Encryption

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
(External links)
(44 intermediate revisions by 2 users not shown)
Line 5: Line 5:
 
}}
 
}}
 
== Ciphers ==
 
== Ciphers ==
* [[Advanced Encryption Standard|AES]]
+
* [[AES]]
* [[Data Encryption Standard|DES]]
+
* [[Blowfish]]
 +
* [[DES]]
 +
* [[RC4]]
 
* [[Triple DES]]
 
* [[Triple DES]]
  
 
== Cryptographic hash functions ==
 
== Cryptographic hash functions ==
 +
* [[BLAKE]]
 +
* [[BLAKE2]]
 
* [[MD4]]
 
* [[MD4]]
 
* [[MD5]]
 
* [[MD5]]
Line 18: Line 22:
 
* [[SHA-3]]
 
* [[SHA-3]]
 
For non-cryptographic hash functions, see [[Error detection and correction]].
 
For non-cryptographic hash functions, see [[Error detection and correction]].
 +
 +
== Password hashes ==
 +
* [[Argon2]]
 +
* [[bcrypt]]
 +
* [[passwd#crypt|crypt]]
 +
* [[PBKDF2]]
 +
* [[scrypt]]
 +
 +
See also [[passwd#Password field]].
  
 
== Formats and protocols ==
 
== Formats and protocols ==
 +
* [[Cryptoloop]]
 +
* [[DissidentX]]
 +
* [[dm-crypt]]
 +
* [[Javascript Object Signing and Encryption]] (JOSE)
 +
* [[JSON Web Encryption]] (JWE)
 +
* [[Loop-AES]]
 +
* [[LUKS]]
 +
* [[MCrypt]] (.nc)
 
* [[OpenSSL salted format]]
 
* [[OpenSSL salted format]]
 
* [[PGP]]
 
* [[PGP]]
 +
** [[PGP public key]]
 
* [[Silent Circle Instant Messaging Protocol]]
 
* [[Silent Circle Instant Messaging Protocol]]
 
* [[SSL]]
 
* [[SSL]]
 
* [[TrueCrypt]]
 
* [[TrueCrypt]]
 +
 +
== Digital rights management (DRM) ==
 +
Main article: [[Digital Rights Management]]
 +
 +
* [[Content Scramble System]] (used on DVDs)
 +
 +
== Blockchain-related systems ==
 +
(see also [[Currency]], where most such systems, including [[Bitcoin]], are documented; however, applications of blockchain technology beyond currency use are now appearing)
 +
* [[Tezos]]
  
 
== Miscellaneous ==
 
== Miscellaneous ==
 +
* [[Cryptolocker]]
 +
* [[Exclusive Or]]
 +
* [[Mono]]
 +
* [[OpenSSL]]
 
* [[ROT13]]
 
* [[ROT13]]
 +
* [[Steganography]]
  
 
== See also ==
 
== See also ==
See also [[Security]]. Various other formats, including [[compression]], [[archiving]], and [[filesystem]] formats, may support encryption as a built-in feature or through plug-ins.
+
See also [[Security]] for information on digital certificates and electronic signing. Various other formats, including [[compression]], [[archiving]], and [[filesystem]] formats, may support encryption as a built-in feature or through plug-ins.
  
 
== External links ==
 
== External links ==
* [http://mobile.reuters.com/article/idUSBRE8AM0E520121123?irpc=932 70-year old code uncracked]
+
 
* [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break]
+
=== Security techniques ===
* [http://www.schneier.com/blog/archives/2012/12/breaking_hard-d.html Breaking Hard-Disk Encryption]
+
 
* [http://boingboing.net/2013/02/22/secure-documents.html One way to keep your documents secure...]
 
* [http://boingboing.net/2013/02/22/secure-documents.html One way to keep your documents secure...]
 +
* [https://mashable.com/2013/06/28/encryption-apps/ Is It the Dawn of the Encryption App?]
 +
* [http://news.cnet.com/8301-13578_3-57602246-38/amid-nsa-uproar-encryption-standards-body-defends-process/ Amid NSA uproar, encryption-standards body defends process]
 +
* [http://blogs.fsfe.org/greve/?p=634 STEED: project to create nonproprietary encryption]
 +
* [https://www.schneier.com/blog/archives/2013/10/defending_again_1.html Defending Against Crypto Backdoors]
 +
* [http://www.darkmail.info/ Dark Mail Alliance] - developing end-to-end encryption for e-mail
 +
* [http://www.flossmanuals.org/news/floss-manuals-content-being-used-cryptoparties FLOSS Manuals content being used in CryptoParties]
 +
* [http://www.wired.com/wiredscience/2014/02/cryptography-breakthrough/all/ Cryptography Breakthrough Could Make Software Unhackable]
 +
* [http://boingboing.net/2014/06/09/time-capsule-crypto-to-help-jo.html Time-capsule crypto to help journalists protect their sources]
 +
 +
=== Code breaking, bugs, and back doors ===
 +
* [http://www.schneier.com/blog/archives/2012/12/breaking_hard-d.html Breaking Hard-Disk Encryption]
 
