ===Steganography=== | ||
*Invisible ink methods? | |||
*Classic covert channel | |||
*Masking with graphics | |||
*Spread spectrum, frequency agility, {{seealso|electronic warfare)) | |||
===Hybrid methods=== | ===Hybrid methods=== | ||
==Methods of obtaining partial or full information== | ==Methods of obtaining partial or full information== | ||
Line 41: | Line 54: | ||
*Basic mathematical cryptanalysis: frequency analysis, index of coincidence, Kappa test | *Basic mathematical cryptanalysis: frequency analysis, index of coincidence, Kappa test | ||
*Advanced mathematical cryptanalysis | *Advanced mathematical cryptanalysis | ||
*Red/black engineering and other COMSEC supporting measures | *Red/black engineering and other COMSEC supporting measures {{seealso|communications intelligence}} | ||
*"Practical cryptanalysis" (black bag job), | *"Practical cryptanalysis" (black bag job), [[radiofrequency MASINT#Unintentional Radiation MASINT]] (TEMPEST/Van Eck, etc.), acoustic cryptanalysis |
Revision as of 10:52, 4 August 2008
Please create the "Talk page". Just click this Talk page link and save the page.
Underlying principles
- Information theory
- Random numbers
- Statistical characteristics of language
Methods of proving information is correct or has been transferred
Authentication
Sender authentication
Digital signatures
Key management
- PKI
- PGP
Server authentication
Nonrepudiation
Zero-knowledge proofs
Digital signatures
Confidentiality and integrity
Existence confidentiality
Traffic confidentiality
Message content confidentiality
Atomic and sequential integrity
Methods of concealing information
Cryptography
- Ciphers and codes, including basic methods
- Symmetric, asymmetric, and both
- Key management protocols
Specific cipher implementations
Manual
- Monoalphabetic substitutions
- Polyalphabetic substitutions
- Straddling methods
- Transposition
- Superencipherment
Mechanical/Electromechanical
- Jefferson/Bazeries cylinder, strip ciphers
- Vernam
- Rotor and rotor-like: Hagelin, Enigma, Purple, SIGABA/Typex
Computer (general purpose and chip) implementations
- General characteristics of military (KG vs KW, etc.)
- Non-text/data: secure voice, video, fax
- DES
- PGP
- AES
Steganography
- Invisible ink methods?
- Classic covert channel
- Masking with graphics
- Spread spectrum, frequency agility, {{seealso|electronic warfare))
Hybrid methods
Methods of obtaining partial or full information
- See also: communications intelligence for things including traffic analysis and direction finding
- Man-in-the-middle attack
- Various general scenarios: brute force, chosen plaintext
- Basic mathematical cryptanalysis: frequency analysis, index of coincidence, Kappa test
- Advanced mathematical cryptanalysis
- Red/black engineering and other COMSEC supporting measures
- See also: communications intelligence
- "Practical cryptanalysis" (black bag job), radiofrequency MASINT#Unintentional Radiation MASINT (TEMPEST/Van Eck, etc.), acoustic cryptanalysis