User:Matt Crypto/Crypto redirects

List compiled 20th of April, 2004 based on List of cryptography topics.

List of redirects to cryptography pages

 * 40-bit encryption
 * 40 bit encryption


 * A5/1
 * A5 (cryptography)


 * ADFGVX cipher
 * ADFGVX


 * Advanced Encryption Standard
 * AES


 * Advanced Encryption Standard process
 * AES process
 * AES competition
 * AES contest


 * Alan Turing
 * Turing, A.M.


 * Anonymous remailer
 * Anonymous Remailer


 * Asymmetric key algorithm
 * Asymmetric algorithm
 * Public key algorithm
 * Asymmetric Algorithms
 * Asymmetric key
 * Asymmetric key encryption algorithm


 * Atbash cipher
 * Atbash


 * Authentication
 * Authenticate


 * Babington plot
 * Babington Plot


 * Baby-step giant-step
 * BSGS


 * Beale ciphers
 * Beale Ciphers


 * Block cipher modes of operation
 * Electronic codebook
 * Cipher-block chaining
 * Cipher feedback
 * Output feedback
 * Counter mode


 * Blowfish (cipher)
 * Blowfish encryption algorithm


 * Bruce Schneier
 * Schneier


 * Burrows-Abadi-Needham logic
 * BAN Logic
 * BAN logic


 * Caesar cipher
 * Shift cipher
 * Caesar shift cipher


 * CAST-128
 * CAST5
 * CAST


 * Certificate authority
 * Certificate Authority


 * Certificate Revocation List
 * CRL


 * Chosen plaintext attack
 * Chosen plaintext


 * Cipher
 * CipheR
 * Cypher


 * Ciphertext-only attack
 * Ciphertext only attack


 * Clipper chip
 * Clipper Chip


 * Code
 * CodE
 * Codewords
 * Codeword
 * Coding theory


 * Codebook
 * Code book


 * Code talkers
 * Codetalker
 * Navajo code
 * Codetalkers


 * Communications security
 * COMSEC


 * Confidentiality
 * Data confidentiality


 * Content-scrambling system
 * Content Scrambling System
 * Content scrambling system


 * Cryptanalysis
 * CryptanalysiS
 * Cryptanalytic
 * Codebreaking
 * Cryptoanalysis
 * Codebreaker
 * Cryptanalyst


 * Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
 * Crypto


 * Crypto system
 * Cryptosystem


 * Cryptographic protocol
 * Cyptographic protocol


 * Cryptographically secure pseudo-random number generator
 * CSPRNG


 * Cryptography
 * CryptographY
 * Cryptology
 * CryptographY/Hashfunctions
 * Cryptographic
 * Codes and ciphers
 * Decrypting
 * Data encryption
 * Decryption
 * CryptologY
 * Cyptography


 * Cryptonomicon
 * Neal Stephenson/Cryptonomicon


 * Crypto-society
 * Crypto-societies


 * Cypherpunk
 * Cypherpunks


 * Cyphertext
 * Ciphertext
 * Codetext


 * Daniel J. Bernstein
 * Dan Bernstein
 * D. J. Bernstein
 * Daniel Bernstein


 * Data Encryption Standard
 * DataEncryptionStandard
 * DES
 * Data Encryption Algorithm


 * Decipherment
 * Decipher
 * Decypher
 * Decypher


 * DeCSS
 * DeCSS source code
 * Decss


 * Differential cryptanalysis
 * Differential attack


 * Diffie-Hellman key exchange
 * Diffie-Hellman
 * Diffie Hellman


 * Digital rights management
 * Digital-rights management
 * Digital Rights Management
 * Digital restrictions management


 * Digital signature
 * Digital signatures


 * Digital Signature Algorithm
 * DSA


 * Dining cryptographers protocol
 * Dining cryptographers
 * Dining cryptographer
 * Dining Cryptographers Protocol
 * Dining cryptographer protocol
 * Dining cryptographer's protocol


 * Discrete logarithm
 * Discrete logarithms
 * Discrete log
 * Discrete log problem
 * Discrete logarithm problem


 * Dmitry Sklyarov
 * Dmitri Sklyarov
 * Dimitry Sklyarov
 * Dimitry Sklyarov
 * Dimitri Sklyarov
 * Dimitri Skylarov


 * ECHELON
 * EcheloN
 * Echelon


 * Edward Hebern
 * Edward Hugh Hebern


 * Electronic money
 * EFT
 * Electronic cash
 * Digital cash


 * Electronic voting
 * E-voting
 * E-voting


 * ElGamal discrete log cryptosystem
 * ElGamal
 * Elgamal discrete logarithm cryptosystem
 * El Gamal
 * El Gamal discrete log cryptosystem


