Encryption
From Just Solve the File Format Problem
				
								
				(Difference between revisions)
				
																
				
				
								
				Parchivist  (Talk | contribs)  (→Steganography)  | 
			 (→Cryptographic hash functions)  | 
			||
| (47 intermediate revisions by one user not shown) | |||
| Line 16: | Line 16: | ||
* [[BLAKE]]  | * [[BLAKE]]  | ||
* [[BLAKE2]]  | * [[BLAKE2]]  | ||
| + | * [[BLAKE3]]  | ||
* [[MD4]]  | * [[MD4]]  | ||
* [[MD5]]  | * [[MD5]]  | ||
| Line 44: | Line 45: | ||
* [[Horcrux (kndyry)]]  | * [[Horcrux (kndyry)]]  | ||
* [[icecrypt]]  | * [[icecrypt]]  | ||
| + | * [[inKey]] (.iK)  | ||
* [[Invisible Secrets]] (.isc)  | * [[Invisible Secrets]] (.isc)  | ||
* [[IZE]]  | * [[IZE]]  | ||
| Line 52: | Line 54: | ||
* [[Max File Encryption]] (.mfe)  | * [[Max File Encryption]] (.mfe)  | ||
* [[MCrypt]] (.nc)  | * [[MCrypt]] (.nc)  | ||
| + | * [[Message Smuggler]] (.enc)  | ||
* [[OpenSSL salted format]]  | * [[OpenSSL salted format]]  | ||
* [[PAE]]  | * [[PAE]]  | ||
| Line 57: | Line 60: | ||
* [[PGP]]  | * [[PGP]]  | ||
** [[PGP public key]]  | ** [[PGP public key]]  | ||
| + | * [[QuickCrypto]] (.qce, .qcotfe)  | ||
* [[SDN (SDN Project)]]  | * [[SDN (SDN Project)]]  | ||
* [[Silent Circle Instant Messaging Protocol]]  | * [[Silent Circle Instant Messaging Protocol]]  | ||
* [[SSL]]  | * [[SSL]]  | ||
| + | * [[Steganos Privacy/Security Suite]] (.sef, .sle)  | ||
* [[TrueCrypt]]  | * [[TrueCrypt]]  | ||
* [[White Noise Storm (WNSTORM)]]  | * [[White Noise Storm (WNSTORM)]]  | ||
| Line 88: | Line 93: | ||
* [[BlindSide]]  | * [[BlindSide]]  | ||
* [[Camera/Shy]]  | * [[Camera/Shy]]  | ||
| − | |||
* [[Contraband]]  | * [[Contraband]]  | ||
* [[CryptoStego]]  | * [[CryptoStego]]  | ||
* [[CryptoStego - YASS version]]  | * [[CryptoStego - YASS version]]  | ||
| − | * [[  | + | * [[Crypture]]  | 
* [[DC-Stegano]]  | * [[DC-Stegano]]  | ||
| + | * [[DeepSound]]  | ||
* [[defy]]  | * [[defy]]  | ||
* [[Digital Invisible Ink Toolkit]]  | * [[Digital Invisible Ink Toolkit]]  | ||
* [[Dound's Steganographer]]  | * [[Dound's Steganographer]]  | ||
* [[Encrypt Pic]]  | * [[Encrypt Pic]]  | ||
| + | * [[eShow]]  | ||
* [[EyeMage IIE]]  | * [[EyeMage IIE]]  | ||
* [[File-Encryptor]]  | * [[File-Encryptor]]  | ||
| Line 103: | Line 109: | ||
* [[Gif-It-Up]]  | * [[Gif-It-Up]]  | ||
* [[gifshuffle]]  | * [[gifshuffle]]  | ||
| + | * [[Hallucinate]]  | ||
| + | * [[Hide'N'Send]]  | ||
* [[Hide and Seek (HideSeek)]]  | * [[Hide and Seek (HideSeek)]]  | ||
* [[Hide In Picture]]  | * [[Hide In Picture]]  | ||
* [[Hydan]]  | * [[Hydan]]  | ||
| + | * [[ImageContainer]]  | ||
* [[ImageHide]]  | * [[ImageHide]]  | ||
* [[ImageHide (dilshan)]]  | * [[ImageHide (dilshan)]]  | ||
* [[imagehide (techraj)]]  | * [[imagehide (techraj)]]  | ||
| + | * [[Image Steganography (cpascoe)]]  | ||
* [[Image Steganography using Python]]  | * [[Image Steganography using Python]]  | ||
* [[InPlainView]]  | * [[InPlainView]]  | ||
* [[InThePicture]]  | * [[InThePicture]]  | ||
* [[Invisible Secrets]]  | * [[Invisible Secrets]]  | ||
| + | * [[JHide]]  | ||
* [[JPHS (JPHide/JPSeek)]]  | * [[JPHS (JPHide/JPSeek)]]  | ||
| + | * [[JSteg]]  | ||
| + | * [[jsteg (Luke Champine)]]  | ||
* [[M4JPEG]]  | * [[M4JPEG]]  | ||
* [[Magikfs]]  | * [[Magikfs]]  | ||
| + | * [[Message Smuggler]]  | ||
| + | * [[MP3 File Hider]]  | ||
* [[MP3Stego]]  | * [[MP3Stego]]  | ||
| + | * [[mp3stegz]]  | ||
| + | * [[MSU StegoVideo]]  | ||
| + | * [[OpenPuff]]  | ||
* [[OpenStego]]  | * [[OpenStego]]  | ||
* [[OutGuess]]  | * [[OutGuess]]  | ||
| Line 122: | Line 140: | ||
* [[QuickCrypto]]  | * [[QuickCrypto]]  | ||
* [[QuickStego]]  | * [[QuickStego]]  | ||
| + | * [[rSteg]]  | ||
| + | * [[rsteg (xgi)]]  | ||
| + | * [[S-Tools]]  | ||
| + | * [[Sealed]]  | ||
| + | * [[Secret Layer]]  | ||
* [[SecretSpace]]  | * [[SecretSpace]]  | ||
| + | * [[SilentEye]]  | ||
* [[SNOW/stegsnow]]  | * [[SNOW/stegsnow]]  | ||
| + | * [[SSuite Picsel]]  | ||
| + | * [[Stash-It (Stash)]]  | ||
* [[steg86]]  | * [[steg86]]  | ||
* [[stegan (edma2)]]  | * [[stegan (edma2)]]  | ||
* [[Stegan (Von Mbah)]]  | * [[Stegan (Von Mbah)]]  | ||
* [[Stegano]]  | * [[Stegano]]  | ||
| + | * [[SteganoGifPaletteOrder (SGPO)]]  | ||
| + | * [[SteganographX Plus]]  | ||
* [[Steganography (FortKnox)]]  | * [[Steganography (FortKnox)]]  | ||
* [[Steganography Online Codec]]  | * [[Steganography Online Codec]]  | ||
* [[steganos]]  | * [[steganos]]  | ||
| + | * [[Steganos Privacy/Security Suite]]  | ||
| + | * [[steganotool]]  | ||
| + | * [[SteganPEG]]  | ||
* [[stegfs]]  | * [[stegfs]]  | ||
* [[steghide]]  | * [[steghide]]  | ||
| + | * [[Stego WAV]]  | ||
| + | * [[stego-wave]]  | ||
* [[stegodon]]  | * [[stegodon]]  | ||
* [[StegoMagic]]  | * [[StegoMagic]]  | ||
| Line 138: | Line 171: | ||
* [[StegoStick]]  | * [[StegoStick]]  | ||
* [[Stegosuite]]  | * [[Stegosuite]]  | ||
| − | * [[  | + | * [[StegoWav (Peter Heist)]]  | 
| + | * [[stegowav (robert461)]]  | ||
