Encryption
From Just Solve the File Format Problem
(Difference between revisions)
Dan Tobias (Talk | contribs) (→Miscellaneous) |
Parchivist (Talk | contribs) (→Obfuscation) |
||
(182 intermediate revisions by 5 users not shown) | |||
Line 5: | Line 5: | ||
}} | }} | ||
== Ciphers == | == Ciphers == | ||
− | * [[ | + | * [[AES]] |
− | * [[ | + | * [[Blowfish]] |
+ | * [[ChaCha]] | ||
+ | * [[DES]] | ||
+ | * [[ICE (encryption algorithm)|ICE]] | ||
* [[RC4]] | * [[RC4]] | ||
* [[Triple DES]] | * [[Triple DES]] | ||
== Cryptographic hash functions == | == Cryptographic hash functions == | ||
+ | * [[BLAKE]] | ||
+ | * [[BLAKE2]] | ||
* [[MD4]] | * [[MD4]] | ||
* [[MD5]] | * [[MD5]] | ||
Line 21: | Line 26: | ||
== Password hashes == | == Password hashes == | ||
+ | * [[Argon2]] | ||
* [[bcrypt]] | * [[bcrypt]] | ||
− | * [[ | + | * [[passwd#crypt|crypt]] |
* [[PBKDF2]] | * [[PBKDF2]] | ||
* [[scrypt]] | * [[scrypt]] | ||
+ | |||
+ | See also [[passwd#Password field]]. | ||
== Formats and protocols == | == Formats and protocols == | ||
+ | * [[Cloak]] (.clk) | ||
* [[Cryptoloop]] | * [[Cryptoloop]] | ||
* [[DissidentX]] | * [[DissidentX]] | ||
* [[dm-crypt]] | * [[dm-crypt]] | ||
+ | * [[Codecrypt]] | ||
+ | * [[FractalCrypt]] | ||
+ | * [[Horcrux (jesseduffield)]] | ||
+ | * [[Horcrux (kndyry)]] | ||
+ | * [[icecrypt]] | ||
+ | * [[inKey]] (.iK) | ||
+ | * [[Invisible Secrets]] (.isc) | ||
+ | * [[IZE]] | ||
+ | * [[Javascript Object Signing and Encryption]] (JOSE) | ||
+ | * [[JSON Web Encryption]] (JWE) | ||
* [[Loop-AES]] | * [[Loop-AES]] | ||
* [[LUKS]] | * [[LUKS]] | ||
+ | * [[Max File Encryption]] (.mfe) | ||
+ | * [[MCrypt]] (.nc) | ||
+ | * [[Message Smuggler]] (.enc) | ||
* [[OpenSSL salted format]] | * [[OpenSSL salted format]] | ||
+ | * [[PAE]] | ||
+ | * [[PAE2]] | ||
* [[PGP]] | * [[PGP]] | ||
+ | ** [[PGP public key]] | ||
+ | * [[QuickCrypto]] (.qce, .qcotfe) | ||
+ | * [[SDN (SDN Project)]] | ||
* [[Silent Circle Instant Messaging Protocol]] | * [[Silent Circle Instant Messaging Protocol]] | ||
* [[SSL]] | * [[SSL]] | ||
+ | * [[Steganos Privacy/Security Suite]] (.sef, .sle) | ||
* [[TrueCrypt]] | * [[TrueCrypt]] | ||
+ | * [[White Noise Storm (WNSTORM)]] | ||
+ | * [[Xidie Secure Archives]] | ||
+ | * [[XIP]] | ||
+ | * [[ZED]] | ||
== Digital rights management (DRM) == | == Digital rights management (DRM) == | ||
+ | Main article: [[Digital Rights Management]] | ||
+ | |||
* [[Content Scramble System]] (used on DVDs) | * [[Content Scramble System]] (used on DVDs) | ||
− | == | + | == Blockchain-related systems == |
+ | (see also [[Currency]], where most such systems, including [[Bitcoin]], are documented; however, applications of blockchain technology beyond currency use are now appearing) | ||
+ | * [[Tezos]] | ||
+ | |||
+ | == [[Ransomware]] == | ||
* [[Cryptolocker]] | * [[Cryptolocker]] | ||
+ | |||
+ | Additional formats may be listed at [[Ransomware]]. | ||
+ | |||
+ | == [[Steganography]] == | ||
+ | * [[4t HIT Mail Privacy Lite]] | ||
+ | * [[AnyFile2Image]] | ||
+ | * [[ARMaHYDAN]] | ||
+ | * [[BDV DataHider]] | ||
+ | * [[Black Wolf's Picture Encoder (StegoDos)]] | ||
+ | * [[BlindSide]] | ||
+ | * [[Camera/Shy]] | ||
+ | * [[Contraband]] | ||
+ | * [[CryptoStego]] | ||
+ | * [[CryptoStego - YASS version]] | ||
+ | * [[Crypture]] | ||
+ | * [[DC-Stegano]] | ||
+ | * [[DeepSound]] | ||
+ | * [[defy]] | ||
+ | * [[Digital Invisible Ink Toolkit]] | ||
+ | * [[Dound's Steganographer]] | ||
+ | * [[Encrypt Pic]] | ||
+ | * [[eShow]] | ||
+ | * [[EyeMage IIE]] | ||
+ | * [[File-Encryptor]] | ||
+ | * [[FireSteg]] | ||
+ | * [[Gif-It-Up]] | ||
+ | * [[gifshuffle]] | ||
+ | * [[Hallucinate]] | ||
+ | * [[Hide'N'Send]] | ||
+ | * [[Hide and Seek (HideSeek)]] | ||
+ | * [[Hide In Picture]] | ||
+ | * [[Hydan]] | ||
+ | * [[ImageContainer]] | ||
+ | * [[ImageHide]] | ||
+ | * [[ImageHide (dilshan)]] | ||
+ | * [[imagehide (techraj)]] | ||
+ | * [[Image Steganography (cpascoe)]] | ||
+ | * [[Image Steganography using Python]] | ||
+ | * [[InPlainView]] | ||
+ | * [[InThePicture]] | ||
+ | * [[Invisible Secrets]] | ||
+ | * [[JHide]] | ||
+ | * [[JPHS (JPHide/JPSeek)]] | ||
+ | * [[JSteg]] | ||
+ | * [[jsteg (Luke Champine)]] | ||
+ | * [[M4JPEG]] | ||
+ | * [[Magikfs]] | ||
+ | * [[Message Smuggler]] | ||
+ | * [[MP3 File Hider]] | ||
+ | * [[MP3Stego]] | ||
+ | * [[mp3stegz]] | ||
+ | * [[MSU StegoVideo]] | ||
+ | * [[OpenPuff]] | ||
+ | * [[OpenStego]] | ||
+ | * [[OutGuess]] | ||
+ | * [[PiggyPack]] | ||
+ | * [[QuickCrypto]] | ||
+ | * [[QuickStego]] | ||
+ | * [[rSteg]] | ||
+ | * [[rsteg (xgi)]] | ||
+ | * [[S-Tools]] | ||
+ | * [[Sealed]] | ||
+ | * [[Secret Layer]] | ||
+ | * [[SecretSpace]] | ||
+ | * [[SilentEye]] | ||
+ | * [[SNOW/stegsnow]] | ||
+ | * [[SSuite Picsel]] | ||
+ | * [[Stash-It (Stash)]] | ||
+ | * [[steg86]] | ||
+ | * [[stegan (edma2)]] | ||
+ | * [[Stegan (Von Mbah)]] | ||
+ | * [[Stegano]] | ||
+ | * [[SteganoGifPaletteOrder (SGPO)]] | ||
+ | * [[SteganographX Plus]] | ||
+ | * [[Steganography (FortKnox)]] | ||
+ | * [[Steganography Online Codec]] | ||
+ | * [[steganos]] | ||
+ | * [[Steganos Privacy/Security Suite]] | ||
+ | * [[steganotool]] | ||
+ | * [[SteganPEG]] | ||
+ | * [[stegfs]] | ||
+ | * [[steghide]] | ||
+ | * [[Stego WAV]] | ||
+ | * [[stego-wave]] | ||
+ | * [[stegodon]] | ||
+ | * [[StegoMagic]] | ||
+ | * [[StegoShare]] | ||
+ | * [[StegoStick]] | ||
+ | * [[Stegosuite]] | ||
+ | * [[StegoWav (Peter Heist)]] | ||
+ | * [[stegowav (robert461)]] | ||
+ | * [[Twitter Secret Messages]] (Steg Of The Dump) | ||
+ | * [[Unicode Steganography (unisteg)]] | ||
+ | * [[Virtual Steganographic Laboratory (VSL)]] | ||
+ | * [[Vodka-Tonic]] | ||
+ | * [[wbStego]] | ||
+ | * [[Whitespace (BeyondMeh)|Whitespace]] | ||
+ | * [[White Noise Storm (WNSTORM)]] | ||
+ | * [[Xiao Steganography]] | ||
+ | * [[Xidie Security Suite]] | ||
+ | * [[yass-js]] | ||
+ | * [[yeo]] | ||
+ | |||
+ | === Steganographic algorithms === | ||
+ | * [[F5]] | ||
+ | * [[J3]] | ||
+ | |||
+ | (See also: [[Data Hiding/Embedding]]) | ||
+ | |||
+ | == Obfuscation == | ||
+ | (make one type of file appear as a different type of file or no type at all) | ||
+ | * [[BMP Wrap]] | ||
+ | * [[bmpPacker]] | ||
+ | * [[Empty Picture]] | ||
+ | * [[Exclusive Or]] | ||
+ | * [[EyeMage IIE]] | ||
+ | * [[File2PNG]] | ||
+ | * [[file2png (Sneed)]] | ||
+ | * [[File2PNG (softenko)]] | ||
+ | * [[Hallucinate]] | ||
+ | * [[ImPack]] | ||
+ | * [[nicetext]] | ||
+ | * [[Piet]] - create images that are programs | ||
+ | * [[PngBin]] | ||
* [[ROT13]] | * [[ROT13]] | ||
+ | * [[s2png]] | ||
+ | * [[Sam's Big Play Maker]] | ||
+ | * [[Stealth]] | ||
+ | * [[Steganosaurus (stego)]] | ||
+ | * [[Texto]] | ||
+ | * [[tk]] | ||
+ | * [[UDS : Unlimited Drive Storage]] | ||
+ | * [[Wrapster]] | ||
+ | * [[ZIPD]] | ||
+ | |||
+ | == Miscellaneous == | ||
+ | * [[Doom cheat code encryption]] | ||
+ | * [[Mono]] | ||
+ | * [[OpenSSL]] | ||
+ | * [[Shamir's Secret Sharing]] | ||
== See also == | == See also == | ||
Line 71: | Line 248: | ||
* [http://boingboing.net/2013/12/20/nsa-had-secret-deal-on-back-do.html NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal] | * [http://boingboing.net/2013/12/20/nsa-had-secret-deal-on-back-do.html NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal] | ||
* [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010] | * [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010] | ||
+ | * [http://security.stackexchange.com/questions/70719/ssl3-poodle-vulnerability SSL3 “POODLE” Vulnerability] | ||
− | === Unsolved codes/ciphers === | + | === Unsolved (or finally-solved) codes/ciphers === |
* [http://mobile.reuters.com/article/idUSBRE8AM0E520121123?irpc=932 70-year old code uncracked] | * [http://mobile.reuters.com/article/idUSBRE8AM0E520121123?irpc=932 70-year old code uncracked] | ||
* [http://boingboing.net/2014/03/25/mysterious-coded-messages-at-u.html Mysterious coded messages at university library] | * [http://boingboing.net/2014/03/25/mysterious-coded-messages-at-u.html Mysterious coded messages at university library] | ||
* [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break] | * [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break] | ||
* [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message] | * [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message] | ||
