Encryption

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
(See also)
(27 intermediate revisions by 2 users not shown)
Line 5: Line 5:
 
}}
 
}}
 
== Ciphers ==
 
== Ciphers ==
* [[Advanced Encryption Standard|AES]]
+
* [[AES]]
* [[Data Encryption Standard|DES]]
+
* [[Blowfish]]
 +
* [[DES]]
 +
* [[RC4]]
 
* [[Triple DES]]
 
* [[Triple DES]]
  
 
== Cryptographic hash functions ==
 
== Cryptographic hash functions ==
 +
* [[BLAKE]]
 +
* [[BLAKE2]]
 
* [[MD4]]
 
* [[MD4]]
 
* [[MD5]]
 
* [[MD5]]
Line 20: Line 24:
  
 
== Password hashes ==
 
== Password hashes ==
 +
* [[Argon2]]
 
* [[bcrypt]]
 
* [[bcrypt]]
* [[Crypt (password hash)|crypt]]
+
* [[passwd#crypt|crypt]]
 
* [[PBKDF2]]
 
* [[PBKDF2]]
 
* [[scrypt]]
 
* [[scrypt]]
 +
 +
See also [[passwd#Password field]].
  
 
== Formats and protocols ==
 
== Formats and protocols ==
Line 29: Line 36:
 
* [[DissidentX]]
 
* [[DissidentX]]
 
* [[dm-crypt]]
 
* [[dm-crypt]]
 +
* [[Javascript Object Signing and Encryption]] (JOSE)
 +
* [[JSON Web Encryption]] (JWE)
 
* [[Loop-AES]]
 
* [[Loop-AES]]
 
* [[LUKS]]
 
* [[LUKS]]
 +
* [[MCrypt]] (.nc)
 
* [[OpenSSL salted format]]
 
* [[OpenSSL salted format]]
 
* [[PGP]]
 
* [[PGP]]
 +
** [[PGP public key]]
 
* [[Silent Circle Instant Messaging Protocol]]
 
* [[Silent Circle Instant Messaging Protocol]]
 
* [[SSL]]
 
* [[SSL]]
Line 38: Line 49:
  
 
== Digital rights management (DRM) ==
 
== Digital rights management (DRM) ==
 +
Main article: [[Digital Rights Management]]
 +
 
* [[Content Scramble System]] (used on DVDs)
 
* [[Content Scramble System]] (used on DVDs)
 +
 +
== Blockchain-related systems ==
 +
(see also [[Currency]], where most such systems, including [[Bitcoin]], are documented; however, applications of blockchain technology beyond currency use are now appearing)
 +
* [[Tezos]]
  
 
== Miscellaneous ==
 
== Miscellaneous ==
 +
* [[Cryptolocker]]
 +
* [[Exclusive Or]]
 +
* [[Mono]]
 +
* [[OpenSSL]]
 
* [[ROT13]]
 
* [[ROT13]]
 +
* [[Steganography]]
  
 
== See also ==
 
== See also ==
Line 57: Line 79:
 
* [http://www.flossmanuals.org/news/floss-manuals-content-being-used-cryptoparties FLOSS Manuals content being used in CryptoParties]
 
* [http://www.flossmanuals.org/news/floss-manuals-content-being-used-cryptoparties FLOSS Manuals content being used in CryptoParties]
 
* [http://www.wired.com/wiredscience/2014/02/cryptography-breakthrough/all/ Cryptography Breakthrough Could Make Software Unhackable]
 
* [http://www.wired.com/wiredscience/2014/02/cryptography-breakthrough/all/ Cryptography Breakthrough Could Make Software Unhackable]
 +
* [http://boingboing.net/2014/06/09/time-capsule-crypto-to-help-jo.html Time-capsule crypto to help journalists protect their sources]
  
 
=== Code breaking, bugs, and back doors ===
 
=== Code breaking, bugs, and back doors ===
Line 67: Line 90:
 
* [http://www.macworld.com/article/2055640/researchers-challenge-apples-claim-of-unbreakable-imessage-encryption.html Researchers challenge Apple's claim of unbreakable iMessage encryption]
 
* [http://www.macworld.com/article/2055640/researchers-challenge-apples-claim-of-unbreakable-imessage-encryption.html Researchers challenge Apple's claim of unbreakable iMessage encryption]
 
* [http://boingboing.net/2013/12/20/nsa-had-secret-deal-on-back-do.html NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal]
 
* [http://boingboing.net/2013/12/20/nsa-had-secret-deal-on-back-do.html NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal]
* [http://www.bbc.co.uk/news/technology-25506020 Cryptolocker ransomware has 'infected about 250,000 PCs']
 
 
* [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010]
 
* [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010]
 +
* [http://security.stackexchange.com/questions/70719/ssl3-poodle-vulnerability SSL3 “POODLE” Vulnerability]
  
 
=== Unsolved codes/ciphers ===
 
=== Unsolved codes/ciphers ===
Line 75: Line 98:
 
* [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break]
 
* [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break]
 
* [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message]
 
* [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message]
 +
 +
=== Tools, Utilities, and Software ===
 +
* [http://coptr.digipres.org/Category:Encryption_Detection Encryption Detection: COPTR]
 +
* [https://libfte.org/ LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.]
 +
* [https://keybase.io/ Keybase: look up public keys connected with social-media usernames]
 +
* [http://ziin.pl/en/easy_hash Easy Hash: free program which can calculate over 180 hash functions and checksums]
  
 
=== Miscellaneous ===
 
=== Miscellaneous ===
Line 81: Line 110:
 
* [http://www.theonion.com/articles/fasttalking-computer-hacker-just-has-to-break-thro,32000/ Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)]
 
* [http://www.theonion.com/articles/fasttalking-computer-hacker-just-has-to-break-thro,32000/ Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)]
 
* [http://io9.com/check-out-the-cipher-from-an-assassination-attempt-on-q-1567478070 Check Out the Cipher from an Assassination Attempt on Queen Elizabeth]
 
* [http://io9.com/check-out-the-cipher-from-an-assassination-attempt-on-q-1567478070 Check Out the Cipher from an Assassination Attempt on Queen Elizabeth]
 +
* [http://regmedia.co.uk/2014/05/16/0955_peter_gutmann.pdf Crypto Won’t Save You Either]
 +
* [http://codegolf.stackexchange.com/questions/32024/i-am-passive-aggressive-and-want-to-insult-my-boss-without-him-finding-out?stw=2 Programming-contest entries to hide a nasty message in note to boss]
 +
* [http://motherboard.vice.com/read/the-secret-codes-that-cartels-use-to-send-orders-from-prison?trk_source=recommended The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison]
 +
* [https://github.com/lclevy/firepwd/blob/master/mozilla_pbe.pdf Mozilla Password Based Encryption]

Revision as of 01:13, 23 May 2019

File Format
Name Encryption
Ontology

{{{caption}}}

Contents

Ciphers

Cryptographic hash functions

For non-cryptographic hash functions, see Error detection and correction.

Password hashes

See also passwd#Password field.

Formats and protocols

Digital rights management (DRM)

Main article: Digital Rights Management

Blockchain-related systems

(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)

Miscellaneous

See also

See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.

External links

Security techniques

Code breaking, bugs, and back doors

Unsolved codes/ciphers

Tools, Utilities, and Software

Miscellaneous

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox