Encryption

Ciphers

 * AES
 * Blowfish
 * ChaCha
 * DES
 * RC4
 * Triple DES

Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
 * BLAKE
 * BLAKE2
 * MD4
 * MD5
 * RIPEMD
 * RIPEMD-160
 * SHA-1
 * SHA-2
 * SHA-3

Password hashes

 * Argon2
 * bcrypt
 * crypt
 * PBKDF2
 * scrypt

See also passwd.

Formats and protocols

 * Cryptoloop
 * DissidentX
 * dm-crypt
 * Codecrypt
 * Horcrux (jesseduffield)
 * Horcrux (kndyry)
 * IZE
 * Javascript Object Signing and Encryption (JOSE)
 * JSON Web Encryption (JWE)
 * Loop-AES
 * LUKS
 * MCrypt (.nc)
 * OpenSSL salted format
 * PAE
 * PAE2
 * PGP
 * PGP public key
 * SDN (SDN Project)
 * Silent Circle Instant Messaging Protocol
 * SSL
 * TrueCrypt
 * XIP
 * ZED

Digital rights management (DRM)
Main article: Digital Rights Management


 * Content Scramble System (used on DVDs)

Blockchain-related systems
(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)
 * Tezos

Ransomware

 * Cryptolocker

Miscellaneous

 * Doom cheat code encryption
 * Exclusive Or
 * Mono
 * OpenSSL
 * ROT13
 * Shamir's Secret Sharing
 * Steganography

Security techniques

 * One way to keep your documents secure...
 * Is It the Dawn of the Encryption App?
 * Amid NSA uproar, encryption-standards body defends process
 * STEED: project to create nonproprietary encryption
 * Defending Against Crypto Backdoors
 * Dark Mail Alliance - developing end-to-end encryption for e-mail
 * FLOSS Manuals content being used in CryptoParties
 * Cryptography Breakthrough Could Make Software Unhackable
 * Time-capsule crypto to help journalists protect their sources

Code breaking, bugs, and back doors

 * Breaking Hard-Disk Encryption
 * Password Cracking AES-256 DMGs and Epic Self-Pwnage
 * Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
 * SSL: Intercepted today, decrypted tomorrow
 * Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
 * Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
 * Researchers challenge Apple's claim of unbreakable iMessage encryption
 * NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal
 * Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010
 * SSL3 “POODLE” Vulnerability

Unsolved (or finally-solved) codes/ciphers

 * 70-year old code uncracked
 * Mysterious coded messages at university library
 * 7 Codes You’ll Never Ever Break
 * World's most mysterious manuscript has genuine message
 * Zodiac Killer cipher is cracked after eluding sleuths for 51 years

Tools, Utilities, and Software

 * Encryption Detection: COPTR
 * LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.
 * Keybase: look up public keys connected with social-media usernames
 * Easy Hash: free program which can calculate over 180 hash functions and checksums

Miscellaneous

 * Cryptofloricon: send a message with flowers (not a secret one, though, since the decryption key is on the website!)
 * Memo to the Amateur Cipher Designer
 * Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)
 * Check Out the Cipher from an Assassination Attempt on Queen Elizabeth
 * Crypto Won’t Save You Either
 * Programming-contest entries to hide a nasty message in note to boss
 * The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison
 * Mozilla Password Based Encryption