| | - Modern Ciphers > Symmetric > Achterbahn
- Cryptography > Modern > Symmetric > Achterbahn Cipher
| | |
ADFGVX Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > ADFGVX Analyzer
- Cryptanalysis > Classical > ADFGVX Heuristic Analysis
- Cryptanalysis > Classical > ADFGVX Dictionary Attack
| | |
| | - Cryptography > Classical > ADFGVX Cipher
- Encryption/Decryption > Classic Encryption/Decryption > ADFGVX
| - Algorithms > Classic > ADFGVX
| Open |
| | - Modern Ciphers > Symmetric > AES
- Cryptography > Modern > Symmetric > AES Encryption with Implicit Conversion
- Cryptography > Modern > Symmetric > AES Cipher (File Input)
- Cryptography > Modern > Symmetric > AES Cipher (Text Input)
- Encryption/Decryption > Modern Encryption/Decryption > Symmetric Encryption/Decryption > AES
| - Algorithms > Symmetric > AES
- Block Ciphers > Rijndael > AES > AES128_ECB
- Block Ciphers > Rijndael > AES > AES256_CFB
- Block Ciphers > Rijndael > AES > AES192_ECB
- Block Ciphers > Rijndael > AES > AES256_CBC
- Block Ciphers > Rijndael > AES > AES128_CBC
- Block Ciphers > Rijndael > AES > AES128_CFB
- Block Ciphers > Rijndael > AES > AES192_OFB
- Block Ciphers > Rijndael > AES > AES192_CFB
- Block Ciphers > Rijndael > AES > AES256_OFB
- Block Ciphers > Rijndael > AES > AES128_OFB
- Block Ciphers > Rijndael > AES > AES256_ECB
- Block Ciphers > Rijndael > AES > AES192_CBC
| |
AES Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Modern > AES Analysis Using Entropy (1)
- Cryptanalysis > Modern > AES Known-Plaintext Analysis (1)
- Cryptanalysis > Modern > AES Analysis Using Entropy (2) – with Changeable Plaintext
- Cryptanalysis > Modern > AES Known-Plaintext Analysis (2)
- Cryptanalysis > Modern Encryption > Symmetric Encryption > AES > Ciphertext-only
- Cryptanalysis > Modern Encryption > Symmetric Encryption > AES > Known plaintext
| | Open |
AES Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | - Modern Ciphers > Symmetric > AES Visualization
- Cryptography > Modern > Symmetric > AES Visualization
| | Open |
| | | - Message Authentication Codes > CMac > CmacAES128
- Message Authentication Codes > CMac > CmacAES192
- Message Authentication Codes > CMac > CmacAES256
- Message Authentication Codes > CBCMac > CBCmacAES256
- Message Authentication Codes > CBCMac > CBCmacAES192
- Message Authentication Codes > CBCMac > CBCmacAES128
| |
| | - Tools > Data flow > Alphabet Permutator
| | |
| | - Tools > Data input/output > Alphabets
| | |
Android Unlock Pattern (AUP) | | | - Visuals > Android Unlock Pattern (AUP)
| |
Ant Colony Optimization (ACO) | | | - Visuals > Ant Colony Optimization (ACO)
| |
| | | | Open |
| | | | |
| | | | |
| | | | Open |
Authentication methods in networks Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
| | - Cryptanalysis > Generic > Autocorrelation
| | Open |
| | - Tools > Misc > Avalanche Visualization
- Cryptanalysis > Modern > Avalanche (AES)
- Cryptanalysis > Modern > Avalanche (Classic Ciphers)
- Cryptanalysis > Modern > Avalanche (Compare Classic Ciphers)
- Cryptanalysis > Modern > Avalanche (DES)
- Cryptanalysis > Modern > Avalanche (Hash Functions)
- Cryptanalysis > Modern > Avalanche (Modern Ciphers)
| | |
| | - Steganography > Baconian Cipher
- Cryptography > Classical > Bacon Cipher
| | |
| | | | Open |
| | | | |
| | | | Open |
| | - Protocols > BB84 Error Detector
- Protocols > BB84 Key Generator
- Protocols > BB84 Photonbase Generator
- Protocols > BB84 Photon Decoder
- Protocols > BB84 Photon Encoder
| | |
BB84 Attack = Templates for breaking a function or protocol | | - Protocols > BB84 Man in the Middle
| | |
| | | | Open |
Berlekamp-Massey algorithm | | - Cryptanalysis > Generic > Berlekamp-Massey Algorithm
- Mathematics > Berlekamp-Massey
| | |
| | | - Algorithms > Classic > Bifid
| |
| | - Classic Ciphers > Bifid Cipher
- Cryptography > Classical > Bifid Cipher
| | |
| | | | Open |
| | - Hash Functions > BLAKE
- Hash Functions > Password Storage Using Salted BLAKE-256
- Hash Functions > Password Verification Using Salted BLAKE-256
| | |
| | - Modern Ciphers > Asymmetric > Blind Signature Generator
- Modern Ciphers > Asymmetric > Blind Signature Verifier
| | |
| | - Cryptography > Modern > Symmetric > Block Modes of Symmetric Ciphers
| | |
| | - Protocols > Blockchain
- Protocols > Blockchain Signature Creator
- Protocols > Blockchain Simulation
| | |
| | - Modern Ciphers > Symmetric > Blowfish
- Cryptography > Modern > Symmetric > Blowfish Cipher
| | |
Blum Blum Shub (BBS) – PRNG = Pseudo random number generator | | | - Pseudo Random Number Generators > BBSRandom
| |
| | - Classic Ciphers > Book Cipher
- Cryptography > Classical > Book Cipher with Complete Word Encoding
- Cryptography > Classical > Book Cipher with Single Letter Encoding
| | |
| | | | |
| | | | |
Byte Addition Analysis = Templates for breaking a function or protocol | | | | |
| | - Cryptography > Classical > Caesar Cipher
- Encryption/Decryption > Classic Encryption/Decryption > Caesar
| - Algorithms > Classic > Caesar
| |
Caesar / Rot-13 Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > Caesar Analyzer
- Cryptanalysis > Classical > Caesar Brute-Force Analysis
- Cryptanalysis > Classical > Caesar Analysis Using Character Frequencies
- Cryptanalysis > Classic Encryption > Caesar
| | Open |
Caesar / Rot-13 Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
| | - Modern Ciphers > Symmetric > Camellia
- Cryptography > Modern > Symmetric > Camellia Cipher
| - Block Ciphers > Camellia > Camellia256_CBC
- Block Ciphers > Camellia > Camellia192_CBC
- Block Ciphers > Camellia > Camellia128_CBC
| |
| | | - Message Authentication Codes > CBCMac > CBCmacCamellia
| |
CBC Attack = Templates for breaking a function or protocol | | - Cryptanalysis > Modern > CBC Attack
| | |
| | | - Visuals > Certificate Verification
| |
| | - Modern Ciphers > Symmetric > ChaCha
- Cryptography > Modern > Symmetric > ChaCha Cipher
- Cryptography > Modern > Symmetric > ChaCha Cipher (Presentation)
| | |
| | - Classic Ciphers > Chaocipher
- Cryptography > Classical > Chaocipher
| | |
| | - Cryptography > Classical > Ché Guevara Cipher
| | |
Chinese remainder theorem (CRT) Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | - Visuals > Chinese Remainder Theorem (CRT)
| |
| | | | Open |
| | | - Signatures > CMSSSignature > CMSS
| |
| | - Protocols > Coin Flipping
- Protocols > Coin Flipping Protocol
| | |
| | | | Open |
| | - Cryptanalysis > Generic > Cost Function
- Cryptanalysis > Classical > Cost Functions
| | |
| | - Modern Ciphers > Asymmetric > Cramer-Shoup
- Modern Ciphers > Asymmetric > Cramer-Shoup Key Generator
- Cryptography > Modern > Asymmetric > Cramer-Shoup with AES
| | |
Crib Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Classic Encryption > Transposition > Crib
| | |
Cyclic redundancy check (CRC) | | - Hash Functions > CRC Null Problems
- Hash Functions > CRC
| | |
| | - Classic Ciphers > Cylinder Cipher
| | |
| | - Tools > Data flow > Concatenate
- Tools > Data flow > Array Indexer
- Tools > Boolean > Boolean Binary Operator
- Tools > Boolean > Boolean Not Operator
- Tools > Misc > Comparators
- Tools > Misc > Converter
- Tools > Codes > String Decoder
- Tools > Codes > String Encoder
- Tools > Misc > Length
- Tools > Data flow > Variable Load
- Tools > Data flow > Variable Store
- Tools > Misc > Stream Comparator
- Tools > Data input/output > File Output
- Tools > Data flow > Gate
- Tools > Misc > Inc Dec
- Tools > Data input/output > Picture Output
- Tools > Misc > String Operations
- Tools > Data input/output > Text Output
- Tools > Split a Text
- Tools > Loop
| | |
| | - Tools > Data flow > Clock
- Tools > Data input/output > IP Frame Generator
- Tools > Data input/output > Audio Input
- Tools > Data input/output > Audio Output
- Tools > Boolean > Boolean Input
- Tools > Boolean > Boolean Output
- Tools > Misc > ImageProcessor
- Tools > Data input/output > Network Receiver
- Tools > Data input/output > Network Sender
- Tools > Data input/output > Number Input
- Tools > Data input/output > Camera
- Tools > Data input/output > Text Input
- Tools > Data flow > CSVReader
- Tools > Data input/output > Dictionary
- Tools > Data input/output > File Input
- Tools > Take a Picture Using the Webcam
- Tools > Random Decimal Number
| | |
| | - Tools > Misc > Decimalization
- Mathematics > Decimalization
| | |
| | - Modern Ciphers > Symmetric > DES
- Cryptography > Modern > Symmetric > DES Complementation Property
- Cryptography > Modern > Symmetric > DES Cipher
- Encryption/Decryption > Modern Encryption/Decryption > Symmetric Encryption/Decryption > DES
| - Visuals > Inner States of the Data Encryption Standard (DES)
- Block Ciphers > DESede > DESede_CBC
- Password-Based Ciphers > PbeWithSHA1AndDES_CBC
- Password-Based Ciphers > PbeWithMD5AndDES_CBC
| |
DES Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Modern > DES Analysis Using Entropy
- Cryptanalysis > Modern > DES Known-Plaintext Analysis
- Cryptanalysis > Modern > DES Brute-Force Analysis
- Cryptanalysis > Modern Encryption > Symmetric Encryption > DES > Known plaintext
| | |
DES Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | - Modern Ciphers > Symmetric > DESVisualization
- Cryptography > Modern > Symmetric > DES Visualization
| | |
| | | - Message Authentication Codes > CMac > CmacDESede
- Message Authentication Codes > CBCMac > CBCmacDESede
| |
| | | | |
DESL Analysis = Templates for breaking a function or protocol | | | | |
| | | | |
DESX Analysis = Templates for breaking a function or protocol | | | | |
| | | | |
DESXL Analysis = Templates for breaking a function or protocol | | | | |
DGK (homomorphic encryption) | | - Modern Ciphers > Asymmetric > DGK
- Modern Ciphers > Asymmetric > DGK Key Generator
- Cryptography > Modern > Asymmetric > DGK Cipher (Text Input)
| | |
| | | | |
| | | - Message Authentication Codes > HMac > HmacDHA256
| |
Dictionary Attack = Templates for breaking a function or protocol | | - Hash Functions > Dictionary Attack on a Password Hash Value
| | |
Differential cryptanalysis (DCA) | | - Cryptanalysis > Specific > DCA KeyRecovery
- Cryptanalysis > Specific > DCA Oracle
- Cryptanalysis > Specific > DCA PathFinder
- Cryptanalysis > Specific > DCA PathVisualizer
- Cryptanalysis > Specific > DCA ToyCipher
- Cryptanalysis > Modern > Differential Cryptanalysis Tutorial 1 (Automatic Mode)
- Cryptanalysis > Modern > Differential Cryptanalysis Tutorial 2 (Automatic Mode)
- Cryptanalysis > Modern > Differential Cryptanalysis Tutorial 3 (Automatic Mode)
| | |
Differential cryptanalysis (DCA) Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | - Cryptanalysis > Modern > Differential Cryptanalysis Tutorial 1 (Tutorial Mode)
- Cryptanalysis > Modern > Differential Cryptanalysis Tutorial 2 (Tutorial Mode)
- Cryptanalysis > Modern > Differential Cryptanalysis Tutorial 3 (Tutorial Mode)
| | |
Dining cryptographers protocol | | - Protocols > Dining Cryptographers Protocol
| | |
| | - Mathematics > Discrete Logarithm
| | |
| | | | |
| | | - Algorithms > Classic > Double Box
| |
| | | - Algorithms > Symmetric > Dragon
| |
| | | - Algorithms > Signature > DSA
- Signatures > DSASignature > RAW/DSA
- Signatures > DSASignature > SHAwithDSA
- Signatures > IQDSASignature > IQDSA
- Signatures > IQDSASignature > RIPEMD160withIQDSA
- Signatures > IQRDSASignature > IQRDSA
- Signatures > IQRDSASignature > RIPEMD160withIQRDSA
| |
| | | - Visuals > Elliptic Curve Calculations
| |
EC calculations Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
EC PRNG = Pseudo random number generator | | | - Pseudo Random Number Generators > ECPRNG
| |
| | | | |
| | | - Signatures > ECDSASignature > SHA1/ECDSA
- Signatures > ECDSASignature > SHA512/ECDSA
- Signatures > ECDSASignature > RawECDSA
- Signatures > ECDSASignature > SHA224/ECDSA
- Signatures > ECDSASignature > SHA256/ECDSA
- Signatures > ECDSASignature > SHA384/ECDSA
| |
| | | | |
| | | | |
| | | - Algorithms > Asymmetric > ElGamal
- Asymmetric Block Ciphers > ElGamal
| |
| | - Tools > Text Encoding (e.g. Base64)
| | |
Encryption with AES and password | | - Tools > Encrypt with password
| | |
| | - Cryptography > Classical > Enigma Cipher Machine
- Encryption/Decryption > Classic Encryption/Decryption > Enigma
| | |
Enigma Attack = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > Enigma Analyzer
- Cryptanalysis > Classical > Enigma Gillogly Attack
- Cryptanalysis > Classical > Enigma Hillclimbing Attack
- Cryptanalysis > Classical > Enigma Simulated Annealing Attack
- Cryptanalysis > Classical > Enigma Turing Bombe Attack
- Cryptanalysis > Classical > Enigma Turing Bombe Attack (with Turnover)
- Cryptanalysis > Classic Encryption > Enigma
| | |
Enigma Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | Open |
Entropy Analysis = Templates for breaking a function or protocol | | | - Analysis > Entropy Analysis
| |
Factorization of a number | | - Cryptanalysis > Generic > Quadratic Sieve
- Cryptanalysis > Generic > Factorizer
- Mathematics > Factorization with Quadratic Sieve (QS)
- Mathematics > Factorization with Trial Division (Brute-Force)
- Crypto tutorials > World of Primes > Factorization > Brute-force
- Crypto tutorials > World of Primes > Factorization > Quadratic Sieve
- Mathematical Functions > Prime Factorization
| | |
| | - Modern Ciphers > Symmetric > FEAL
- Cryptography > Modern > Symmetric > FEAL Cipher
| | |
| | - Cryptography > Classical > Fialka ED Check
- Cryptography > Classical > Fialka ED Mixed Mode Check
- Cryptography > Classical > Fialka ED NumLock10 Check
- Cryptography > Classical > Fialka Key Output
- Cryptography > Classical > Fialka M-125-3 PROTON II
- Cryptography > Classical > Fialka M-125 PROTON I
| | |
FIPS PUB-140-1 (test PRNG = Pseudo random number generator ) | | | | |
Fleissner Grille Analysis = Templates for breaking a function or protocol | | | - Analysis > Fleissner-Grille Analysis
| |
| | | - Message Digests > FORK256
| |
| | | - Message Authentication Codes > HMac > HmacFORK256
| |
Format preserving encryption (FPE) (FF1, FF2, FF3 and DFF) | | - Modern Ciphers > Symmetric > Format Preserving Encryption (FPE)
- Cryptography > Modern > Symmetric > Format Preserving Encryption (XML)
- Cryptography > Modern > Symmetric > Format Preserving Encryption
| | |
| | - Cryptanalysis > Generic > Frequency Test
- Cryptanalysis > Classical > Frequency Analysis
| - Analysis > Frequency Analysis
| Open |
| | - Cryptanalysis > Generic > Friedman Test
- Cryptanalysis > Classical > Friedman Test for Classical Ciphers
| | |
| | | | |
| | | - Signatures > GMSSSignature > GMSSwithSHA512
- Signatures > GMSSSignature > GMSSwithSHA1
- Signatures > GMSSSignature > GMSSwithSHA224
- Signatures > GMSSSignature > GMSSwithSHA256
- Signatures > GMSSSignature > GMSSwithSHA384
| |
| | - Modern Ciphers > Symmetric > GOST Magma
- Cryptography > Modern > Symmetric > GOST Magma Cipher
| | |
| | | - Signatures > IQGQSignature > IQGQ
- Signatures > IQGQSignature > RIPEMD160withIQGQ
| |
| | - Modern Ciphers > Symmetric > Grain v1
- Cryptography > Modern > Symmetric > Grain v1 Cipher
| | |
| | | | Open |
| | - Hash Functions > Grøstl
- Hash Functions > Password Storage Using Salted Grøstl-256
- Hash Functions > Password Verification Using Salted Grøstl-256
| | |
| | - Classic Ciphers > Hagelin Machine
- Cryptography > Classical > Hagelin Machine
| | |
| | - Tools > Misc > HammingDistance
- Mathematics > Hamming Distance
| | |
Hash algorithms Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | - Visuals > Hash Sensitivity
| |
Hash Attack = Templates for breaking a function or protocol (collisions) | | | | |
| | | | |
| | - Modern Ciphers > Symmetric > HC128
- Cryptography > Modern > Symmetric > HC128 Cipher
| | |
Heartbleed Analysis = Templates for breaking a function or protocol | | - Protocols > Heartbleed Test
- Tools > Heartbleed analysis
| | |
| | - Modern Ciphers > Symmetric > HIGHT
| | |
| | - Cryptography > Modern > Symmetric > HIGHT Cipher
| | |
| | - Classic Ciphers > Hill Cipher
- Cryptography > Classical > Hill Cipher
| | Open |
Hill cipher Analysis = Templates for breaking a function or protocol | | | | |
| | | | |
| | | | |
Homomorphic Encryption (HE) (with RSA, Paillier, Gentry & Hallevi) | | | - Visuals > Homomorphic Encryption (HE)
| |
Homophonic substitution Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > Homophonic Substitution Analyzer
- Cryptanalysis > Classical > Homophonic Substitution Analysis
| | |
Homophonic substitution cipher | | - Cryptography > Classical > Homophonic Substitution Cipher and Nomenclature – Decryption
- Cryptography > Classical > Homophonic Substitution Cipher and Nomenclature – Encryption
| | |
| | | | |
| | - Tools > Huffman's Algorithm (ASCII)
- Tools > Huffman's Algorithm (BMG, JPG)
- Tools > Huffman's Algorithm (UTF-8)
| | Open |
| | | - Algorithms > Symmetric > IDEA
- Block Ciphers > IDEA > IDEA_CFB
- Block Ciphers > IDEA > IDEA_ECB
- Block Ciphers > IDEA > IDEA_OFB
- Block Ciphers > IDEA > IDEA_CBC
| |
IDEA Attack = Templates for breaking a function or protocol | | | | |
| | | - Message Authentication Codes > CBCMac > CBCmacIDEA
| |
IDP Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > IDP Analyzer
| | |
| | - Hash functions > ImageHash
- Hash Functions > ImageHash
- Hash Functions > ImageHash – Smooth Comparison
| | |
Inverse congruence generator (ICG) ( PRNG = Pseudo random number generator ) | | | | |
ISAP bit commitment scheme | | - Protocols > ISAP Bit Commitment Scheme
- Mathematics > ISAP Bit Commitment Scheme
| | |
| | - Codes > ISBN-10 Check
- Codes > ISBN-13 Check
| | |
| | - Classic Ciphers > Josse Cipher
- Cryptography > Classical > Josse Cipher
| | |
| | | | Open |
| | - Cryptanalysis > Generic > Kasiski's Test
- Cryptanalysis > Classical > Kasiski's Test and Autocorrelation
| | |
Keccak (hash, cipher, PRNG = Pseudo random number generator ) | | - Cryptography > Modern > Symmetric > Keccak Cipher
- Hash Functions > Keccak Hash (SHA-3)
- Tools > Keccak Pseudorandom Number Generator (PRNG)
| | |
Key derivation function (KDF) | | - Hash functions > HKDF SHA-256
- Hash functions > KKDF SHA-256
- Hash functions > KKDF SHAKE256
- Hash Functions > KDF Performance Comparison (without Presentation)
- Hash Functions > KDF Performance Comparison (with Presentation)
| | |
| | - Protocols > BB84 Key Exchange with Eavesdropping Attack
- Protocols > BB84 Key Exchange
| | |
Key exchange (Diffie-Hellman DH) | | - Protocols > Diffie-Hellman Key-Exchange
- Protocols > Diffie-Hellman Key-Exchange over Network
| - Visuals > Diffie-Hellman Key Exchange (EC)
| |
Key exchange (Diffie-Hellman DH) (Perfect Forward Secrecy) Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
Key exchange (multipartite) | | | - Visuals > Multipartite Key Exchange (BD II)
| |
Key generation from password (PKCS#5) | | | | |
| | - Cryptanalysis > Specific > KeySearcher
| | |
| | | | |
| | | | |
Kleptography (4 methods generating a prime, SETUP Attack = Templates for breaking a function or protocol ) | | | | |
| | | - Visuals > Merkle-Hellman Knapsack Cryptosystem
| |
Kryptos K1 Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Classical > Kryptos K1 Analysis
| | |
Kryptos K2 Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Classical > Kryptos K2 Analysis
| | |
| | - Classic Ciphers > LAMBDA1
- Cryptography > Modern > Symmetric > LAMBDA1 Block Cipher
| | |
Lattice Attack = Templates for breaking a function or protocol | | - Crypto tutorials > Lattice-based Cryptography > Lattice-based cryptanalysis > Merkle-Hellman Knapsack
- Crypto tutorials > Lattice-based Cryptography > Lattice-based cryptanalysis > RSA (Coppersmith's attack)
| | |
Lattice Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | - Crypto tutorials > Lattice-based Cryptography
- Crypto tutorials > Lattice-based Cryptography > Lattice-based cryptography > GGH
- Crypto tutorials > Lattice-based Cryptography > Lattice-based cryptography > LWE
- Crypto tutorials > Lattice-based Cryptography > Shortest Vector Problem (SVP) > Gauss algorithm
- Crypto tutorials > Lattice-based Cryptography > Shortest Vector Problem (SVP) > LLL algorithm
- Crypto tutorials > Lattice-based Cryptography > Closest Vector Problem (CVP) > Find closest vector
| | |
| | | | |
| | - Mathematics > Levenshtein Distance
| | |
| | - Mathematics > Linear Feedback Shift Register (LFSR)
| - Algorithms > Symmetric > LFSR
| |
Linear congruence generator (LCG) ( PRNG = Pseudo random number generator ) | | | | |
| | - Cryptography > Classical > M-138
| | |
M-138 Attack = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > M-138 Analyzer
- Cryptanalysis > Classical > M-138 Ciphertext-Only Attack
- Cryptanalysis > Classical > M-138 Known-Plaintext Attack
- Cryptanalysis > Classical > M-138 Partially-Known Plaintext Attack
| | |
| | - Cryptography > Classical > M209 Cipher Machine
- Cryptography > Classical > M209 Key Setup
| | |
| | - Cryptography > Classical > M94 Test Messages from Joseph O. Mauborgne
| | |
| | | | |
MARS Attack = Templates for breaking a function or protocol | | | | |
| | | - Message Authentication Codes > CBCMac > CBCmacMARS
| |
| | | - Visuals > McEliece Cryptosystem
- Hybrid Ciphers > McElieceFujisakiCipher
- Hybrid Ciphers > McElieceKobaraImaiCipher
| |
| | | - Asymmetric Block Ciphers > McEliecePKCS
| |
| | | - Message Digests > MD5
- Message Digests > MD4
| |
| | | | |
| | | - Message Authentication Codes > HMac > HmacMD4
| |
| | - Hash functions > MD5
- Cryptanalysis > Specific > MD5 Collider
- Hash Functions > MD5 Collision Finder
- Hash Functions > MD5 Salted Hash Comparison
- Hash Functions > MD5
| - Algorithms > Hash > MD5
- Algorithms > MAC > HMacMD5
- Message Authentication Codes > HMac > HmacMD5
| |
MD5 Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Modern Encryption > Hash Functions > MD5
| | |
| | | - Visuals > Merkle Signatures (XMSS^MT)
- Signatures > MerkleOTSSignature > MerkleOTSwithSHA512
- Signatures > MerkleOTSSignature > MerkleOTSwithSHA384
- Signatures > MerkleOTSSignature > MerkleOTSwithSHA1
- Signatures > MerkleOTSSignature > MerkleOTSwithSHA256
| |
| | - Classic Ciphers > Mexican Army Cipher Disk
- Cryptography > Classical > Mexican Army Cipher Disk
| | |
Mexican Army cipher Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > Mexican Army Cipher Disk Analyzer
- Cryptanalysis > Classical > Brute-Force Attack on the Mexican Army Cipher Disk
| | |
| | - Modern Ciphers > Symmetric > Mickey 2
- Cryptography > Modern > Symmetric > Mickey 2 Cipher
| | |
| | | | |
| | | - Message Authentication Codes > CBCMac > CBCmacMisty1
| |
| | - Tools > Codes > Morse Code
| | Open |
| | | | Open |
Multivariate cryptography | | | - Visuals > Multivariate Cryptography
| |
N-gram Analysis = Templates for breaking a function or protocol | | | | |
N-gram Analysis = Templates for breaking a function or protocol | | | | Open |
| | - Cryptography > Classical > Navajo Code
| | |
| | | - Asymmetric Block Ciphers > Niederreiter
- Signatures > NiederreiterCFS
| |
Nihilist Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
| | - Classic Ciphers > Nihilist Cipher
- Cryptography > Classical > Nihilist Cipher
| | |
| | - Mathematics > Non-Linear Feedback Shift Register (NLFSR)
| | |
| | | | Open |
Number theory (also see Primes) | | - Mathematics > Calculating with Big Numbers
- Mathematics > Linear Congruential Generator
- Crypto tutorials > World of Primes > Number theory > Number-theoretic functions
- Crypto tutorials > World of Primes > Number theory > Primitive roots
- Crypto tutorials > World of Primes > Number theory > Goldbach's conjecture
| | Open |
Oblivious transfer protocol ( MPC = Multi-party communication ) | | - Protocols > Oblivious Transfer 1
- Protocols > Oblivious Transfer 2
- Protocols > Oblivious Transfer Protocol (1 out of n)
| | |
| | - Cryptography > Classical > One-Time Pad Demo
- Cryptography > Classical > One-Time Pad Misusage
| | |
| | | | Open |
Padding oracle Attack = Templates for breaking a function or protocol (POA) | | - Cryptanalysis > Specific > Padding Oracle
- Cryptanalysis > Specific > Padding Oracle Attack
- Cryptanalysis > Modern > Padding Oracle Attack on AES
- Cryptanalysis > Modern > Padding Oracle Attack on DES
| | |
| | - Modern Ciphers > Asymmetric > Paillier Key Generator
- Cryptography > Modern > Asymmetric > Blind Signature with Paillier
- Cryptography > Modern > Asymmetric > Blind Signature with RSA
- Cryptography > Modern > Asymmetric > Paillier Cipher (Voting)
- Cryptography > Modern > Asymmetric > Paillier Cipher with Blinding
- Cryptography > Modern > Asymmetric > Paillier Key Generator
| | |
Paillier (homomorphic encryption) | | - Modern Ciphers > Asymmetric > Paillier
- Cryptography > Modern > Asymmetric > Paillier Cipher (Number Input)
- Cryptography > Modern > Asymmetric > Paillier Cipher with Addition
- Cryptography > Modern > Asymmetric > Paillier Cipher (Text Input)
| | |
| | - Hash Functions > Password Store Using Salted SHA-1
- Hash Functions > Password Verification Using Salted SHA-1
| | |
Password quality Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | - Tools > Misc > PasswordStrength
- Tools > Check Password Strength
- Tools > Password Strength
| | |
Password-based key derivation functions | | - Hash Functions > Password-Based Key Derivation Functions
| | |
| | | - Password-Based Ciphers > PBES2
| |
| | - Hash Functions > PBKDF-1 (PKCS#5 2.0)
| | |
Periodicity Analysis = Templates for breaking a function or protocol | | | | |
PKCS#1 Attack = Templates for breaking a function or protocol | | - Crypto tutorials > Attacks on PKCS#1
- Crypto tutorials > Attacks on PKCS#1 > Attacks on PKCS#1 > Bleichenbacher attack
- Crypto tutorials > Attacks on PKCS#1 > Attacks on PKCS#1 > Attack with shorter keys (Kuehn)
| | |
| | | | |
| | - Cryptography > Modern > Symmetric > AES with PKCS#5
- Cryptography > Modern > Symmetric > AES (CBC) with PKCS#5 and IV
- Cryptography > Modern > Symmetric > AES (ECB) with PKCS#5
| | |
Playfair Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > Playfair Analyzer
- Cryptanalysis > Classical > Playfair Analysis
| | |
| | - Classic Ciphers > Playfair
- Cryptography > Classical > Playfair Cipher
- Encryption/Decryption > Classic Encryption/Decryption > Playfair
| - Algorithms > Classic > Playfair
| |
Poker-Test (test PRNG = Pseudo random number generator ) | | | | |
| | | | Open |
Powering Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | - Crypto tutorials > World of Primes > Number theory > Powering (iterating exponent)
- Crypto tutorials > World of Primes > Number theory > Powering (iterating base)(RSA)
| | |
| | - Modern Ciphers > Symmetric > PRESENT
- Cryptography > Modern > Symmetric > PRESENT Cipher
| | |
Primes (generators, tests, factorization, tutorials) | | - Tools > Data input/output > Prime Generator
- Cryptanalysis > Generic > Prime Test
- Mathematics > Next Smaller Prime Number
- Mathematics > Primes Test
- Mathematics > Primes Generator
- Crypto tutorials > World of Primes
- Crypto tutorials > World of Primes > Primality test > Sieve of Eratosthenes
- Crypto tutorials > World of Primes > Primality test > Miller-Rabin test
- Crypto tutorials > World of Primes > Primality test > Sieve of Atkin
- Crypto tutorials > World of Primes > Generation of primes > Generation of primes
- Crypto tutorials > World of Primes > Distribution of primes > Number line
- Crypto tutorials > World of Primes > Distribution of primes > Number grid
- Crypto tutorials > World of Primes > Distribution of primes > Number of primes
- Crypto tutorials > World of Primes > Distribution of primes > Ulam's spiral
- Mathematical Functions > Prime Operations > Prime Number Generation
| | |
Pseudo random number generator ( PRNG = Pseudo random number generator ) | | - Tools > Random Number > LFSR
- Tools > Random Number > NLFSR
- Tools > Random Number > Random Number Generator
- Tools > Random Number Generators
| | |
Pseudo random number generator ( PRNG = Pseudo random number generator ) of the Secude library | | | | |
Public-Key Infrastructure | | | - Visuals > Public-Key Infrastructure
| |
| | - Cryptography > Classical > PURPLE Cipher Machine
| | |
| | - Modern Ciphers > Symmetric > Rabbit
- Cryptography > Modern > Symmetric > Rabbit Cipher
| | |
| | | - Visuals > Rabin Cryptosystem
| |
| | | | Open |
Randomness Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
| | | | |
| | - Modern Ciphers > Symmetric > RC2
- Cryptography > Modern > Symmetric > RC2 Cipher
- Encryption/Decryption > Modern Encryption/Decryption > Symmetric Encryption/Decryption > RC2
| - Block Ciphers > RC2 > RC2_CBC
- Password-Based Ciphers > PbeWithSHAAnd40BitRC2_CBC
| |
RC2 Attack = Templates for breaking a function or protocol | | | | |
| | | - Message Authentication Codes > CBCMac > CBCmacRC2
| |
| | - Modern Ciphers > Symmetric > RC4
- Cryptography > Modern > Symmetric > RC4 Cipher
| - Algorithms > Symmetric > ARC4/Spritz
- Visuals > ARC4 / Spritz
| |
RC4 Attack = Templates for breaking a function or protocol | | | | |
| | | | |
| | | - Message Authentication Codes > CBCMac > CBCmacRC5
| |
| | | - Algorithms > Symmetric > RC6
| |
RC6 Attack = Templates for breaking a function or protocol | | | | |
| | | - Message Authentication Codes > CBCMac > CBCmacRC6
| |
| | | - Visuals > Extended Euclidean / Reciprocal Subtraction
| |
Redactable signature schemes (RSS) | | | - Visuals > Redactable Signature Schemes (RSS)
| |
| | | | Open |
| | - Hash functions > RIPEMD160
- Hash Functions > RIPEMD160
| - Message Digests > RIPEMD320
- Message Digests > RIPEMD128
- Message Digests > RIPEMD160
- Message Digests > RIPEMD256
| |
| | | - Message Authentication Codes > HMac > HmacRIPEMD256
- Message Authentication Codes > HMac > HmacRIPEMD128
- Message Authentication Codes > HMac > HmacRIPEMD160
- Message Authentication Codes > HMac > HmacRIPEMD320
| |
| | | | |
| | | | Open |
| | - Modern Ciphers > Asymmetric > RSA
- Modern Ciphers > Asymmetric > RSA Key Generator
- Cryptography > Modern > Asymmetric > RSA with Big Numbers
- Cryptography > Modern > Asymmetric > RSA Cipher
- Cryptography > Modern > Asymmetric > RSA Decryption
- Cryptography > Modern > Asymmetric > RSA Encryption
- Cryptography > Modern > Asymmetric > RSA Key Generator
- Encryption/Decryption > Modern Encryption/Decryption > Asymmetric Encryption/Decryption > RSA > RSA Encryption
- Encryption/Decryption > Modern Encryption/Decryption > Asymmetric Encryption/Decryption > RSA > RSA Decryption
| - Algorithms > Asymmetric > RSA
- Visuals > Extended RSA Cryptosystem
- Asymmetric Block Ciphers > RprimeRSA
- Asymmetric Block Ciphers > RSA
- Asymmetric Block Ciphers > RbRSA
| |
RSA Attack = Templates for breaking a function or protocol | | - Cryptanalysis > Modern > RSA Common Factor Attack
- Cryptanalysis > Modern Encryption > Asymmetric Encryption > RSA
| | |
RSA Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | Open |
| | | - Signatures > RprimeRSA
- Signatures > RSASignaturePKCS1v15 > RIPEMD160/RSA
- Signatures > RSASignaturePKCS1v15 > SHA384withRSA
- Signatures > RSASignaturePKCS1v15 > SHA1/RSA/RAW
- Signatures > RSASignaturePKCS1v15 > SHA512withRSA
- Signatures > RSASignaturePKCS1v15 > SHA384/RSA/RAW
- Signatures > RSASignaturePKCS1v15 > MD5withRSA
- Signatures > RSASignaturePKCS1v15 > SHA224/RSA
- Signatures > RSASignaturePKCS1v15 > SHA256withRSA
- Signatures > RSASignaturePKCS1v15 > SHA1/RSA
- Signatures > RSASignaturePKCS1v15 > MD5/RSA/RAW
- Signatures > RSASignaturePKCS1v15 > SHA512/RSA/RAW
- Signatures > RSASignaturePKCS1v15 > SHA224/RSA/RAW
- Signatures > RSASignaturePKCS1v15 > RIPEMD160/RSA/RAW
- Signatures > RSASignaturePKCS1v15 > SHA256/RSA/RAW
- Signatures > RbRSA
- Signatures > SSL_MD5andSHA1withRSA
| |
| | | | |
Runs-Test (test PRNG = Pseudo random number generator ) | | | | |
| | | - Block Ciphers > SAFER+
- Message Authentication Codes > CBCMac > CBCmacSAFER+
| |
| | | - Block Ciphers > SAFER++
- Message Authentication Codes > CBCMac > CBCmacSAFER++
| |
| | - Modern Ciphers > Symmetric > Salsa20
- Cryptography > Modern > Symmetric > Salsa20 Cipher
| | |
| | - Cryptanalysis > Generic > SAT Solver
- Mathematics > SAT Solver (File Input)
- Mathematics > SAT Solver (Text Input)
| | |
| | - Classic Ciphers > Scytale
- Cryptography > Classical > Scytale Cipher
- Encryption/Decryption > Classic Encryption/Decryption > Scytale
| | Open |
Scytale Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Classical > Scytale Brute-Force Analysis
- Cryptanalysis > Classic Encryption > Scytale
| | |
| | | | |
| | - Modern Ciphers > Symmetric > SDES
- Cryptography > Modern > Symmetric > SDES Cipher
- Encryption/Decryption > Modern Encryption/Decryption > Symmetric Encryption/Decryption > SDES
| | |
SDES Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Modern > SDES Brute-Force Analysis
- Cryptanalysis > Modern > SDES Analysis Using Entropy
- Cryptanalysis > Modern > SDES Known-Plaintext Analysis
- Cryptanalysis > Modern Encryption > Symmetric Encryption > SDES > Ciphertext-only
- Cryptanalysis > Modern Encryption > Symmetric Encryption > SDES > Known plaintext
| | |
Secure Chat – Applied Cryptography | | - Tools > Simple Video and Audio Chat Using AES Encryption
- Tools > Diffie-Hellman AES Video Audio Chat
- Tools > Simple AES Chat
| | |
Secure email (S/MIME) Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
Serial-Test (test PRNG = Pseudo random number generator ) | | | | |
