Cryptological functions from all CrypTool versions
Selection
Function | CT1 | CT2 | JCT | CTO | CT1 Path | CT2 Path | JCT Path | CTO Path |
---|---|---|---|---|---|---|---|---|
Triple DES (3DES) | X | T | A | Encrypt/Decrypt \ Symmetric (modern) \ Triple DES...… | [T] \ Cryptography \ Modern \ Symmetric \ Triple DES Cipher | [A] \ Password-Based Ciphers \ PbeWithSHAAnd3_KeyTripleDES_CBC | ||
Triple DES (3DES) [analysis] | X | T | Analysis \ Symmetric Encryption (modern) \ Triple DES… | [T] \ Cryptanalysis \ Modern \ Triple DES Brute-Force Analysis | ||||
ADFGX / ADFGVX | X | C/T/W | D | X | Encrypt/Decrypt \ Symmetric (classic) \ ADFGVX… | [C] \ Classic Ciphers \ ADFGVX [T] \ Cryptography \ Classical \ ADFGVX Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ ADFGVX | [D] \ Algorithms \ Classic \ ADFGVX | ADFG(V)X |
ADFGVX [analysis] | X | C/T | Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ ADFGVX… | [C] \ Cryptanalysis \ Specific \ ADFGVX Analyzer [T] \ Cryptanalysis \ Classical \ ADFGVX Heuristic Analysis [T] \ Cryptanalysis \ Classical \ ADFGVX Dictionary Attack | ||||
AES | X | C/T/W | A/D | Encrypt/Decrypt \ Symmetric (modern) \ AES (CBC)... Encrypt/Decrypt \ Symmetric (modern) \ AES (self extracting)… | [C] \ Modern Ciphers \ Symmetric \ AES [T] \ Cryptography \ Modern \ Symmetric \ AES Encryption with Implicit Conversion [T] \ Cryptography \ Modern \ Symmetric \ AES Cipher (File Input) [T] \ Cryptography \ Modern \ Symmetric \ AES Cipher (Text Input) [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ AES | [A] \ Block Ciphers \ Rijndael \ AES \ AES128_ECB [A] \ Block Ciphers \ Rijndael \ AES \ AES256_CFB [A] \ Block Ciphers \ Rijndael \ AES \ AES192_ECB [A] \ Block Ciphers \ Rijndael \ AES \ AES256_CBC [A] \ Block Ciphers \ Rijndael \ AES \ AES128_CBC [A] \ Block Ciphers \ Rijndael \ AES \ AES128_CFB [A] \ Block Ciphers \ Rijndael \ AES \ AES192_OFB [A] \ Block Ciphers \ Rijndael \ AES \ AES192_CFB [A] \ Block Ciphers \ Rijndael \ AES \ AES256_OFB [A] \ Block Ciphers \ Rijndael \ AES \ AES128_OFB [A] \ Block Ciphers \ Rijndael \ AES \ AES256_ECB [A] \ Block Ciphers \ Rijndael \ AES \ AES192_CBC [D] \ Algorithms \ Symmetric \ AES | ||
AES [analysis] | X | T/W | X | Analysis \ Symmetric Encryption (modern) \ AES (CBC)… | [T] \ Cryptanalysis \ Modern \ AES Analysis Using Entropy (1) [T] \ Cryptanalysis \ Modern \ AES Known-Plaintext Analysis (1) [T] \ Cryptanalysis \ Modern \ AES Analysis Using Entropy (2) – with Changeable Plaintext [T] \ Cryptanalysis \ Modern \ AES Known-Plaintext Analysis (2) [W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ AES \ Ciphertext-only [W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ AES \ Known plaintext | Distributed AES Analysis | ||
AES [visual] | X | C/T | X | Indiv. Procedures \ Visualization of Algorithms \ AES \ | [C] \ Modern Ciphers \ Symmetric \ AES Visualization [T] \ Cryptography \ Modern \ Symmetric \ AES Visualization | AES Animation AES (step-by-step) | ||
ASN.1 | X | Indiv. Procedures \ Tools \ Codes \ Decode ASN.1 Code of a Document | ||||||
Atbash | X | Encrypt/Decrypt \ Symmetric (classic) \ Substitution / Atbash… | ||||||
Authentication methods in networks [visual] | X | Indiv. Procedures \ Protocols \ Network Authentication… | ||||||
Autocorrelation | X | C | X | Analysis \ Tools for Analysis \ Autocorrelation | [C] \ Cryptanalysis \ Generic \ Autocorrelation | Autocorrelation | ||
Base 64 encode/decode | X | Indiv. Procedures \ Tools \ Codes \ Base64 Encode/Decode \ Base64 Decode Indiv. Procedures \ Tools \ Codes \ Base64 Encode/Decode \ Base64 Encode | ||||||
Byte Addition | X | Encrypt/Decrypt \ Symmetric (classic) \ Byte Addition… | ||||||
Byte Addition [analysis] | X | Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Byte Addition | ||||||
Caesar / Rot-13 | X | C/T/W | D | Encrypt/Decrypt \ Symmetric (classic) \ Caesar / Rot-13… | [C] \ Classic Ciphers \ Caesar [T] \ Cryptography \ Classical \ Caesar Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Caesar | [D] \ Algorithms \ Classic \ Caesar | ||
Caesar / Rot-13 [analysis] | X | T/W/C | X | Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Caesar | [T] \ Cryptanalysis \ Classical \ Caesar Brute-Force Analysis [T] \ Cryptanalysis \ Classical \ Caesar Analysis Using Character Frequencies [W] \ Cryptanalysis \ Classic Encryption \ Caesar [C] \ Cryptanalysis \ Specific \ Caesar Analyzer | Caesar / Rot13 | ||
Caesar / Rot-13 [visual] | X | Indiv. Procedures \ Visualization of Algorithms \ Caesar… | ||||||
Chinese remainder theorem (CRT) [visual] | X | D | Indiv. Procedures \ Chinese Remainder Theorem Applications \ | [D] \ Visuals \ Chinese Remainder Theorem (CRT) | ||||
DES | X | T/C/W | A/D | Encrypt/Decrypt \ Symmetric (modern) \ DES… | [T] \ Cryptography \ Modern \ Symmetric \ DES Complementation Property [C] \ Modern Ciphers \ Symmetric \ DES [T] \ Cryptography \ Modern \ Symmetric \ DES Cipher [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ DES | [A] \ Block Ciphers \ DESede \ DESede_CBC [A] \ Password-Based Ciphers \ PbeWithSHA1AndDES_CBC [A] \ Password-Based Ciphers \ PbeWithMD5AndDES_CBC [D] \ Visuals \ Inner States of the Data Encryption Standard (DES) | ||
DES [analysis] | X | T/W | Analysis \ Symmetric Encryption (modern) \ DES… | [T] \ Cryptanalysis \ Modern \ DES Analysis Using Entropy [T] \ Cryptanalysis \ Modern \ DES Known-Plaintext Analysis [T] \ Cryptanalysis \ Modern \ DES Brute-Force Analysis [W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ DES \ Known plaintext | ||||
DES [visual] | X | C/T | Indiv. Procedures \ Visualization of Algorithms \ DES… | [C] \ Modern Ciphers \ Symmetric \ DESVisualization [T] \ Cryptography \ Modern \ Symmetric \ DES Visualization | ||||
DESL | X | Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESL… | ||||||
DESL [analysis] | X | Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESL… | ||||||
DESX | X | Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESX… | ||||||
DESX [analysis] | X | Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESX… | ||||||
DESXL | X | Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESXL… | ||||||
DESXL [analysis] | X | Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESXL… | ||||||
Key exchange (Diffie-Hellman DH) (Perfect Forward Secrecy) [visual] | X | Indiv. Procedures \ Protocols \ Diffie-Hellman Demonstration… | ||||||
Signature [visual] | X | D | Digital Signatures, PKI \ Signature Demonstration (Signature Generation)… Indiv. Procedures \ RSA Cryptosystem \ Signature Demonstration (Signature Generation)… | [D] \ Visuals \ Signature Demonstration | ||||
Keys (display / export) | X | Digital Signatures, PKI \ Display/Export Keys… | ||||||
