Cryptography



Welcome to Cryptography, the study of obfuscating data to unintended recipients.

Part I: Introducing Cryptography
 * 1) Introduction to Cryptography
 * 2) History of Cryptography
 * 3) Classical Cryptography
 * 4) Contemporary Cryptography
 * 5) Cryptography in Popular Culture
 * 6) Quantum Cryptography
 * 7) Timeline of Notable Events
 * 8) Fundamental Concepts
 * 9) Goals of Cryptography
 * 10) Goals of Cryptanalysis
 * 11) Role of Cryptography in Computer Security
 * 12) Symmetric Key Ciphers
 * 13) Asymmetric Key Ciphers
 * 14) Random Number Generation
 * 15) Hashes
 * 16) Key Distribution and Authentication (key management and the web of trust)
 * 17) Common flaws and weaknesses
 * 18) Secure Passwords
 * 19) /S-box/

Part II: Designing Crypto-systems
 * 1) The Basic Principles
 * 2) Little Secrets Hide Bigger Secrets
 * 3) Open Algorithms and the Value of Peer-Review
 * 4) Think Like a Cryptanalyst
 * 5) Cryptography/Error Correction Systems
 * 6) Mathematical Background
 * 7) Computer Security is More Than Encryption
 * 8) Unbroken is Not Necessarily Unbreakable

Part III: Cryptanalysis
 * 1) The Basic Principles
 * 2) Weaknesses
 * 3) Proportionality of Secrecy
 * 4) Length of the key
 * 5) Quality of Random Source
 * 6) Plaintext effect on Ciphertext
 * 7) Statistical Leaking
 * 8) Faulty Implementation
 * 9) Inadequate Peer-Review
 * 10) Social Engineering and Coercion
 * 11) Leakage and Side Channels
 * 12) Attacks
 * 13) Brute-Force Attack
 * 14) Dictionary Attack
 * 15) Frequency Analysis
 * 16) Index of Coincidence
 * 17) Linear Cryptanalysis
 * 18) Differential Cryptanalysis
 * 19) Meet in the Middle Attack
 * 20) /Man-in-the-middle attack/
 * 21) /Breaking Hash Algorithms/
 * 22) Collisions
 * 23) Generating
 * 24) Exploiting
 * 25) Birthday Attack
 * 26) Joux Attack
 * 27) Time Memory Trade Off (rainbow tables)
 * 28) How Historical Systems Were Broken
 * 29) Transposition Ciphers
 * 30) Caesar Cipher
 * 31) Enigma Machine
 * 32) Permutation Cipher
 * 33) Vigenère Cipher

Part IV: Using Cryptosystems
 * 1) Applying Cryptography
 * 2) Digital Signatures
 * 3) Introduction to Digital Signatures
 * 4) DSA
 * 5) Database protection
 * 6) E-Cash
 * 7) E-Voting
 * 8) DRM
 * 9) Biometrics
 * 10) Anonymity
 * 11) Classical Ciphers
 * 12) Beale Cipher
 * 13) Transposition Ciphers
 * 14) /Caesar cipher/
 * 15) Atbash Cipher
 * 16) /Autokey cipher/
 * 17) Playfair Cipher
 * 18) /Polyalphabetic substitution/
 * 19) Scytale
 * 20) /Substitution cipher/
 * 21) /nomenclator/
 * 22) Permutation Cipher
 * 23) /Affine cipher/
 * 24) /Vigenère cipher/
 * 25) /Polybius square/
 * 26) /ADFGVX cipher/
 * 27) /Fractionation/ (Polybius square, straddling checkerboard, CT-37c conversion table, etc.)
 * 28) Contemporary Ciphers
 * 29) Symmetric Ciphers
 * 30) Enigma Machine
 * 31) /Solitaire cipher/
 * 32) One-Time Pads
 * 33) /Ciphersaber/
 * 34) Data Encryption Standard (DES)
 * 35) Advanced Encryption Standard
 * 36) /full-disk encryption/
 * 37) Asymmetric Ciphers
 * 38) Overview
 * 39) /A Basic Public Key Example/
 * 40) RSA
 * 41) ElGamal
 * 42) Elliptic Curve
 * 43) /Blum-Goldwasser/
 * 44) Hashes
 * 45) /MD5/
 * 46) /SHA-1/
 * 47) /SHA-2/
 * 48) /RadioGatún/, the direct predecessor of SHA-3
 * 49) /SHA-3/
 * 50) RIPEMD-160
 * 51) /Tiger/
 * 52) /message authentication/ code (often MAC); A MAC algorithm is sometimes called a keyed (cryptographic) hash function.
 * 53) /Protocols/
 * 54) Authentication protocols
 * 55) e.g. Kerberos
 * 56) Key exchange protocols
 * 57) Diffie-Hellman
 * 58) Secure Communications
 * 59) e.g. SSL, SSH
 * 60) /Generate a keypair using OpenSSL/

Part V: Cryptography and Society
 * 1) The Changing Nature of Cryptographic Use
 * 2) Cryptography, Governments and Laws
 * 3) Expectations of Normal Users

Part VI: Miscellaneous
 * 1) Future Possibilities
 * 2) Faster, More Parallel Linear Computers
 * 3) Glossary of Terms
 * 4) Further Reading
 * 5) Appendix A: Mathematical background
 * 6) Number Theory
 * 7) Group Theory
 * 8) Computational Complexity
 * 9) Prime numbers


 * 1) Currently ungrouped content
 * 2) Tabula Recta
 * 3) Commitment schemes
 * 4) Zero-knowledge proofs
 * 5) Open source implementation of cryptographic algorithms
 * 6) /initialization vector/
 * 7) /Linear Cryptanalysis/
 * 8) /Differential Cryptanalysis/

Pages to be merged into the text.

Cryptography/Prime Curve/Affine Coordinates

Cryptography/Prime Curve/Chudnovsky Coordinates

Cryptography/Prime Curve/Jacobian Coordinates

Cryptography/Prime Curve/Standard Projective Coordinates

Cryptography/Notes

Introducción a la Criptografía Crittografia