+ | * [https://arstechnica.com/information-technology/2020/12/zodiac-killer-cipher-is-cracked-after-eluding-sleuths-for-51-years/ Zodiac Killer cipher is cracked after eluding sleuths for 51 years] | ||
+ | |||
+ | === Tools, Utilities, and Software === | ||
+ | * [http://coptr.digipres.org/Category:Encryption_Detection Encryption Detection: COPTR] | ||
+ | * [https://libfte.org/ LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.] | ||
+ | * [https://keybase.io/ Keybase: look up public keys connected with social-media usernames] | ||
+ | * [http://ziin.pl/en/easy_hash Easy Hash: free program which can calculate over 180 hash functions and checksums] | ||
=== Miscellaneous === | === Miscellaneous === | ||
Line 85: | Line 270: | ||
* [http://regmedia.co.uk/2014/05/16/0955_peter_gutmann.pdf Crypto Won’t Save You Either] | * [http://regmedia.co.uk/2014/05/16/0955_peter_gutmann.pdf Crypto Won’t Save You Either] | ||
* [http://codegolf.stackexchange.com/questions/32024/i-am-passive-aggressive-and-want-to-insult-my-boss-without-him-finding-out?stw=2 Programming-contest entries to hide a nasty message in note to boss] | * [http://codegolf.stackexchange.com/questions/32024/i-am-passive-aggressive-and-want-to-insult-my-boss-without-him-finding-out?stw=2 Programming-contest entries to hide a nasty message in note to boss] | ||
− | * [ | + | * [http://motherboard.vice.com/read/the-secret-codes-that-cartels-use-to-send-orders-from-prison?trk_source=recommended The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison] |
+ | * [https://github.com/lclevy/firepwd/blob/master/mozilla_pbe.pdf Mozilla Password Based Encryption] |
Latest revision as of 17:35, 12 November 2023
Contents |
[edit] Ciphers
[edit] Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
[edit] Password hashes
See also passwd#Password field.
[edit] Formats and protocols
- Cloak (.clk)
- Cryptoloop
- DissidentX
- dm-crypt
- Codecrypt
- FractalCrypt
- Horcrux (jesseduffield)
- Horcrux (kndyry)
- icecrypt
- inKey (.iK)
- Invisible Secrets (.isc)
- IZE
- Javascript Object Signing and Encryption (JOSE)
- JSON Web Encryption (JWE)
- Loop-AES
- LUKS
- Max File Encryption (.mfe)
- MCrypt (.nc)
- Message Smuggler (.enc)
- OpenSSL salted format
- PAE
- PAE2
- PGP
- QuickCrypto (.qce, .qcotfe)
- SDN (SDN Project)
- Silent Circle Instant Messaging Protocol
- SSL
- Steganos Privacy/Security Suite (.sef, .sle)
- TrueCrypt
- White Noise Storm (WNSTORM)
- Xidie Secure Archives
- XIP
- ZED
[edit] Digital rights management (DRM)
Main article: Digital Rights Management
- Content Scramble System (used on DVDs)
[edit]
(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)
[edit] Ransomware
Additional formats may be listed at Ransomware.
