Encryption
From Just Solve the File Format Problem
				
								
				Revision as of 22:46, 5 November 2023 by Parchivist  (Talk | contribs)
Contents | 
Ciphers
Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
Password hashes
See also passwd#Password field.
Formats and protocols
- Cloak (.clk)
 - Cryptoloop
 - DissidentX
 - dm-crypt
 - Codecrypt
 - FractalCrypt
 - Horcrux (jesseduffield)
 - Horcrux (kndyry)
 - icecrypt
 - inKey (.iK)
 - Invisible Secrets (.isc)
 - IZE
 - Javascript Object Signing and Encryption (JOSE)
 - JSON Web Encryption (JWE)
 - Loop-AES
 - LUKS
 - Max File Encryption (.mfe)
 - MCrypt (.nc)
 - Message Smuggler (.enc)
 - OpenSSL salted format
 - PAE
 - PAE2
 - PGP
 - SDN (SDN Project)
 - Silent Circle Instant Messaging Protocol
 - SSL
 - TrueCrypt
 - White Noise Storm (WNSTORM)
 - Xidie Secure Archives
 - XIP
 - ZED
 
Digital rights management (DRM)
Main article: Digital Rights Management
- Content Scramble System (used on DVDs)
 
(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)
Ransomware
Additional formats may be listed at Ransomware.
Steganography
- 4t HIT Mail Privacy Lite
 - AnyFile2Image
 - ARMaHYDAN
 - BDV DataHider
 - Black Wolf's Picture Encoder (StegoDos)
 - BlindSide
 - Camera/Shy
 - Contraband
 - CryptoStego
 - CryptoStego - YASS version
 - DC-Stegano
 - defy
 - Digital Invisible Ink Toolkit
 - Dound's Steganographer
 - Encrypt Pic
 - EyeMage IIE
 - File-Encryptor
 - FireSteg
 - Gif-It-Up
 - gifshuffle
 - Hallucinate
 - Hide'N'Send
 - Hide and Seek (HideSeek)
 - Hide In Picture
 - Hydan
 - ImageContainer
 - ImageHide
 - ImageHide (dilshan)
 - imagehide (techraj)
 - Image Steganography using Python
 - InPlainView
 - InThePicture
 - Invisible Secrets
 - JHide
 - JPHS (JPHide/JPSeek)
 - JSteg
 - jsteg (Luke Champine)
 - M4JPEG
 - Magikfs
 - Message Smuggler
 - MP3 File Hider
 - MP3Stego
 - MSU StegoVideo
 - OpenStego
 - OutGuess
 - PiggyPack
 - QuickCrypto
 - QuickStego
 - rSteg
 - rsteg (xgi)
 - S-Tools
 - Sealed
 - SecretSpace
 - SilentEye
 - SNOW/stegsnow
 - SSuite Picsel
 - Stash-It (Stash)
 - steg86
 - stegan (edma2)
 - Stegan (Von Mbah)
 - Stegano
 - Steganography (FortKnox)
 - Steganography Online Codec
 - steganos
 - SteganPEG
 - stegfs
 - steghide
 - Stego WAV
 - stego-wave
 - stegodon
 - StegoMagic
 - StegoShare
 - StegoStick
 - Stegosuite
 - StegoWav (Peter Heist)
 - stegowav (robert461)
 - Twitter Secret Messages (Steg Of The Dump)
 - Unicode Steganography (unisteg)
 - Virtual Steganographic Laboratory (VSL)
 - wbStego
 - Whitespace
 - White Noise Storm (WNSTORM)
 - Xidie Security Suite
 - yass-js
 - yeo
 
Steganographic algorithms
(See also: Data Hiding/Embedding)
Obfuscation
(make one type of file appear as a different type of file or no type at all)
- bmpPacker
 - Exclusive Or
 - EyeMage IIE
 - File2PNG
 - file2png (Sneed)
 - File2PNG (softenko)
 - Hallucinate
 - nicetext
 - Piet - create images that are programs
 - PngBin
 - ROT13
 - s2png
 - Sam's Big Play Maker
 - Stealth
 - Steganosaurus (stego)
 - Texto
 - tk
 - UDS : Unlimited Drive Storage
 - Wrapster
 - ZIPD
 
Miscellaneous
See also
See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.
External links
Security techniques
- One way to keep your documents secure...
 - Is It the Dawn of the Encryption App?
 - Amid NSA uproar, encryption-standards body defends process
 - STEED: project to create nonproprietary encryption
 - Defending Against Crypto Backdoors
 - Dark Mail Alliance - developing end-to-end encryption for e-mail
 - FLOSS Manuals content being used in CryptoParties
 - Cryptography Breakthrough Could Make Software Unhackable
 - Time-capsule crypto to help journalists protect their sources
 
Code breaking, bugs, and back doors
- Breaking Hard-Disk Encryption
 - Password Cracking AES-256 DMGs and Epic Self-Pwnage
 - Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
 - SSL: Intercepted today, decrypted tomorrow
 - Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
 - Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
 - Researchers challenge Apple's claim of unbreakable iMessage encryption
 - NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal
 - Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010
 - SSL3 “POODLE” Vulnerability
 
Unsolved (or finally-solved) codes/ciphers
- 70-year old code uncracked
 - Mysterious coded messages at university library
 - 7 Codes You’ll Never Ever Break
 - World's most mysterious manuscript has genuine message
 - Zodiac Killer cipher is cracked after eluding sleuths for 51 years
 
Tools, Utilities, and Software
- Encryption Detection: COPTR
 - LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.
 - Keybase: look up public keys connected with social-media usernames
 - Easy Hash: free program which can calculate over 180 hash functions and checksums
 
Miscellaneous
- Cryptofloricon: send a message with flowers (not a secret one, though, since the decryption key is on the website!)
 - Memo to the Amateur Cipher Designer
 - Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)
 - Check Out the Cipher from an Assassination Attempt on Queen Elizabeth
 - Crypto Won’t Save You Either
 - Programming-contest entries to hide a nasty message in note to boss
 - The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison
 - Mozilla Password Based Encryption