User:Congeo/Books/Cryptography

Cryptography

 * Overview
 * Cryptography
 * Cryptanalysis
 * History of cryptography


 * Classical cryptography
 * Caesar cipher
 * Substitution cipher
 * Transposition cipher
 * Vigenère cipher
 * One-time pad


 * Modern cryptography
 * Symmetric-key algorithm
 * Public-key cryptography
 * Cryptographic hash function


 * Major symmetric key algorithms
 * Stream cipher
 * Block cipher
 * RC4
 * Data Encryption Standard
 * Advanced Encryption Standard
 * Feistel cipher


 * Major public key systems
 * RSA
 * Diffie–Hellman key exchange
 * Elliptic curve cryptography
 * NSA Suite B Cryptography


 * Cryptographic hash functions
 * MD5
 * SHA-1
 * SHA-2
 * SHA-3
 * Message authentication code


 * Key management
 * Cryptographic key
 * Key management
 * Key size
 * Public key infrastructure
 * Web of trust


 * Cryptanalysis
 * Frequency analysis
 * Cryptanalysis of the Enigma
 * Man-in-the-middle attack
 * Differential cryptanalysis
 * Side channel attack
 * Random number generator attack
 * Rainbow table


 * Applications of cryptography
 * Transport Layer Security
 * Pretty Good Privacy
 * GNU Privacy Guard
 * Digital signature
 * Digital rights management


 * Cipher machines
 * Jefferson disk
 * Enigma machine
 * The "Purple" cryptographic machine
 * SIGABA
 * KL-7
 * Fialka
 * NSA encryption systems


 * Voice encryption
 * SIGSALY
 * STU-III
 * Secure Terminal Equipment
 * Secure Communications Interoperability Protocol