| | | - Block Ciphers > Serpent > Serpent192_CBC
- Block Ciphers > Serpent > Serpent192_CFB
- Block Ciphers > Serpent > Serpent128_OFB
- Block Ciphers > Serpent > Serpent256_ECB
- Block Ciphers > Serpent > Serpent256_OFB
- Block Ciphers > Serpent > Serpent256_CFB
- Block Ciphers > Serpent > Serpent128_ECB
- Block Ciphers > Serpent > Serpent192_OFB
- Block Ciphers > Serpent > Serpent192_ECB
- Block Ciphers > Serpent > Serpent128_CBC
- Block Ciphers > Serpent > Serpent128_CFB
- Block Ciphers > Serpent > Serpent256_CBC
| |
Serpent Attack = Templates for breaking a function or protocol | | | | |
| | | - Message Authentication Codes > CBCMac > CBCmacSerpent
| |
| | - Hash Functions > SHA-1 Collision
- Hash Functions > SHA-1
- Hash Functions > SHA-256
| - Algorithms > Hash > SHA-256
- Algorithms > Random Number Generator > SHA-1
- Algorithms > Hash > SHA-3 Candidates
- Message Digests > SHA384
- Message Digests > SHA224
- Message Digests > SHA1
- Message Digests > SHA256
- Message Digests > SHA512
- Pseudo Random Number Generators > SHA1PRNG
| Open |
| | | - Message Authentication Codes > HMac > HmacSHA512
- Message Authentication Codes > HMac > HmacSHA1
- Message Authentication Codes > HMac > HmacSHA224
- Message Authentication Codes > HMac > HmacSHA256
- Message Authentication Codes > HMac > HmacSHA384
| |
| | | - Block Ciphers > Shacal
- Block Ciphers > Shacal2
| |
| | | - Message Authentication Codes > CBCMac > CBCmacShacal
- Message Authentication Codes > CBCMac > CBCmacShacal2
| |
Shamir's secret sharing ( MPC = Multi-party communication ) | | | - Visuals > Shamir's Secret Sharing
| |
Shamir's secret sharing ( MPC = Multi-party communication ) Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
Shanks Babystep-Giantstep | | | - Visuals > Shanks Babystep-Giantstep
| |
| | - Cryptography > Classical > SIGABA Cipher Machine
| | |
Signature Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | - Visuals > Signature Demonstration
| |
| | | | |
| | | - Visuals > Signature Verification
| |
Simple multi-client communication – Applied Cryptography | | - Protocols > Simple Multi Client Communication
| | |
| | - Protocols > Simple Webserver
| | |
| | - Classic Ciphers > Solitaire
- Cryptography > Classical > Solitaire Cipher
| | |
Solitaire Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > Solitaire Analyzer
- Cryptanalysis > Classical > Solitaire Brute-Force Analysis
| | |
| | - Modern Ciphers > Symmetric > Sosemanuk
- Cryptography > Modern > Symmetric > Sosemanuk Cipher
| | |
Spanish strip cipher (SSC) | | - Classic Ciphers > Spanish Strip Cipher
- Cryptography > Classical > Spanish Strip Cipher
| | |
| | - Modern Ciphers > Symmetric > Speck
- Cryptography > Modern > Symmetric > Speck Cipher
| | |
| | | - Visuals > SPHINCS Signature
| |
| | | - Visuals > SPHINCS+ Signature
| |
| | | - Visuals > Simple Power Analysis / Square and Multiply
| |
| | - Steganography > Image Steganography
- Steganography > Text Steganography
- Steganography > Image Steganography with BPCS
- Steganography > Image Steganography with LSB
- Steganography > Text Steganography with Capital Letters (Binary Mode)
- Steganography > Text Steganography with Capital Letters
- Steganography > Text Steganography with Letter Marking (Binary Mode)
- Steganography > Text Steganography with Letter Marking
- Steganography > Text Steganography with Zero Width Spaces
| | Open |
Straddling checkerboard cipher | | - Classic Ciphers > Straddling Checkerboard
- Cryptography > Classical > Straddling Checkerboard
| | |
| | - Classic Ciphers > Substitution
- Cryptography > Classical > Substitution Cipher
- Encryption/Decryption > Classic Encryption/Decryption > Substitution
| - Algorithms > Classic > Substitution
| Open |
Substitution Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > Monoalphabetic Substitution Analyzer
- Cryptanalysis > Classical > Monoalphabetic Substitution Analyzer
- Cryptanalysis > Classical > Monoalphabetic Substitution Analyzer with Arbitrary Ciphertext Alphabet
- Cryptanalysis > Classic Encryption > Monoalphabetic Substitution
| - Analysis > Substitution Analysis
| |
| | - Cryptography > Classical > Substitution Cipher Using a Keyword
| | |
| | - Classic Ciphers > Syllabary Cipher
- Cryptography > Classical > Syllabary Cipher
| | |
| | - Cryptography > Classical > T-310/50 Cipher Machine
- Cryptography > Classical > T-310/51 Cipher Machine
| | |
| | | | |
| | - Modern Ciphers > Symmetric > TEA
- Cryptography > Modern > Symmetric > TEA Cipher
- Encryption/Decryption > Modern Encryption/Decryption > Symmetric Encryption/Decryption > TEA
| | |
| | - Cryptography > Modern > Symmetric > Threefish Cipher
| | |
| | | | |
| | | - Message Authentication Codes > HMac > HmacTiger
| |
| | | - Visuals > SSL/TLS Handshake
| |
| | - Tools > Misc > Byte Array Operations
- Cryptanalysis > Generic > Contains
- Tools > Misc > Number Operation
- Tools > Misc > Progress
| | Open |
Transcriptor Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Generic > Transcriptor
- Cryptanalysis > Classical > Transcriptor – Manual Mode
- Cryptanalysis > Classical > Transcriptor – Semi-Automatic Mode
| | |
Transposition (double column transposition) | | - Cryptography > Classical > Double Columnar Transposition Cipher
| | |
Transposition (double column transposition) Attack = Templates for breaking a function or protocol | | - Cryptanalysis > Classical > Dictionary Attack on the Double Columnar Transposition Cipher
| | |
Transposition (single column transposition) | | - Classic Ciphers > Transposition
- Cryptography > Classical > Transposition Cipher