* [http://blog.whitehatsec.com/cracking-aes-256-dmgs-and-epic-self-pwnage/ Password Cracking AES-256 DMGs and Epic Self-Pwnage]
 
* [http://blog.whitehatsec.com/cracking-aes-256-dmgs-and-epic-self-pwnage/ Password Cracking AES-256 DMGs and Epic Self-Pwnage]
 
* [http://www.wired.com/wiredscience/2013/06/quantum-cryptography-hack/ Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not]
 
* [http://www.wired.com/wiredscience/2013/06/quantum-cryptography-hack/ Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not]
 
* [http://news.netcraft.com/archives/2013/06/25/ssl-intercepted-today-decrypted-tomorrow.html SSL: Intercepted today, decrypted tomorrow]
 
* [http://news.netcraft.com/archives/2013/06/25/ssl-intercepted-today-decrypted-tomorrow.html SSL: Intercepted today, decrypted tomorrow]
* [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message]
 
* [https://mashable.com/2013/06/28/encryption-apps/ Is It the Dawn of the Encryption App?]
 
 
* [http://boingboing.net/2013/09/05/report-nsa-slices-through-mos.html Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden]
 
* [http://boingboing.net/2013/09/05/report-nsa-slices-through-mos.html Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden]
* [http://news.cnet.com/8301-13578_3-57602246-38/amid-nsa-uproar-encryption-standards-body-defends-process/ Amid NSA uproar, encryption-standards body defends process]
+
* [http://arstechnica.com/security/2014/03/critical-crypto-bug-leaves-linux-hundreds-of-apps-open-to-eavesdropping/ Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping]
* [http://blogs.fsfe.org/greve/?p=634 STEED: project to create nonproprietary encryption]
+
* [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010]
+
 
* [http://www.macworld.com/article/2055640/researchers-challenge-apples-claim-of-unbreakable-imessage-encryption.html Researchers challenge Apple's claim of unbreakable iMessage encryption]
 
* [http://www.macworld.com/article/2055640/researchers-challenge-apples-claim-of-unbreakable-imessage-encryption.html Researchers challenge Apple's claim of unbreakable iMessage encryption]
* [https://www.schneier.com/blog/archives/2013/10/defending_again_1.html Defending Against Crypto Backdoors]
+
* [http://boingboing.net/2013/12/20/nsa-had-secret-deal-on-back-do.html NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal]
 +
* [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010]
 +
* [http://security.stackexchange.com/questions/70719/ssl3-poodle-vulnerability SSL3 “POODLE” Vulnerability]
 +
 
 +
=== Unsolved codes/ciphers ===
 +
* [http://mobile.reuters.com/article/idUSBRE8AM0E520121123?irpc=932 70-year old code uncracked]
 +
* [http://boingboing.net/2014/03/25/mysterious-coded-messages-at-u.html Mysterious coded messages at university library]
 +
* [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break]
 +
* [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message]
 +
 
 +
=== Tools, Utilities, and Software ===
 +
* [http://coptr.digipres.org/Category:Encryption_Detection Encryption Detection: COPTR]
 +
* [https://libfte.org/ LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.]
 +
* [https://keybase.io/ Keybase: look up public keys connected with social-media usernames]
 +
* [http://ziin.pl/en/easy_hash Easy Hash: free program which can calculate over 180 hash functions and checksums]
 +
 
 +
=== Miscellaneous ===
 +
* [http://cryptofloricon.com/ Cryptofloricon: send a message with flowers] (not a ''secret'' one, though, since the decryption key is on the website!)
 +
* [https://www.schneier.com/crypto-gram-9810.html#cipherdesign Memo to the Amateur Cipher Designer]
 +
* [http://www.theonion.com/articles/fasttalking-computer-hacker-just-has-to-break-thro,32000/ Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)]
 +
* [http://io9.com/check-out-the-cipher-from-an-assassination-attempt-on-q-1567478070 Check Out the Cipher from an Assassination Attempt on Queen Elizabeth]
 +
* [http://regmedia.co.uk/2014/05/16/0955_peter_gutmann.pdf Crypto Won’t Save You Either]
 +
* [http://codegolf.stackexchange.com/questions/32024/i-am-passive-aggressive-and-want-to-insult-my-boss-without-him-finding-out?stw=2 Programming-contest entries to hide a nasty message in note to boss]
 +
* [http://motherboard.vice.com/read/the-secret-codes-that-cartels-use-to-send-orders-from-prison?trk_source=recommended The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison]
 +
* [https://github.com/lclevy/firepwd/blob/master/mozilla_pbe.pdf Mozilla Password Based Encryption]

Revision as of 01:13, 23 May 2019

File Format
Name Encryption
Ontology

{{{caption}}}

Contents

Ciphers

Cryptographic hash functions

For non-cryptographic hash functions, see Error detection and correction.

Password hashes

See also passwd#Password field.

Formats and protocols

Digital rights management (DRM)

Main article: Digital Rights Management

Blockchain-related systems

(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)

Miscellaneous

See also

See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.

External links

Security techniques

Code breaking, bugs, and back doors

Unsolved codes/ciphers

Tools, Utilities, and Software

Miscellaneous

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox