Encryption
From Just Solve the File Format Problem
(Difference between revisions)
Dan Tobias (Talk | contribs) (→External links) |
(→Formats and protocols) |
||
(30 intermediate revisions by 4 users not shown) | |||
Line 5: | Line 5: | ||
}} | }} | ||
== Ciphers == | == Ciphers == | ||
− | * [[ | + | * [[AES]] |
− | * [[ | + | * [[Blowfish]] |
+ | * [[ChaCha]] | ||
+ | * [[DES]] | ||
* [[RC4]] | * [[RC4]] | ||
* [[Triple DES]] | * [[Triple DES]] | ||
== Cryptographic hash functions == | == Cryptographic hash functions == | ||
+ | * [[BLAKE]] | ||
+ | * [[BLAKE2]] | ||
* [[MD4]] | * [[MD4]] | ||
* [[MD5]] | * [[MD5]] | ||
Line 21: | Line 25: | ||
== Password hashes == | == Password hashes == | ||
+ | * [[Argon2]] | ||
* [[bcrypt]] | * [[bcrypt]] | ||
− | * [[ | + | * [[passwd#crypt|crypt]] |
* [[PBKDF2]] | * [[PBKDF2]] | ||
* [[scrypt]] | * [[scrypt]] | ||
+ | |||
+ | See also [[passwd#Password field]]. | ||
== Formats and protocols == | == Formats and protocols == | ||
Line 30: | Line 37: | ||
* [[DissidentX]] | * [[DissidentX]] | ||
* [[dm-crypt]] | * [[dm-crypt]] | ||
+ | * [[Codecrypt]] | ||
+ | * [[Horcrux (jesseduffield)]] | ||
+ | * [[Horcrux (kndyry)]] | ||
+ | * [[IZE]] | ||
+ | * [[Javascript Object Signing and Encryption]] (JOSE) | ||
+ | * [[JSON Web Encryption]] (JWE) | ||
* [[Loop-AES]] | * [[Loop-AES]] | ||
* [[LUKS]] | * [[LUKS]] | ||
+ | * [[MCrypt]] (.nc) | ||
* [[OpenSSL salted format]] | * [[OpenSSL salted format]] | ||
+ | * [[PAE]] | ||
+ | * [[PAE2]] | ||
* [[PGP]] | * [[PGP]] | ||
+ | ** [[PGP public key]] | ||
+ | * [[SDN (SDN Project)]] | ||
* [[Silent Circle Instant Messaging Protocol]] | * [[Silent Circle Instant Messaging Protocol]] | ||
* [[SSL]] | * [[SSL]] | ||
* [[TrueCrypt]] | * [[TrueCrypt]] | ||
+ | * [[XIP]] | ||
+ | * [[ZED]] | ||
== Digital rights management (DRM) == | == Digital rights management (DRM) == | ||
+ | Main article: [[Digital Rights Management]] | ||
+ | |||
* [[Content Scramble System]] (used on DVDs) | * [[Content Scramble System]] (used on DVDs) | ||
− | == | + | == Blockchain-related systems == |
+ | (see also [[Currency]], where most such systems, including [[Bitcoin]], are documented; however, applications of blockchain technology beyond currency use are now appearing) | ||
+ | * [[Tezos]] | ||
+ | |||
+ | == [[Ransomware]] == | ||
* [[Cryptolocker]] | * [[Cryptolocker]] | ||
+ | |||
+ | == Miscellaneous == | ||
+ | * [[Doom cheat code encryption]] | ||
+ | * [[Exclusive Or]] | ||
+ | * [[Mono]] | ||
+ | * [[OpenSSL]] | ||
* [[ROT13]] | * [[ROT13]] | ||
+ | * [[Shamir's Secret Sharing]] | ||
+ | * [[Steganography]] | ||
== See also == | == See also == | ||
Line 71: | Line 105: | ||
* [http://boingboing.net/2013/12/20/nsa-had-secret-deal-on-back-do.html NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal] | * [http://boingboing.net/2013/12/20/nsa-had-secret-deal-on-back-do.html NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal] | ||
* [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010] | * [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010] | ||
+ | * [http://security.stackexchange.com/questions/70719/ssl3-poodle-vulnerability SSL3 “POODLE” Vulnerability] | ||
− | === Unsolved codes/ciphers === | + | === Unsolved (or finally-solved) codes/ciphers === |
* [http://mobile.reuters.com/article/idUSBRE8AM0E520121123?irpc=932 70-year old code uncracked] | * [http://mobile.reuters.com/article/idUSBRE8AM0E520121123?irpc=932 70-year old code uncracked] | ||
* [http://boingboing.net/2014/03/25/mysterious-coded-messages-at-u.html Mysterious coded messages at university library] | * [http://boingboing.net/2014/03/25/mysterious-coded-messages-at-u.html Mysterious coded messages at university library] | ||
* [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break] | * [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break] | ||
* [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message] | * [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message] | ||
+ | * [https://arstechnica.com/information-technology/2020/12/zodiac-killer-cipher-is-cracked-after-eluding-sleuths-for-51-years/ Zodiac Killer cipher is cracked after eluding sleuths for 51 years] | ||
+ | |||
+ | === Tools, Utilities, and Software === | ||
+ | * [http://coptr.digipres.org/Category:Encryption_Detection Encryption Detection: COPTR] | ||
+ | * [https://libfte.org/ LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.] | ||
+ | * [https://keybase.io/ Keybase: look up public keys connected with social-media usernames] | ||
+ | * [http://ziin.pl/en/easy_hash Easy Hash: free program which can calculate over 180 hash functions and checksums] | ||
=== Miscellaneous === | === Miscellaneous === | ||
Line 85: | Line 127: | ||
* [http://regmedia.co.uk/2014/05/16/0955_peter_gutmann.pdf Crypto Won’t Save You Either] | * [http://regmedia.co.uk/2014/05/16/0955_peter_gutmann.pdf Crypto Won’t Save You Either] | ||
* [http://codegolf.stackexchange.com/questions/32024/i-am-passive-aggressive-and-want-to-insult-my-boss-without-him-finding-out?stw=2 Programming-contest entries to hide a nasty message in note to boss] | * [http://codegolf.stackexchange.com/questions/32024/i-am-passive-aggressive-and-want-to-insult-my-boss-without-him-finding-out?stw=2 Programming-contest entries to hide a nasty message in note to boss] | ||
+ | * [http://motherboard.vice.com/read/the-secret-codes-that-cartels-use-to-send-orders-from-prison?trk_source=recommended The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison] | ||
+ | * [https://github.com/lclevy/firepwd/blob/master/mozilla_pbe.pdf Mozilla Password Based Encryption] |
Revision as of 18:18, 17 May 2022
Contents |
Ciphers
Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
Password hashes
See also passwd#Password field.
Formats and protocols
- Cryptoloop
- DissidentX
- dm-crypt
- Codecrypt
- Horcrux (jesseduffield)
- Horcrux (kndyry)
- IZE
- Javascript Object Signing and Encryption (JOSE)
- JSON Web Encryption (JWE)
- Loop-AES
- LUKS
- MCrypt (.nc)
- OpenSSL salted format
- PAE
- PAE2
- PGP
- SDN (SDN Project)
- Silent Circle Instant Messaging Protocol
- SSL
- TrueCrypt
- XIP
- ZED
Digital rights management (DRM)
Main article: Digital Rights Management
- Content Scramble System (used on DVDs)
(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)
Ransomware
Miscellaneous
See also
See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.
External links
Security techniques
- One way to keep your documents secure...
- Is It the Dawn of the Encryption App?
- Amid NSA uproar, encryption-standards body defends process
- STEED: project to create nonproprietary encryption
- Defending Against Crypto Backdoors
- Dark Mail Alliance - developing end-to-end encryption for e-mail
- FLOSS Manuals content being used in CryptoParties
- Cryptography Breakthrough Could Make Software Unhackable
- Time-capsule crypto to help journalists protect their sources
Code breaking, bugs, and back doors
- Breaking Hard-Disk Encryption
- Password Cracking AES-256 DMGs and Epic Self-Pwnage
- Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
- SSL: Intercepted today, decrypted tomorrow
- Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
- Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
- Researchers challenge Apple's claim of unbreakable iMessage encryption
- NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal
- Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010
- SSL3 “POODLE” Vulnerability
Unsolved (or finally-solved) codes/ciphers
- 70-year old code uncracked
- Mysterious coded messages at university library
- 7 Codes You’ll Never Ever Break
- World's most mysterious manuscript has genuine message
- Zodiac Killer cipher is cracked after eluding sleuths for 51 years
Tools, Utilities, and Software
- Encryption Detection: COPTR
- LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.
- Keybase: look up public keys connected with social-media usernames
- Easy Hash: free program which can calculate over 180 hash functions and checksums
Miscellaneous
- Cryptofloricon: send a message with flowers (not a secret one, though, since the decryption key is on the website!)
- Memo to the Amateur Cipher Designer
- Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)
- Check Out the Cipher from an Assassination Attempt on Queen Elizabeth
- Crypto Won’t Save You Either
- Programming-contest entries to hide a nasty message in note to boss
- The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison
- Mozilla Password Based Encryption