* [[Twitter Secret Messages]] (Steg Of The Dump)  | * [[Twitter Secret Messages]] (Steg Of The Dump)  | ||
* [[Unicode Steganography (unisteg)]]  | * [[Unicode Steganography (unisteg)]]  | ||
* [[Virtual Steganographic Laboratory (VSL)]]  | * [[Virtual Steganographic Laboratory (VSL)]]  | ||
| + | * [[Vodka-Tonic]]  | ||
* [[wbStego]]  | * [[wbStego]]  | ||
* [[Whitespace (BeyondMeh)|Whitespace]]  | * [[Whitespace (BeyondMeh)|Whitespace]]  | ||
* [[White Noise Storm (WNSTORM)]]  | * [[White Noise Storm (WNSTORM)]]  | ||
| + | * [[Xiao Steganography]]  | ||
* [[Xidie Security Suite]]  | * [[Xidie Security Suite]]  | ||
* [[yass-js]]  | * [[yass-js]]  | ||
| Line 157: | Line 193: | ||
== Obfuscation ==  | == Obfuscation ==  | ||
(make one type of file appear as a different type of file or no type at all)  | (make one type of file appear as a different type of file or no type at all)  | ||
| + | * [[BMP Wrap]]  | ||
* [[bmpPacker]]  | * [[bmpPacker]]  | ||
| + | * [[Empty Picture]]  | ||
* [[Exclusive Or]]  | * [[Exclusive Or]]  | ||
* [[EyeMage IIE]]  | * [[EyeMage IIE]]  | ||
| Line 163: | Line 201: | ||
* [[file2png (Sneed)]]  | * [[file2png (Sneed)]]  | ||
* [[File2PNG (softenko)]]  | * [[File2PNG (softenko)]]  | ||
| + | * [[Hallucinate]]  | ||
| + | * [[ImPack]]  | ||
| + | * [[nicetext]]  | ||
* [[Piet]] - create images that are programs  | * [[Piet]] - create images that are programs  | ||
* [[PngBin]]  | * [[PngBin]]  | ||
* [[ROT13]]  | * [[ROT13]]  | ||
| + | * [[s2png]]  | ||
* [[Sam's Big Play Maker]]  | * [[Sam's Big Play Maker]]  | ||
* [[Stealth]]  | * [[Stealth]]  | ||
Latest revision as of 14:58, 2 December 2024
Contents | 
[edit] Ciphers
[edit] Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
[edit] Password hashes
See also passwd#Password field.
[edit] Formats and protocols
- Cloak (.clk)
 - Cryptoloop
 - DissidentX
 - dm-crypt
 - Codecrypt
 - FractalCrypt
 - Horcrux (jesseduffield)
 - Horcrux (kndyry)
 - icecrypt
 - inKey (.iK)
 - Invisible Secrets (.isc)
 - IZE
 - Javascript Object Signing and Encryption (JOSE)
 - JSON Web Encryption (JWE)
 - Loop-AES
 - LUKS
 - Max File Encryption (.mfe)
 - MCrypt (.nc)
 - Message Smuggler (.enc)
 - OpenSSL salted format
 - PAE
 - PAE2
 - PGP
 - QuickCrypto (.qce, .qcotfe)
 - SDN (SDN Project)
 - Silent Circle Instant Messaging Protocol
 - SSL
 - Steganos Privacy/Security Suite (.sef, .sle)
 - TrueCrypt
 - White Noise Storm (WNSTORM)
 - Xidie Secure Archives
 - XIP
 - ZED
 
