Category:Cryptography
Template:Cmbox Template:Single namespace Template:Sister project Template:Cat main Cryptography is the study of ways to convert information from its normal, comprehensible form into an obscured guise, unreadable without special knowledge — the practice of encryption. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, the field of cryptography has expanded its remit. Examples include schemes like digital signatures and digital cash, digital rights management for intellectual property protection, and securing electronic commerce. Cryptography is now often built into the infrastructure for computing and telecommunications; users may not even be aware of its presence. Script error: No such module "Labelled list hatnote". Template:Cryptography navbox Template:CatAutoTOC
Subcategories
This category has the following 16 subcategories, out of 16 total.
A
- Cryptographic attacks (65 P)
C
H
K
- Key management (50 P)
L
P
- Cryptographic primitives (19 P)
- Cryptographic protocols (67 P)
S
- Cryptography standards (20 P)
- Steganography (17 P)
T
- Theory of cryptography (34 P)
Script error: No such module "anchor".Pages in category "Cryptography"
The following 99 pages are in this category, out of 99 total.
C
- Chaffing and winnowing
- Chaos Communication Congress
- Cipher
- Ciphertext
- Ciphertext expansion
- Code (cryptography)
- Code word (communication)
- Codebook
- Codress message
- Communications security
- Completeness (cryptography)
- Computer security
- Conjugate coding
- Correlation immunity
- Cover (telecommunications)
- Cover-coding
- Critical security parameter
- Cryptochannel
- Cryptographic module
- Cryptographic Service Provider
- Cryptosystem
- Cryptovirology
M
P
S
- S/MIME
- Salt (cryptography)
- Scrambler
- Secret sharing
- Secure channel
- Secure Hash Algorithms
- Secure two-party computation
- Secure voice
- Security association
- Security parameter
- Security protocol notation
- Security through obscurity
- Self-shrinking generator
- SFINKS
- Signals intelligence
- SIPRNet
- Snake oil (cryptography)
- Software token
- Strong cryptography