DSA signature | X | A/D | Digital Signatures, PKI \ Sign Document... \ DSA | [A] \ Signatures \ DSASignature \ RAW/DSA [A] \ Signatures \ DSASignature \ SHAwithDSA [A] \ Signatures \ IQDSASignature \ IQDSA [A] \ Signatures \ IQDSASignature \ RIPEMD160withIQDSA [A] \ Signatures \ IQRDSASignature \ IQRDSA [A] \ Signatures \ IQRDSASignature \ RIPEMD160withIQRDSA [D] \ Algorithms \ Signature \ DSA | ||||
ECC-AES | X | Encrypt/Decrypt \ Hybrid \ ECC-AES… | ||||||
ECDSA signature | X | A | Digital Signatures, PKI \ Sign Document... \ ECSP-DSA | [A] \ Signatures \ ECDSASignature \ SHA1/ECDSA [A] \ Signatures \ ECDSASignature \ SHA512/ECDSA [A] \ Signatures \ ECDSASignature \ RawECDSA [A] \ Signatures \ ECDSASignature \ SHA224/ECDSA [A] \ Signatures \ ECDSASignature \ SHA256/ECDSA [A] \ Signatures \ ECDSASignature \ SHA384/ECDSA | ||||
ECNR signature | X | A | Digital Signatures, PKI \ Sign Document... \ ECSP-NR | [A] \ Signatures \ SHA1/ECNR | ||||
EC calculations [visual] | X | Indiv. Procedures \ Number Theory - Interactive \ Point Addition on Elliptic Curves… | ||||||
Enigma [visual] | X | X | Indiv. Procedures \ Visualization of Algorithms \ Enigma… | Enigma (step-by-step) | ||||
Entropy [analysis] | X | D | Analysis \ Tools for Analysis \ Entropy | [D] \ Analysis \ Entropy Analysis | ||||
Signature extraction | X | Digital Signatures, PKI \ Extract Signature… | ||||||
Factorization of a number | X | C/T/N/W | Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Brute-force Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Brent Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Pollard Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Williams Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Lenstra Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Quadratic Sieve | [C] \ Cryptanalysis \ Generic \ Quadratic Sieve [T] \ Mathematics \ Factorization with Quadratic Sieve (QS) [C] \ Cryptanalysis \ Generic \ Factorizer [T] \ Mathematics \ Factorization with Trial Division (Brute-Force) [N] \ Crypto tutorials \ World of Primes \ Factorization \ Brute-force [N] \ Crypto tutorials \ World of Primes \ Factorization \ Quadratic Sieve [W] \ Mathematical Functions \ Prime Factorization | ||||
FIPS PUB-140-1 (test PRNG) | X | Analysis \ Analyze Randomness \ FIPS PUB-140-1 Test Battery | ||||||
Frequency test | X | C/T | D | X | Analysis \ Analyze Randomness \ Frequency Test... Analysis \ Tools for Analysis \ Floating Frequency | [C] \ Cryptanalysis \ Generic \ Frequency Test [T] \ Cryptanalysis \ Classical \ Frequency Analysis | [D] \ Analysis \ Frequency Analysis | Graphical Frequency Analysis |
Keys (generate / import) | X | Digital Signatures, PKI \ Generate/Import Keys… | ||||||
Primes (generators, tests, factorization, tutorials) | X | T/C/N/W | Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ Miller-Rabin Test Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ Solovay-Strassen Test Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ FermatTest Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Miller-Rabin Test Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Fermat Test Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Solovay-Strassen test Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ AKS test (deterministic procedure) Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… | [T] \ Mathematics \ Next Smaller Prime Number [T] \ Mathematics \ Primes Test [C] \ Tools \ Data input/output \ Prime Generator [T] \ Mathematics \ Primes Generator [N] \ Crypto tutorials \ World of Primes [N] \ Crypto tutorials \ World of Primes \ Primality test \ Sieve of Eratosthenes [N] \ Crypto tutorials \ World of Primes \ Primality test \ Miller-Rabin test [N] \ Crypto tutorials \ World of Primes \ Primality test \ Sieve of Atkin [N] \ Crypto tutorials \ World of Primes \ Generation of primes \ Generation of primes [N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number line [N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number grid [N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number of primes [N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Ulam's spiral [C] \ Cryptanalysis \ Generic \ Prime Test [W] \ Mathematical Functions \ Prime Operations \ Prime Number Generation | ||||
Hash algorithms [visual] | X | D | Indiv Procedures \ Hash \ Hash Demonstration… | [D] \ Visuals \ Hash Sensitivity | ||||
Hash attack (collisions) | X | Analysis \ Hash \ Attack on the Hash Value of the Digital Signature… | ||||||
Hash value of a file | X | Indiv. Procedures \ Hash \ Hash Value of a File… | ||||||
Hill cipher | X | C/T | X | Encrypt/Decrypt \ Symmetric (classic) \ Hill… | [C] \ Classic Ciphers \ Hill Cipher [T] \ Cryptography \ Classical \ Hill Cipher | Hill | ||
Hill cipher [analysis] | X | Analysis \ Symmetric encryption (classic) \ Known Plaintext \ Hill… | ||||||
Histogram | X | Analysis \ Tools for Analysis \ Histogram | ||||||
HMAC | X | T/C | Indiv. Procedures \ Hash \ Generation of HMACs… | [T] \ Hash Functions \ HMAC [C] \ Hash functions \ HMAC | ||||
Homophonic substitution cipher | X | T | Encrypt/Decrypt \ Symmetric (classic) \ Homophone… | [T] \ Cryptography \ Classical \ Homophonic Substitution Cipher and Nomenclature – Decryption [T] \ Cryptography \ Classical \ Homophonic Substitution Cipher and Nomenclature – Encryption | ||||
IDEA | X | A/D | Encrypt/Decrypt \ Symmetric (modern) \ IDEA… | [A] \ Block Ciphers \ IDEA \ IDEA_CFB [A] \ Block Ciphers \ IDEA \ IDEA_ECB [A] \ Block Ciphers \ IDEA \ IDEA_OFB [A] \ Block Ciphers \ IDEA \ IDEA_CBC [D] \ Algorithms \ Symmetric \ IDEA | ||||
IDEA [attack] | X | Analysis \ Symmetric Encryption (modern) \ IDEA… | ||||||
Inverse congruence generator (ICG) (PRNG) | X | Indiv. Procedures \ Tools \ Generate Random Numbers… | ||||||
Key generation from password (PKCS#5) | X | Indiv. Procedures \ Hash \ Key Generation from Password (PKCS #5)… | ||||||
Length of a number | X | Indiv. Procedures \ Tools \ Length of a number… | ||||||
Linear congruence generator (LCG) (PRNG) | X | Indiv. Procedures \ Tools \ Generate Random Numbers… | ||||||
MARS | X | A | Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ MARS… | [A] \ Block Ciphers \ MARS | ||||
MARS [attack] | X | Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ MARS… | ||||||
MD2 | X | Indiv. Procedures \ Hash \ MD2 | ||||||
MD4 | X | A | Indiv. Procedures \ Hash \ MD4 | [A] \ Message Authentication Codes \ HMac \ HmacMD4 | ||||
MD5 | X | T/C | A/D | Indiv. Procedures \ Hash \ MD5 | [T] \ Hash Functions \ MD5 Collision Finder [T] \ Hash Functions \ MD5 Salted Hash Comparison [C] \ Hash functions \ MD5 [T] \ Hash Functions \ MD5 [C] \ Cryptanalysis \ Specific \ MD5 Collider | [A] \ Message Authentication Codes \ HMac \ HmacMD5 [D] \ Algorithms \ Hash \ MD5 [D] \ Algorithms \ MAC \ HMacMD5 | ||
