Cryptology: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (More headings and prerequisites) |
imported>Sandy Harris (→Underlying principles: add one) |
||
Line 4: | Line 4: | ||
*Random numbers | *Random numbers | ||
*Statistical characteristics of language | *Statistical characteristics of language | ||
*Computationally intractable problems | |||
==Methods of proving information is correct or has been transferred== | ==Methods of proving information is correct or has been transferred== | ||
===Authentication=== | ===Authentication=== |
Revision as of 22:15, 4 August 2008
Please create the "Talk page". Just click this Talk page link and save the page.
Underlying principles
- Information theory
- Random numbers
- Statistical characteristics of language
- Computationally intractable problems
Methods of proving information is correct or has been transferred
Authentication
Sender authentication
Digital signatures
Key management
- PKI
- PGP
Server authentication
Nonrepudiation
Zero-knowledge proofs
Digital signatures
Confidentiality and integrity
Existence confidentiality
Traffic confidentiality
Message content confidentiality
Atomic and sequential integrity
Methods of concealing information
Cryptography
- Ciphers and codes, including basic methods
- Symmetric, asymmetric, and both
- Key management protocols
Specific cipher implementations
Manual
- Monoalphabetic substitutions
- Polyalphabetic substitutions
- Straddling methods
- Transposition
- Superencipherment
Mechanical/Electromechanical
- Jefferson/Bazeries cylinder, strip ciphers
- Vernam
- Rotor and rotor-like: Hagelin, Enigma, Purple, SIGABA/Typex
Computer (general purpose and chip) implementations
- General characteristics of military (KG vs KW, etc.)
- Non-text/data: secure voice, video, fax
- DES
- PGP
- AES
Steganography
- Invisible ink methods?
- Classic covert channel
- Masking with graphics
- Spread spectrum, frequency agility, {{seealso|electronic warfare))
Hybrid methods
Methods of obtaining partial or full information
- See also: communications intelligence for things including traffic analysis and direction finding
- Man-in-the-middle attack
- Various general scenarios: brute force, chosen plaintext
- Basic mathematical cryptanalysis: frequency analysis, index of coincidence, Kappa test
- Advanced mathematical cryptanalysis
- Red/black engineering and other COMSEC supporting measures
- See also: communications intelligence
- "Practical cryptanalysis" (black bag job), radiofrequency MASINT#Unintentional Radiation MASINT (TEMPEST/Van Eck, etc.), acoustic cryptanalysis