[edit] Digital rights management (DRM)
Main article: Digital Rights Management
- Content Scramble System (used on DVDs)
 
[edit]
(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)
[edit] Ransomware
Additional formats may be listed at Ransomware.
[edit] Steganography
- 4t HIT Mail Privacy Lite
 - AnyFile2Image
 - ARMaHYDAN
 - BDV DataHider
 - Black Wolf's Picture Encoder (StegoDos)
 - BlindSide
 - Camera/Shy
 - Contraband
 - CryptoStego
 - CryptoStego - YASS version
 - Crypture
 - DC-Stegano
 - DeepSound
 - defy
 - Digital Invisible Ink Toolkit
 - Dound's Steganographer
 - Encrypt Pic
 - eShow
 - EyeMage IIE
 - File-Encryptor
 - FireSteg
 - Gif-It-Up
 - gifshuffle
 - Hallucinate
 - Hide'N'Send
 - Hide and Seek (HideSeek)
 - Hide In Picture
 - Hydan
 - ImageContainer
 - ImageHide
 - ImageHide (dilshan)
 - imagehide (techraj)
 - Image Steganography (cpascoe)
 - Image Steganography using Python
 - InPlainView
 - InThePicture
 - Invisible Secrets
 - JHide
 - JPHS (JPHide/JPSeek)
 - JSteg
 - jsteg (Luke Champine)
 - M4JPEG
 - Magikfs
 - Message Smuggler
 - MP3 File Hider
 - MP3Stego
 - mp3stegz
 - MSU StegoVideo
 - OpenPuff
 - OpenStego
 - OutGuess
 - PiggyPack
 - QuickCrypto
 - QuickStego
 - rSteg
 - rsteg (xgi)
 - S-Tools
 - Sealed
 - Secret Layer
 - SecretSpace
 - SilentEye
 - SNOW/stegsnow
 - SSuite Picsel
 - Stash-It (Stash)
 - steg86
 - stegan (edma2)
 - Stegan (Von Mbah)
 - Stegano
 - SteganoGifPaletteOrder (SGPO)
 - SteganographX Plus
 - Steganography (FortKnox)
 - Steganography Online Codec
 - steganos
 - Steganos Privacy/Security Suite
 - steganotool
 - SteganPEG
 - stegfs
 - steghide
 - Stego WAV
 - stego-wave
 - stegodon
 - StegoMagic
 - StegoShare
 - StegoStick
 - Stegosuite
 - StegoWav (Peter Heist)
 - stegowav (robert461)
 - Twitter Secret Messages (Steg Of The Dump)
 - Unicode Steganography (unisteg)
 - Virtual Steganographic Laboratory (VSL)
 - Vodka-Tonic
 - wbStego
 - Whitespace
 - White Noise Storm (WNSTORM)
 - Xiao Steganography
 - Xidie Security Suite
 - yass-js
 - yeo
 
[edit] Steganographic algorithms
(See also: Data Hiding/Embedding)
[edit] Obfuscation
(make one type of file appear as a different type of file or no type at all)
- BMP Wrap
 - bmpPacker
 - Empty Picture
 - Exclusive Or
 - EyeMage IIE
 - File2PNG
 - file2png (Sneed)
 - File2PNG (softenko)
 - Hallucinate
 - ImPack
 - nicetext
 - Piet - create images that are programs
 - PngBin
 - ROT13
 - s2png
 - Sam's Big Play Maker
 - Stealth
 - Steganosaurus (stego)
 - Texto
 - tk
 - UDS : Unlimited Drive Storage
 - Wrapster
 - ZIPD
 
[edit] Miscellaneous
[edit] See also
See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.
[edit] External links
[edit] Security techniques
- One way to keep your documents secure...
 - Is It the Dawn of the Encryption App?
 - Amid NSA uproar, encryption-standards body defends process
 - STEED: project to create nonproprietary encryption
 - Defending Against Crypto Backdoors
 - Dark Mail Alliance - developing end-to-end encryption for e-mail
 - FLOSS Manuals content being used in CryptoParties
 - Cryptography Breakthrough Could Make Software Unhackable
 - Time-capsule crypto to help journalists protect their sources
 
[edit] Code breaking, bugs, and back doors
- Breaking Hard-Disk Encryption
 - Password Cracking AES-256 DMGs and Epic Self-Pwnage
 - Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
 - SSL: Intercepted today, decrypted tomorrow
 - Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
 - Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
 - Researchers challenge Apple's claim of unbreakable iMessage encryption
 - NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal
 - Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010
 - SSL3 “POODLE” Vulnerability
 
[edit] Unsolved (or finally-solved) codes/ciphers
- 70-year old code uncracked
 - Mysterious coded messages at university library
 - 7 Codes You’ll Never Ever Break
 - World's most mysterious manuscript has genuine message
 - Zodiac Killer cipher is cracked after eluding sleuths for 51 years
 
[edit] Tools, Utilities, and Software
- Encryption Detection: COPTR
 - LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.
 - Keybase: look up public keys connected with social-media usernames
 - Easy Hash: free program which can calculate over 180 hash functions and checksums
 
[edit] Miscellaneous
- Cryptofloricon: send a message with flowers (not a secret one, though, since the decryption key is on the website!)
 - Memo to the Amateur Cipher Designer
 - Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)
 - Check Out the Cipher from an Assassination Attempt on Queen Elizabeth
 - Crypto Won’t Save You Either
 - Programming-contest entries to hide a nasty message in note to boss
 - The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison
 - Mozilla Password Based Encryption