 * Elizebeth Friedman
 * Elizabeth Friedman


 * Elliptic curve cryptography
 * Elliptical Curve Cryptography


 * Elliptic Curve DSA
 * ECDSA


 * Encode
 * Encoding code
 * Encoding


 * Encryption
 * Encryption key
 * Encryption algorithm
 * Encrypt
 * Encrypt


 * Enigma machine
 * Enigma
 * Naval Engima


 * Exclusive disjunction
 * XOR
 * Exclusive or
 * Xor
 * XOR function


 * Feistel cipher
 * Feistel network


 * Geheimfernschreiber
 * STURGEON (cryptography)


 * GNU Privacy Guard
 * Gnu Privacy Guard
 * GPG
 * Gnupg
 * GnuPG


 * Government Communications Headquarters
 * GCHQ
 * GC&CS
 * Government Code and Cypher School
 * Government Code and Cipher School


 * Hardware random number generator
 * Random device
 * True random number generator
 * Entropy pool


 * HTTPS
 * Https


 * ID-based cryptography
 * ID Based Cryptography


 * Illegal prime
 * Illegal prime number


 * Index of coincidence
 * Coincidence counting


 * Information security
 * Information systems security
 * Information assurance
 * INFOSEC


 * Initialization vector
 * Initialisation vector


 * International Association for Cryptologic Research
 * IACR


 * International Data Encryption Algorithm
 * IDEA encryption algorithm
 * IDEA (cipher)


 * Internet key exchange
 * Internet Key Exchange
 * IKE


 * IPSec
 * RFC 2401
 * IPSEC


 * Iraqi block cipher
 * Iraqi Block Cipher


 * Kerckhoffs' law
 * Kerckhoff's principle
 * Kerckhoffs' principle
 * Shannon's maxim
 * Kerkhoffs' law
 * Kerkhoffs law
 * Kerckhoffs law
 * Kirckhoffs law
 * Kerkchoffs law
 * Kerchoffs law
 * Kerchoff's law
 * Kerchoff's Law
 * Kerchoffs' Law
 * Kerckhoffs' Law
 * Kerchkoffs' Law
 * Kerkhoffs' Law
 * Kerckhoffs' Law
 * Shannon's Maxim


 * Key (cryptography)
 * Cryptographic key
 * CryptographY/Keys
 * Cryptography/Key
 * Secret key
 * Cryptographic keys


 * Key size
 * Cryptographic key length
 * Cryptography/key length
 * Key length


 * Keyed-hash message authentication code
 * HMAC
 * Keyed-Hashing Message Authentication


 * Knapsack problem
 * 0/1 knapsack problem


 * Known-plaintext attack
 * Known plaintext attack
 * Known plaintext


 * KY-57
 * VINSON device


 * Leo Marks
 * Leopold Samuel Marks


 * Leonard Adleman
 * Len Adleman
 * Adleman


 * Leone Battista Alberti
 * Leone Battista Alrerti
 * Leon Battista Alberti


 * LibTom Project
 * LibTomNet
 * LibTomCrypt
 * LibTomPoly
 * LibTomMath


 * Linear feedback shift register
 * LFSR


 * List of cryptographers
 * Cryptographer
 * Cryptographers
 * Cryptologist


 * List of cryptography topics
 * List of cryptology topics


 * List of famous ciphertexts
 * Famous ciphertexts


 * Lorenz cypher
 * Tunny (cryptography)
 * Lorenz cipher
 * Fish cyphers


 * Lucifer (cipher)
 * Lucifer cipher


 * MAGENTA
 * MAGENTA (cipher)


 * Magic (cryptography)
 * Magic cryptography


 * Man in the middle attack
 * Man-in-the-middle attack
 * Man in the middle


 * MARS
 * Mars (cipher)


 * MD5
 * Md5
 * MD5 - A Message Digest Algorithm
 * Md5sum


 * Meet-in-the-middle attack
 * Birthday attack


 * Message Authentication Code
 * Message authentication code


 * National Security Agency
 * NSA
 * Armed Forces Security Agency
 * AFSA


 * NTRUEncrypt
 * NTRU


 * Null cipher
 * Null cypher


 * One-time pad
 * OneTimePads
 * One time pads
 * One time pad
 * Vernam cipher


 * One way function
 * One-way
 * One way


 * OpenSSL
 * Openssl


 * Password
 * Passcode
 * Pass-phrase


 * Phil Zimmermann
 * PhilZimmermann
 * Philip Zimmermann


 * Physical security
 * Physical Security


 * Pike (cipher)
 * Pike (cryptography)
 * Red pike


 * Plaintext
 * Plain-text
 * Plain text
 * Clear message
 * Cleartext


 * Polyalphabetic cipher
 * Polyalphabetic substitution


 * Pretty Good Privacy
 * PrettyGoodPrivacy
 * PGP


 * Privacy-enhanced Electronic Mail
 * Privacy Enhanced Mail
 * PEM
 * Privacy-enhanced electronic mail


 * Pseudorandom number generator
 * Pseudorandom number generators
 * Pseudo-random number generator
 * Pseudo-random
 * PRNG
 * Pseudorandom
 * Pseudorandom sequence
 * Pseudo Random
 * Pseudo-randomness


 * Public key certificate
 * Identity certificate


 * Public-key cryptography
 * Private key
 * Public key
 * Public key cryptography
 * Asymmetric key cryptography
 * Public key crytography
 * Public key encyption
 * Public key encryption
 * Public-key encryption
 * Public-key


 * Public key infrastructure
 * PKI


 * Purple code
 * PURPLE


 * Quantum cryptography
 * Quantum Cryptography


 * Random oracle
 * Random oracle model


 * RC4 (cipher)
 * RC4 cipher
 * ARCFOUR
 * RC4 Cipher


 * RC5
 * RC5 encryption algorithm
 * RC5 cipher


 * RC6
 * RC6 encryption algorithm
 * RC6 cipher


 * Regulation of Investigatory Powers Act 2000
 * Regulation of Investigatory Powers Act
 * RIP Act


 * Rijndael
 * Rijndael encryption algorithm
 * Rijndael encryption alogrithm
 * Rijndael encryption alogrithm


 * Ron Rivest
 * Rivest
 * Ronald Rivest
 * Ronald L. Rivest


 * Ross Anderson
 * Ross J. Anderson


 * ROT13
 * Rot13
 * ROT-13
 * ROT-47
 * Rot-13
 * Rot47
 * Rot-47
 * ROT47


 * Rotor machine
 * Rotor cypher machine


 * RSA
 * RSA Cryptosystem


 * RSA Security
 * RSA Data Security


 * S-1
 * S-1 block cipher


 * Scytale
 * Skytale


 * SEAL (cipher)
 * SEAL (cryptography)


 * Secure shell
 * SSH
 * Secure Shell
 * Ssh


 * Security through obscurity
 * Security by obscurity


 * Self-certifying key
 * Self-Certifying Keys


 * Serpent (cipher)
 * Serpent encryption algorithm


 * SHA-1
 * SHA
 * SHA1
 * SHA-256
 * SHA-384
 * SHA-512


 * SIGABA
 * Sigaba


 * SIGINT
 * Signals Intelligence
 * Signals intelligence
 * Sigint
 * Signal intelligence


 * Skipjack (cipher)
 * Skipjack encryption algorithm


 * S/MIME
 * Smime
 * SMIME


 * Snefru
 * Snefru (cryptography)


 * Steganography
 * Secret writing
 * Digital watermark
 * Stegonagraphy


 * Substitution box
 * Substitution boxes
 * Cryptography/s-box
 * S-box


 * Substitution cipher
 * Substitution ciphers
 * Substitution alphabet
 * Letter-substitution cipher


 * Substitution-permutation network
 * SP-network
 * SPN


 * Symmetric key algorithm
 * Symmetric Algorithms
 * Symmetric algorithm
 * Symmetric key
 * Symmetric key cryptography
 * Symmetric encryption


 * Taher ElGamal
 * Taher El-Gamal


 * Tamper resistance
 * Tamper-resistance
 * Tamper-resistant
 * Tamper resistant


 * The Gold Bug
 * Goldbug


 * Tiger (hash)
 * Tiger hash function


 * Tiny Encryption Algorithm
 * TEA


 * Topics in cryptography
 * Topics in Cryptography


 * Transport Layer Security
 * Secure Sockets Layer
 * Secure Socket Layer
 * Transport Layer Security Protocol
 * Transport layer security


 * Transposition cipher
 * Transposition (cryptography)
 * Columnar disposition


 * Triple DES
 * 3DES


 * Trusted Third Party
 * Trusted third party


 * Twofish
 * Twofish encryption algorithm


 * Type 1 product
 * Saville


 * Typex
 * Type X
 * TypeX


 * Ultra
 * UltrA
 * Ultra secret
 * ULTRA


 * Unicity distance
 * Spurious key


 * VENONA project
 * VENONA
 * Venona
 * VENONA Project


 * Voynich Manuscript
 * Voynich manuscript
 * Voynich


 * Web of trust
 * Web of Trust


 * William F. Friedman
 * William Friedman
 * William Frederick Friedman
 * Wolfe Frederick Friedman


 * Wired Equivalent Privacy
 * WEP


 * W. T. Tutte
 * Bill Tutte


 * Zero-knowledge proof
 * Zero knowledge proof


 * Zeroise
 * Zeroization


 * Zimmermann Telegram
 * Zimmermann telegram
 * Zimmerman telegram
 * Zimmerman Note


 * Zimmerman-Sassaman key-signing protocol
 * Zimmmermann-Sassaman key signing protocol