2017-07-27T17:52:15+03:00[Europe/Moscow] en true Cryptosystem, History of cryptography, Quantum cryptography, Backdoor (computing), Cryptography, Discrete logarithm, Elliptic curve cryptography, Encryption, Information security, RSA (cryptosystem), Visual cryptography, Data integrity, Cryptanalysis, Enigma machine, Kerckhoffs's principle, Password strength, Transport Layer Security, Colossus computer, Hardware random number generator, Electronic signature, Passphrase, Trusted Computing, Outline of cryptography, Sacher hexachord, Voice inversion, Floradora flashcards


  • Cryptosystem
    In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption).
  • History of cryptography
    Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago.
  • Quantum cryptography
    Quantum cryptography is the science of exploiting quantum mechanicalproperties to perform cryptographic tasks.
  • Backdoor (computing)
    A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc.
  • Cryptography
    Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties called adversaries.
  • Discrete logarithm
    In mathematics, a discrete logarithm is an integer k solving the equation bk = g, where b and g are elements of a finite group.
  • Elliptic curve cryptography
    Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
  • Encryption
    In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.
  • Information security
    Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction.
  • RSA (cryptosystem)
    RSA is one of the first practical public-key cryptosystems and is widely used for secure data transmission.
  • Visual cryptography
    Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes the job of the person to decrypt via sight reading.
  • Data integrity
    Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.
  • Cryptanalysis
    Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems.
  • Enigma machine
    The Enigma machines were a series of electro-mechanical rotor cipher machines developed and used in the early- to mid-twentieth century to protect commercial, diplomatic and military communication.
  • Kerckhoffs's principle
    In cryptography, Kerckhoffs' principle (also called Kerckhoffs' desideratum, Kerckhoffs' assumption, axiom, or law) was stated by Dutch cryptographer Auguste Kerckhoffs in the 19th century: A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.
  • Password strength
    Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks.
  • Transport Layer Security
    Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols that provide communications security over a computer network.
  • Colossus computer
    Colossus was the name of a series of computers developed by British codebreakers in 1943-1945 to help in the cryptanalysis of the Lorenz cipher.
  • Hardware random number generator
    In computing, a hardware random number generator (TRNG, True Random Number Generator) is a device that generates random numbers from a physical process, rather than a computer program.
  • Electronic signature
    An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign.
  • Passphrase
    A passphrase is a sequence of words or other text used to control access to a computer system, program or data.
  • Trusted Computing
    Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group.
  • Outline of cryptography
    The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information.
  • Sacher hexachord
    The Sacher hexachord (6-Z11, musical cryptogram on the name of Swiss conductor Paul Sacher) is a hexachord notable for its use in twelve compositions (12 Hommages à Paul Sacher) created at the invitation of Mstislav Rostropovich for Sacher's seventieth birthday in 1976, including Pierre Boulez's Messagesquisse, Hans Werner Henze's Capriccio, Witold Lutosławski's Sacher Variation, and Henri Dutilleux's Trois strophes sur le nom de Sacher.
  • Voice inversion
    Voice Inversion scrambling is an analog method of obscuring the content of a transmission.
  • Floradora
    "Floradora", also called "Keyword," was a doubly enciphered diplomatic code used by the Germans during the Second World War.