Encryption
From Just Solve the File Format Problem
Revision as of 23:16, 1 September 2023 by Parchivist (Talk | contribs)
Contents |
Ciphers
Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
Password hashes
See also passwd#Password field.
Formats and protocols
- Cryptoloop
- DissidentX
- dm-crypt
- Codecrypt
- FractalCrypt
- Horcrux (jesseduffield)
- Horcrux (kndyry)
- icecrypt
- IZE
- Javascript Object Signing and Encryption (JOSE)
- JSON Web Encryption (JWE)
- Loop-AES
- LUKS
- MCrypt (.nc)
- OpenSSL salted format
- PAE
- PAE2
- PGP
- SDN (SDN Project)
- Silent Circle Instant Messaging Protocol
- SSL
- TrueCrypt
- XIP
- ZED
Digital rights management (DRM)
Main article: Digital Rights Management
- Content Scramble System (used on DVDs)
(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)
Ransomware
Additional formats may be listed at Ransomware.
Steganography
- ARMaHYDAN
- BlindSide
- DC-Stegano
- Digital Invisible Ink Toolkit
- File-Encryptor
- FireSteg
- gifshuffle
- Hide In Picture
- Hydan
- ImageHide
- ImageHide (dilshan)
- imagehide (techraj)
- Image Steganography using Python
- InPlainView
- InThePicture
- Invisible Secrets
- JPHS (JPHide/JPSeek)
- M4JPEG
- MP3Stego
- OpenStego
- OutGuess
- PiggyPack
- QuickCrypto
- QuickStego
- SNOW/stegsnow
- steg86
- stegan (edma2)
- Stegan (Von Mbah)
- Steganography Online Codec
- steganos
- steghide
- StegoShare
- Stegosuite
- Virtual Steganographic Laboratory (VSL)
- wbStego
- Whitespace
Steganographic algorithms
(See also: Data Hiding/Embedding)
Obfuscation
(make one type of file appear as a different type of file or no type at all)
Miscellaneous
See also
See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.
External links
Security techniques
- One way to keep your documents secure...
- Is It the Dawn of the Encryption App?
- Amid NSA uproar, encryption-standards body defends process
- STEED: project to create nonproprietary encryption
- Defending Against Crypto Backdoors
- Dark Mail Alliance - developing end-to-end encryption for e-mail
- FLOSS Manuals content being used in CryptoParties
- Cryptography Breakthrough Could Make Software Unhackable
- Time-capsule crypto to help journalists protect their sources
Code breaking, bugs, and back doors
- Breaking Hard-Disk Encryption
- Password Cracking AES-256 DMGs and Epic Self-Pwnage
- Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
- SSL: Intercepted today, decrypted tomorrow
- Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
- Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
- Researchers challenge Apple's claim of unbreakable iMessage encryption
- NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal
- Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010
- SSL3 “POODLE” Vulnerability
Unsolved (or finally-solved) codes/ciphers
- 70-year old code uncracked
- Mysterious coded messages at university library
- 7 Codes You’ll Never Ever Break
- World's most mysterious manuscript has genuine message
- Zodiac Killer cipher is cracked after eluding sleuths for 51 years
Tools, Utilities, and Software
- Encryption Detection: COPTR
- LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.
- Keybase: look up public keys connected with social-media usernames
- Easy Hash: free program which can calculate over 180 hash functions and checksums
Miscellaneous
- Cryptofloricon: send a message with flowers (not a secret one, though, since the decryption key is on the website!)
- Memo to the Amateur Cipher Designer
- Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)
- Check Out the Cipher from an Assassination Attempt on Queen Elizabeth
- Crypto Won’t Save You Either
- Programming-contest entries to hide a nasty message in note to boss
- The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison
- Mozilla Password Based Encryption