Encryption

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
(External links)
(Miscellaneous)
(33 intermediate revisions by 2 users not shown)
Line 5: Line 5:
 
}}
 
}}
 
== Ciphers ==
 
== Ciphers ==
* [[Advanced Encryption Standard|AES]]
+
* [[AES]]
* [[Data Encryption Standard|DES]]
+
* [[Blowfish]]
 +
* [[DES]]
 +
* [[RC4]]
 
* [[Triple DES]]
 
* [[Triple DES]]
  
Line 18: Line 20:
 
* [[SHA-3]]
 
* [[SHA-3]]
 
For non-cryptographic hash functions, see [[Error detection and correction]].
 
For non-cryptographic hash functions, see [[Error detection and correction]].
 +
 +
== Password hashes ==
 +
* [[bcrypt]]
 +
* [[passwd#crypt|crypt]]
 +
* [[PBKDF2]]
 +
* [[scrypt]]
 +
 +
See also [[passwd#Password field]].
  
 
== Formats and protocols ==
 
== Formats and protocols ==
Line 23: Line 33:
 
* [[DissidentX]]
 
* [[DissidentX]]
 
* [[dm-crypt]]
 
* [[dm-crypt]]
 +
* [[Javascript Object Signing and Encryption]] (JOSE)
 +
* [[JSON Web Encryption]] (JWE)
 
* [[Loop-AES]]
 
* [[Loop-AES]]
 
* [[LUKS]]
 
* [[LUKS]]
 +
* [[MCrypt]] (.nc)
 
* [[OpenSSL salted format]]
 
* [[OpenSSL salted format]]
 
* [[PGP]]
 
* [[PGP]]
 +
** [[PGP public key]]
 
* [[Silent Circle Instant Messaging Protocol]]
 
* [[Silent Circle Instant Messaging Protocol]]
 
* [[SSL]]
 
* [[SSL]]
Line 32: Line 46:
  
 
== Digital rights management (DRM) ==
 
== Digital rights management (DRM) ==
 +
Main article: [[Digital Rights Management]]
 +
 
* [[Content Scramble System]] (used on DVDs)
 
* [[Content Scramble System]] (used on DVDs)
 +
 +
== Blockchain-related systems ==
 +
(see also [[Currency]], where most such systems, including [[Bitcoin]], are documented; however, applications of blockchain technology beyond currency use are now appearing)
 +
* [[Tezos]]
  
 
== Miscellaneous ==
 
== Miscellaneous ==
 +
* [[Cryptolocker]]
 +
* [[Exclusive Or]]
 +
* [[Mono]]
 +
* [[OpenSSL]]
 
* [[ROT13]]
 
* [[ROT13]]
 +
* [[Steganography]]
  
 
== See also ==
 
== See also ==
See also [[Security]]. Various other formats, including [[compression]], [[archiving]], and [[filesystem]] formats, may support encryption as a built-in feature or through plug-ins.
+
See also [[Security]] for information on digital certificates and electronic signing. Various other formats, including [[compression]], [[archiving]], and [[filesystem]] formats, may support encryption as a built-in feature or through plug-ins.
  
 
== External links ==
 
== External links ==
* [http://mobile.reuters.com/article/idUSBRE8AM0E520121123?irpc=932 70-year old code uncracked]
+
 
* [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break]
+
=== Security techniques ===
* [http://www.schneier.com/blog/archives/2012/12/breaking_hard-d.html Breaking Hard-Disk Encryption]
+
 
* [http://boingboing.net/2013/02/22/secure-documents.html One way to keep your documents secure...]
 
* [http://boingboing.net/2013/02/22/secure-documents.html One way to keep your documents secure...]
* [http://blog.whitehatsec.com/cracking-aes-256-dmgs-and-epic-self-pwnage/ Password Cracking AES-256 DMGs and Epic Self-Pwnage]
 
* [http://www.wired.com/wiredscience/2013/06/quantum-cryptography-hack/ Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not]
 
* [http://news.netcraft.com/archives/2013/06/25/ssl-intercepted-today-decrypted-tomorrow.html SSL: Intercepted today, decrypted tomorrow]
 
* [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message]
 
 
* [https://mashable.com/2013/06/28/encryption-apps/ Is It the Dawn of the Encryption App?]
 
* [https://mashable.com/2013/06/28/encryption-apps/ Is It the Dawn of the Encryption App?]
* [http://boingboing.net/2013/09/05/report-nsa-slices-through-mos.html Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden]
 
 
* [http://news.cnet.com/8301-13578_3-57602246-38/amid-nsa-uproar-encryption-standards-body-defends-process/ Amid NSA uproar, encryption-standards body defends process]
 
* [http://news.cnet.com/8301-13578_3-57602246-38/amid-nsa-uproar-encryption-standards-body-defends-process/ Amid NSA uproar, encryption-standards body defends process]
 
* [http://blogs.fsfe.org/greve/?p=634 STEED: project to create nonproprietary encryption]
 
* [http://blogs.fsfe.org/greve/?p=634 STEED: project to create nonproprietary encryption]
* [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010]
 
* [http://www.macworld.com/article/2055640/researchers-challenge-apples-claim-of-unbreakable-imessage-encryption.html Researchers challenge Apple's claim of unbreakable iMessage encryption]
 
 
* [https://www.schneier.com/blog/archives/2013/10/defending_again_1.html Defending Against Crypto Backdoors]
 
* [https://www.schneier.com/blog/archives/2013/10/defending_again_1.html Defending Against Crypto Backdoors]
 
* [http://www.darkmail.info/ Dark Mail Alliance] - developing end-to-end encryption for e-mail
 
* [http://www.darkmail.info/ Dark Mail Alliance] - developing end-to-end encryption for e-mail
* [http://boingboing.net/2013/12/20/nsa-had-secret-deal-on-back-do.html NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal]
 
* [http://www.bbc.co.uk/news/technology-25506020 Cryptolocker ransomware has 'infected about 250,000 PCs']
 
 
* [http://www.flossmanuals.org/news/floss-manuals-content-being-used-cryptoparties FLOSS Manuals content being used in CryptoParties]
 
* [http://www.flossmanuals.org/news/floss-manuals-content-being-used-cryptoparties FLOSS Manuals content being used in CryptoParties]
 
* [http://www.wired.com/wiredscience/2014/02/cryptography-breakthrough/all/ Cryptography Breakthrough Could Make Software Unhackable]
 
* [http://www.wired.com/wiredscience/2014/02/cryptography-breakthrough/all/ Cryptography Breakthrough Could Make Software Unhackable]
 +
* [http://boingboing.net/2014/06/09/time-capsule-crypto-to-help-jo.html Time-capsule crypto to help journalists protect their sources]
 +
 +
=== Code breaking, bugs, and back doors ===
 +
* [http://www.schneier.com/blog/archives/2012/12/breaking_hard-d.html Breaking Hard-Disk Encryption]
 +
* [http://blog.whitehatsec.com/cracking-aes-256-dmgs-and-epic-self-pwnage/ Password Cracking AES-256 DMGs and Epic Self-Pwnage]
 +
* [http://www.wired.com/wiredscience/2013/06/quantum-cryptography-hack/ Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not]
 +
* [http://news.netcraft.com/archives/2013/06/25/ssl-intercepted-today-decrypted-tomorrow.html SSL: Intercepted today, decrypted tomorrow]
 +
* [http://boingboing.net/2013/09/05/report-nsa-slices-through-mos.html Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden]
 +
* [http://arstechnica.com/security/2014/03/critical-crypto-bug-leaves-linux-hundreds-of-apps-open-to-eavesdropping/ Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping]
 +
* [http://www.macworld.com/article/2055640/researchers-challenge-apples-claim-of-unbreakable-imessage-encryption.html Researchers challenge Apple's claim of unbreakable iMessage encryption]
 +
* [http://boingboing.net/2013/12/20/nsa-had-secret-deal-on-back-do.html NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal]
 +
* [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010]
 +
* [http://security.stackexchange.com/questions/70719/ssl3-poodle-vulnerability SSL3 “POODLE” Vulnerability]
 +
 +
=== Unsolved codes/ciphers ===
 +
* [http://mobile.reuters.com/article/idUSBRE8AM0E520121123?irpc=932 70-year old code uncracked]
 +
* [http://boingboing.net/2014/03/25/mysterious-coded-messages-at-u.html Mysterious coded messages at university library]
 +
* [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break]
 +
* [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message]
 +
 +
=== Tools, Utilities, and Software ===
 +
* [http://coptr.digipres.org/Category:Encryption_Detection Encryption Detection: COPTR]
 +
* [https://libfte.org/ LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.]
 +
* [https://keybase.io/ Keybase: look up public keys connected with social-media usernames]
 +
 +
=== Miscellaneous ===
 
* [http://cryptofloricon.com/ Cryptofloricon: send a message with flowers] (not a ''secret'' one, though, since the decryption key is on the website!)
 
* [http://cryptofloricon.com/ Cryptofloricon: send a message with flowers] (not a ''secret'' one, though, since the decryption key is on the website!)
 +
* [https://www.schneier.com/crypto-gram-9810.html#cipherdesign Memo to the Amateur Cipher Designer]
 +
* [http://www.theonion.com/articles/fasttalking-computer-hacker-just-has-to-break-thro,32000/ Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)]
 +
* [http://io9.com/check-out-the-cipher-from-an-assassination-attempt-on-q-1567478070 Check Out the Cipher from an Assassination Attempt on Queen Elizabeth]
 +
* [http://regmedia.co.uk/2014/05/16/0955_peter_gutmann.pdf Crypto Won’t Save You Either]
 +
* [http://codegolf.stackexchange.com/questions/32024/i-am-passive-aggressive-and-want-to-insult-my-boss-without-him-finding-out?stw=2 Programming-contest entries to hide a nasty message in note to boss]
 +
* [http://motherboard.vice.com/read/the-secret-codes-that-cartels-use-to-send-orders-from-prison?trk_source=recommended The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison]
 +
* [https://github.com/lclevy/firepwd/blob/master/mozilla_pbe.pdf Mozilla Password Based Encryption]

Revision as of 15:30, 15 June 2017

File Format
Name Encryption
Ontology

{{{caption}}}

Contents

Ciphers

Cryptographic hash functions

For non-cryptographic hash functions, see Error detection and correction.

Password hashes

See also passwd#Password field.

Formats and protocols

Digital rights management (DRM)

Main article: Digital Rights Management

Blockchain-related systems

(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)

Miscellaneous

See also

See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.

External links

Security techniques

Code breaking, bugs, and back doors

Unsolved codes/ciphers

Tools, Utilities, and Software

Miscellaneous

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox