Encryption
From Just Solve the File Format Problem
(Difference between revisions)
(→Miscellaneous) |
(→Formats and protocols) |
||
(13 intermediate revisions by 4 users not shown) | |||
Line 7: | Line 7: | ||
* [[AES]] | * [[AES]] | ||
* [[Blowfish]] | * [[Blowfish]] | ||
+ | * [[ChaCha]] | ||
* [[DES]] | * [[DES]] | ||
* [[RC4]] | * [[RC4]] | ||
Line 12: | Line 13: | ||
== Cryptographic hash functions == | == Cryptographic hash functions == | ||
+ | * [[BLAKE]] | ||
+ | * [[BLAKE2]] | ||
* [[MD4]] | * [[MD4]] | ||
* [[MD5]] | * [[MD5]] | ||
Line 22: | Line 25: | ||
== Password hashes == | == Password hashes == | ||
+ | * [[Argon2]] | ||
* [[bcrypt]] | * [[bcrypt]] | ||
* [[passwd#crypt|crypt]] | * [[passwd#crypt|crypt]] | ||
Line 33: | Line 37: | ||
* [[DissidentX]] | * [[DissidentX]] | ||
* [[dm-crypt]] | * [[dm-crypt]] | ||
+ | * [[Codecrypt]] | ||
+ | * [[Horcrux (jesseduffield)]] | ||
+ | * [[Horcrux (kndyry)]] | ||
+ | * [[IZE]] | ||
* [[Javascript Object Signing and Encryption]] (JOSE) | * [[Javascript Object Signing and Encryption]] (JOSE) | ||
* [[JSON Web Encryption]] (JWE) | * [[JSON Web Encryption]] (JWE) | ||
Line 39: | Line 47: | ||
* [[MCrypt]] (.nc) | * [[MCrypt]] (.nc) | ||
* [[OpenSSL salted format]] | * [[OpenSSL salted format]] | ||
+ | * [[PAE]] | ||
+ | * [[PAE2]] | ||
* [[PGP]] | * [[PGP]] | ||
** [[PGP public key]] | ** [[PGP public key]] | ||
+ | * [[SDN (SDN Project)]] | ||
* [[Silent Circle Instant Messaging Protocol]] | * [[Silent Circle Instant Messaging Protocol]] | ||
* [[SSL]] | * [[SSL]] | ||
* [[TrueCrypt]] | * [[TrueCrypt]] | ||
+ | * [[XIP]] | ||
+ | * [[ZED]] | ||
== Digital rights management (DRM) == | == Digital rights management (DRM) == | ||
+ | Main article: [[Digital Rights Management]] | ||
+ | |||
* [[Content Scramble System]] (used on DVDs) | * [[Content Scramble System]] (used on DVDs) | ||
Line 52: | Line 67: | ||
* [[Tezos]] | * [[Tezos]] | ||
− | == | + | == [[Ransomware]] == |
* [[Cryptolocker]] | * [[Cryptolocker]] | ||
+ | |||
+ | == Miscellaneous == | ||
+ | * [[Doom cheat code encryption]] | ||
* [[Exclusive Or]] | * [[Exclusive Or]] | ||
* [[Mono]] | * [[Mono]] | ||
* [[OpenSSL]] | * [[OpenSSL]] | ||
* [[ROT13]] | * [[ROT13]] | ||
+ | * [[Shamir's Secret Sharing]] | ||
+ | * [[Steganography]] | ||
== See also == | == See also == | ||
Line 87: | Line 107: | ||
* [http://security.stackexchange.com/questions/70719/ssl3-poodle-vulnerability SSL3 “POODLE” Vulnerability] | * [http://security.stackexchange.com/questions/70719/ssl3-poodle-vulnerability SSL3 “POODLE” Vulnerability] | ||
− | === Unsolved codes/ciphers === | + | === Unsolved (or finally-solved) codes/ciphers === |
* [http://mobile.reuters.com/article/idUSBRE8AM0E520121123?irpc=932 70-year old code uncracked] | * [http://mobile.reuters.com/article/idUSBRE8AM0E520121123?irpc=932 70-year old code uncracked] | ||
* [http://boingboing.net/2014/03/25/mysterious-coded-messages-at-u.html Mysterious coded messages at university library] | * [http://boingboing.net/2014/03/25/mysterious-coded-messages-at-u.html Mysterious coded messages at university library] | ||
* [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break] | * [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break] | ||
* [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message] | * [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message] | ||
+ | * [https://arstechnica.com/information-technology/2020/12/zodiac-killer-cipher-is-cracked-after-eluding-sleuths-for-51-years/ Zodiac Killer cipher is cracked after eluding sleuths for 51 years] | ||
=== Tools, Utilities, and Software === | === Tools, Utilities, and Software === | ||
Line 97: | Line 118: | ||
* [https://libfte.org/ LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.] | * [https://libfte.org/ LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.] | ||
* [https://keybase.io/ Keybase: look up public keys connected with social-media usernames] | * [https://keybase.io/ Keybase: look up public keys connected with social-media usernames] | ||
+ | * [http://ziin.pl/en/easy_hash Easy Hash: free program which can calculate over 180 hash functions and checksums] | ||
=== Miscellaneous === | === Miscellaneous === |
Revision as of 18:18, 17 May 2022
Contents |
Ciphers
Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
Password hashes
See also passwd#Password field.
Formats and protocols
- Cryptoloop
- DissidentX
- dm-crypt
- Codecrypt
- Horcrux (jesseduffield)
- Horcrux (kndyry)
- IZE
- Javascript Object Signing and Encryption (JOSE)
- JSON Web Encryption (JWE)
- Loop-AES
- LUKS
- MCrypt (.nc)
- OpenSSL salted format
- PAE
- PAE2
- PGP
- SDN (SDN Project)
- Silent Circle Instant Messaging Protocol
- SSL
- TrueCrypt
- XIP
- ZED
Digital rights management (DRM)
Main article: Digital Rights Management
- Content Scramble System (used on DVDs)
(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)
Ransomware
Miscellaneous
See also
See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.
External links
Security techniques
- One way to keep your documents secure...
- Is It the Dawn of the Encryption App?
- Amid NSA uproar, encryption-standards body defends process
- STEED: project to create nonproprietary encryption
- Defending Against Crypto Backdoors
- Dark Mail Alliance - developing end-to-end encryption for e-mail
- FLOSS Manuals content being used in CryptoParties
- Cryptography Breakthrough Could Make Software Unhackable
- Time-capsule crypto to help journalists protect their sources
Code breaking, bugs, and back doors
- Breaking Hard-Disk Encryption
- Password Cracking AES-256 DMGs and Epic Self-Pwnage
- Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
- SSL: Intercepted today, decrypted tomorrow
- Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
- Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
- Researchers challenge Apple's claim of unbreakable iMessage encryption
- NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal
- Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010
- SSL3 “POODLE” Vulnerability
Unsolved (or finally-solved) codes/ciphers
- 70-year old code uncracked
- Mysterious coded messages at university library
- 7 Codes You’ll Never Ever Break
- World's most mysterious manuscript has genuine message
- Zodiac Killer cipher is cracked after eluding sleuths for 51 years
Tools, Utilities, and Software
- Encryption Detection: COPTR
- LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.
- Keybase: look up public keys connected with social-media usernames
- Easy Hash: free program which can calculate over 180 hash functions and checksums
Miscellaneous
- Cryptofloricon: send a message with flowers (not a secret one, though, since the decryption key is on the website!)
- Memo to the Amateur Cipher Designer
- Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)
- Check Out the Cipher from an Assassination Attempt on Queen Elizabeth
- Crypto Won’t Save You Either
- Programming-contest entries to hide a nasty message in note to boss
- The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison
- Mozilla Password Based Encryption