Cryptology: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris (→Underlying principles: add one) |
imported>Sandy Harris (→Methods of obtaining partial or full information: rubber hose) |
||
Line 58: | Line 58: | ||
*Red/black engineering and other COMSEC supporting measures {{seealso|communications intelligence}} | *Red/black engineering and other COMSEC supporting measures {{seealso|communications intelligence}} | ||
*"Practical cryptanalysis" (black bag job), [[radiofrequency MASINT#Unintentional Radiation MASINT]] (TEMPEST/Van Eck, etc.), acoustic cryptanalysis | *"Practical cryptanalysis" (black bag job), [[radiofrequency MASINT#Unintentional Radiation MASINT]] (TEMPEST/Van Eck, etc.), acoustic cryptanalysis | ||
*"rubber hose cryptanalysis" |
Revision as of 22:33, 4 August 2008
Please create the "Talk page". Just click this Talk page link and save the page.
Underlying principles
- Information theory
- Random numbers
- Statistical characteristics of language
- Computationally intractable problems
Methods of proving information is correct or has been transferred
Authentication
Sender authentication
Digital signatures
Key management
- PKI
- PGP
Server authentication
Nonrepudiation
Zero-knowledge proofs
Digital signatures
Confidentiality and integrity
Existence confidentiality
Traffic confidentiality
Message content confidentiality
Atomic and sequential integrity
Methods of concealing information
Cryptography
- Ciphers and codes, including basic methods
- Symmetric, asymmetric, and both
- Key management protocols
Specific cipher implementations
Manual
- Monoalphabetic substitutions
- Polyalphabetic substitutions
- Straddling methods
- Transposition
- Superencipherment
Mechanical/Electromechanical
- Jefferson/Bazeries cylinder, strip ciphers
- Vernam
- Rotor and rotor-like: Hagelin, Enigma, Purple, SIGABA/Typex
Computer (general purpose and chip) implementations
- General characteristics of military (KG vs KW, etc.)
- Non-text/data: secure voice, video, fax
- DES
- PGP
- AES
Steganography
- Invisible ink methods?
- Classic covert channel
- Masking with graphics
- Spread spectrum, frequency agility, {{seealso|electronic warfare))
Hybrid methods
Methods of obtaining partial or full information
- See also: communications intelligence for things including traffic analysis and direction finding
- Man-in-the-middle attack
- Various general scenarios: brute force, chosen plaintext
- Basic mathematical cryptanalysis: frequency analysis, index of coincidence, Kappa test
- Advanced mathematical cryptanalysis
- Red/black engineering and other COMSEC supporting measures
- See also: communications intelligence
- "Practical cryptanalysis" (black bag job), radiofrequency MASINT#Unintentional Radiation MASINT (TEMPEST/Van Eck, etc.), acoustic cryptanalysis
- "rubber hose cryptanalysis"