[edit] Steganography
- 4t HIT Mail Privacy Lite
- AnyFile2Image
- ARMaHYDAN
- BDV DataHider
- Black Wolf's Picture Encoder (StegoDos)
- BlindSide
- Camera/Shy
- Contraband
- CryptoStego
- CryptoStego - YASS version
- Crypture
- DC-Stegano
- DeepSound
- defy
- Digital Invisible Ink Toolkit
- Dound's Steganographer
- Encrypt Pic
- eShow
- EyeMage IIE
- File-Encryptor
- FireSteg
- Gif-It-Up
- gifshuffle
- Hallucinate
- Hide'N'Send
- Hide and Seek (HideSeek)
- Hide In Picture
- Hydan
- ImageContainer
- ImageHide
- ImageHide (dilshan)
- imagehide (techraj)
- Image Steganography (cpascoe)
- Image Steganography using Python
- InPlainView
- InThePicture
- Invisible Secrets
- JHide
- JPHS (JPHide/JPSeek)
- JSteg
- jsteg (Luke Champine)
- M4JPEG
- Magikfs
- Message Smuggler
- MP3 File Hider
- MP3Stego
- mp3stegz
- MSU StegoVideo
- OpenPuff
- OpenStego
- OutGuess
- PiggyPack
- QuickCrypto
- QuickStego
- rSteg
- rsteg (xgi)
- S-Tools
- Sealed
- Secret Layer
- SecretSpace
- SilentEye
- SNOW/stegsnow
- SSuite Picsel
- Stash-It (Stash)
- steg86
- stegan (edma2)
- Stegan (Von Mbah)
- Stegano
- SteganoGifPaletteOrder (SGPO)
- SteganographX Plus
- Steganography (FortKnox)
- Steganography Online Codec
- steganos
- Steganos Privacy/Security Suite
- steganotool
- SteganPEG
- stegfs
- steghide
- Stego WAV
- stego-wave
- stegodon
- StegoMagic
- StegoShare
- StegoStick
- Stegosuite
- StegoWav (Peter Heist)
- stegowav (robert461)
- Twitter Secret Messages (Steg Of The Dump)
- Unicode Steganography (unisteg)
- Virtual Steganographic Laboratory (VSL)
- Vodka-Tonic
- wbStego
- Whitespace
- White Noise Storm (WNSTORM)
- Xiao Steganography
- Xidie Security Suite
- yass-js
- yeo
[edit] Steganographic algorithms
(See also: Data Hiding/Embedding)
[edit] Obfuscation
(make one type of file appear as a different type of file or no type at all)
- BMP Wrap
- bmpPacker
- Empty Picture
- Exclusive Or
- EyeMage IIE
- File2PNG
- file2png (Sneed)
- File2PNG (softenko)
- Hallucinate
- ImPack
- nicetext
- Piet - create images that are programs
- PngBin
- ROT13
- s2png
- Sam's Big Play Maker
- Stealth
- Steganosaurus (stego)
- Texto
- tk
- UDS : Unlimited Drive Storage
- Wrapster
- ZIPD
[edit] Miscellaneous
[edit] See also
See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.
[edit] External links
[edit] Security techniques
- One way to keep your documents secure...
- Is It the Dawn of the Encryption App?
- Amid NSA uproar, encryption-standards body defends process
- STEED: project to create nonproprietary encryption
- Defending Against Crypto Backdoors
- Dark Mail Alliance - developing end-to-end encryption for e-mail
- FLOSS Manuals content being used in CryptoParties
- Cryptography Breakthrough Could Make Software Unhackable
- Time-capsule crypto to help journalists protect their sources
[edit] Code breaking, bugs, and back doors
- Breaking Hard-Disk Encryption
- Password Cracking AES-256 DMGs and Epic Self-Pwnage
- Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
- SSL: Intercepted today, decrypted tomorrow
- Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
- Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
- Researchers challenge Apple's claim of unbreakable iMessage encryption
- NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal
- Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010
- SSL3 “POODLE” Vulnerability
[edit] Unsolved (or finally-solved) codes/ciphers
- 70-year old code uncracked
- Mysterious coded messages at university library
- 7 Codes You’ll Never Ever Break
- World's most mysterious manuscript has genuine message
- Zodiac Killer cipher is cracked after eluding sleuths for 51 years
[edit] Tools, Utilities, and Software
- Encryption Detection: COPTR
- LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.
- Keybase: look up public keys connected with social-media usernames
- Easy Hash: free program which can calculate over 180 hash functions and checksums
[edit] Miscellaneous
- Cryptofloricon: send a message with flowers (not a secret one, though, since the decryption key is on the website!)
- Memo to the Amateur Cipher Designer
- Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)
- Check Out the Cipher from an Assassination Attempt on Queen Elizabeth
- Crypto Won’t Save You Either
- Programming-contest entries to hide a nasty message in note to boss
- The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison
- Mozilla Password Based Encryption