- Encryption/Decryption > Classic Encryption/Decryption > Transposition
| - Algorithms > Classic > Transposition
| Open |
Transposition Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > Transposition Analyzer
- Cryptanalysis > Classical > Transposition Brute-Force Analysis
- Cryptanalysis > Classical > Transposition Crib Analysis
- Cryptanalysis > Classical > Transposition Genetic Analysis
- Cryptanalysis > Classical > Transposition Hill Climbing Analysis
- Cryptanalysis > Classic Encryption > Transposition > Brute-force
- Cryptanalysis > Classic Encryption > Transposition > Genetic
| - Analysis > Transposition Analysis
| |
| | - Classic Ciphers > Trifid Cipher
- Cryptography > Classical > Trifid cipher
| | |
| | - Cryptography > Modern > Symmetric > Triple-DES Cipher
| - Password-Based Ciphers > PbeWithSHAAnd3_KeyTripleDES_CBC
| |
Triple-DES (3DES) Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Modern > Triple-DES Brute-Force Analysis
| | |
| | | | Open |
| | - Modern Ciphers > Symmetric > Trivium
| | |
| | - Cryptography > Modern > Symmetric > Trivium Cipher
| | |
| | - Cryptography > Modern > Symmetric > Twofish Cipher
| | |
Twofish Attack = Templates for breaking a function or protocol | | | | |
| | | - Message Authentication Codes > CBCMac > CBCmacTwofish
| |
| | | - Message Authentication Codes > TwoTrackMac > TwoTrackMac160
- Message Authentication Codes > TwoTrackMac > TwoTrackMac64
- Message Authentication Codes > TwoTrackMac > TwoTrackMac32
- Message Authentication Codes > TwoTrackMac > TwoTrackMac96
- Message Authentication Codes > TwoTrackMac > TTmac128
| |
| | | | |
| | | | |
Verifiable secret sharing (VSS) | | | - Visuals > Verifiable Secret Sharing
| |
| | - Cryptography > Classical > Vernam Cipher
| | Open |
Vernam Analysis = Templates for breaking a function or protocol | | | | |
| | - Classic Ciphers > VIC Cipher
- Cryptography > Classical > VIC Cipher
| | |
Vigenère Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > Vigenère Analyzer
- Cryptanalysis > Classical > Vigenère Analysis
- Cryptanalysis > Classic Encryption > Vigenère
| - Analysis > Vigenère Breaker
| Open |
Vigenère Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
| | - Classic Ciphers > Vigenère
- Cryptography > Classical > Vigenère Cipher
- Encryption/Decryption > Classic Encryption/Decryption > Vigenère
| - Algorithms > Classic > Autokey-Vigenère
- Algorithms > Classic > Vigenère
| Open |
Visual codes (QR, EAN8, WAN13, Code39, Code128, PDF417) | | - Tools > Codes > Visual Decoder
- Tools > Codes > Visual Encoder
- Codes > RSA Signed QR Code
- Codes > QR Code Encryption
- Codes > QR Code File Decoding
- Codes > Detection of Optical Codes
- Codes > QR Code Creation
- Codes > Create visual code
- Codes > Decode visual code
| | |
| | - Modern Ciphers > Symmetric > Visual Cryptography
- Cryptography > Modern > Symmetric > Visual Cryptography
| | |
Vitányi Analysis = Templates for breaking a function or protocol | | | | |
Viterbi Analysis = Templates for breaking a function or protocol | | | - Analysis > Viterbi Analysis
| |
| | | | |
| | - Steganography > Watermark Creator
- Steganography > Watermark Creator – Invisible Watermark
- Steganography > Watermark Creator – Robustness
- Steganography > Watermark Creator – Visible Watermark
| | |
| | | | Open |
| | | | |
WEP Attack = Templates for breaking a function or protocol | | - Protocols > Attacks on the WEP Protocol
| | |
| | - Hash functions > Whirlpool
- Hash Functions > Whirlpool
| | |
| | | - Visuals > Winternitz OT-Signature (WOTS / WOTS+)
- Signatures > CMSSSignature > CMSSwithSHA512andWinternitzOTS_1
- Signatures > CMSSSignature > CMSSwithSHA512andWinternitzOTS_3
- Signatures > CMSSSignature > CMSSwithSHA256andWinternitzOTS_4
- Signatures > CMSSSignature > CMSSwithSHA1andWinternitzOTS_1
- Signatures > CMSSSignature > CMSSwithSHA512andWinternitzOTS_2
- Signatures > CMSSSignature > CMSSwithSHA256andWinternitzOTS_3
- Signatures > CMSSSignature > CMSSwithSHA384andWinternitzOTS_3
- Signatures > CMSSSignature > CMSSwithSHA384andWinternitzOTS_4
- Signatures > CMSSSignature > CMSSwithSHA384andWinternitzOTS_2
- Signatures > CMSSSignature > CMSSwithSHA384andWinternitzOTS_1
- Signatures > CMSSSignature > CMSSwithSHA256andWinternitzOTS_1
- Signatures > CMSSSignature > CMSSwithSHA1andWinternitzOTS_4
- Signatures > CMSSSignature > CMSSwithSHA1andWinternitzOTS_2
- Signatures > CMSSSignature > CMSSwithSHA512andWinternitzOTS_4
- Signatures > CMSSSignature > CMSSwithSHA1andWinternitzOTS_3
| |
Word pattern Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Generic > Word Patterns
- Cryptanalysis > Classical > Wordpattern Analysis
- Cryptanalysis > Classical > Wordpattern Analysis with Self-Defined Dictionary
| | |
X^2 (mod N) ( PRNG = Pseudo random number generator ) | | | | |
| | - Cryptography > Classical > XOR Cipher
- Encryption/Decryption > Classic Encryption/Decryption > XOR
| - Algorithms > Classic > XOR
| Open |
Yao's millionaire problem (protocol) ( MPC = Multi-party communication ) | | - Protocols > Yao 1
- Protocols > Yao 2
- Protocols > Yao 3
- Protocols > Yao's Millionaire Problem Protocol
| | |
| | - Protocols > Zero Knowledge Prover
- Protocols > Zero Knowledge Verifier
- Protocols > Zero Knowledge Protocol
| - Visuals > Zero-Knowledge: Magic Door
- Visuals > Zero-Knowledge: Fiat Shamir
- Visuals > Zero-Knowledge: Feige Fiat Shamir
- Visuals > Zero-Knowledge: Graph Isomorphism
| |
| | | | |
Zodiac-408 Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Classical > Zodiac-408 Analysis
| | |
| | | | |