N-gram [analysis] | X | Analysis \ Tools for Analysis \ N-Gram… | ||||||
Nihilist [visual] | X | Indiv. Procedures \ Visualization of Algorithms \ Nihilist… | ||||||
Number Shark (taxman) | X | D | X | Indiv. Procedures \ Educational Games \ Number Shark | [D] \ Games \ Number Shark | Taxman | ||
Number theory (also see Primes) | X | T/N | X | Indiv. Procedures \ Number Theory - Interactive \ Indiv. Procedures \ Number Theory - Interactive \ Generic t-adic-NAF Key Generator | [T] \ Mathematics \ Calculating with Big Numbers [T] \ Mathematics \ Linear Congruential Generator [N] \ Crypto tutorials \ World of Primes \ Number theory \ Number-theoretic functions [N] \ Crypto tutorials \ World of Primes \ Number theory \ Primitive roots [N] \ Crypto tutorials \ World of Primes \ Number theory \ Goldbach's conjecture | Msieve Factorizer | ||
Password quality [visual] | X | C/T/W | Indiv. Procedures \ Tools \ Password Quality Meter... Indiv. Procedures \ Tools \ Password Entropy... | [C] \ Tools \ Misc \ PasswordStrength [T] \ Tools \ Check Password Strength [W] \ Tools \ Password Strength | ||||
Periodicity [analysis] | X | Analysis \ Tools for Analysis \ Periodicity | ||||||
Playfair cipher | X | C/T/W | D | Encrypt/Decrypt \ Symmetric (classic) \ Playfair… | [C] \ Classic Ciphers \ Playfair [T] \ Cryptography \ Classical \ Playfair Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Playfair | [D] \ Algorithms \ Classic \ Playfair | ||
Playfair [analysis] | X | T/C | Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Playfair… | [T] \ Cryptanalysis \ Classical \ Playfair Analysis [C] \ Cryptanalysis \ Specific \ Playfair Analyzer | ||||
Poker-Test (test PRNG) | X | Analysis \ Analyze Randomness \ Poker Test… | ||||||
Scytale / Rail fence | X | Encrypt/Decrypt \ Symmetric (classic) \ Scytale / Rail Fence… | ||||||
Randomness [visual] | X | Analysis \ Analyze Randomness \ 3D Visualization… | ||||||
RC2 | X | C/T/W | A | Encrypt/Decrypt \ Symmetric (modern) \ RC2… | [C] \ Modern Ciphers \ Symmetric \ RC2 [T] \ Cryptography \ Modern \ Symmetric \ RC2 Cipher [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ RC2 | [A] \ Block Ciphers \ RC2 \ RC2_CBC [A] \ Password-Based Ciphers \ PbeWithSHAAnd40BitRC2_CBC | ||
RC2 [attack] | X | Analysis \ Symmetric Encryption (modern) \ RC2… | ||||||
RC4 | X | C/T | D | Encrypt/Decrypt \ Symmetric (modern) \ RC4… | [C] \ Modern Ciphers \ Symmetric \ RC4 [T] \ Cryptography \ Modern \ Symmetric \ RC4 Cipher | [D] \ Algorithms \ Symmetric \ ARC4/Spritz [D] \ Visuals \ ARC4 / Spritz | ||
RC4 [attack] | X | Analysis \ Symmetric Encryption (modern) \ RC4… | ||||||
RC6 | X | A/D | Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ RC6… | [A] \ Block Ciphers \ RC6 [D] \ Algorithms \ Symmetric \ RC6 | ||||
RC6 [attack] | X | Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ RC6… | ||||||
RIPEMD-160 | X | Indiv. Procedures \ Hash \ RIPEMD-160 | ||||||
RSA | X | T/C/W | A/D | Encrypt/Decrypt \ Asymmetric \ RSA Indiv. Procedures \ RSA Cryptosystem \ | [T] \ Cryptography \ Modern \ Asymmetric \ RSA with Big Numbers [C] \ Modern Ciphers \ Asymmetric \ RSA [T] \ Cryptography \ Modern \ Asymmetric \ RSA Cipher [T] \ Cryptography \ Modern \ Asymmetric \ RSA Decryption [T] \ Cryptography \ Modern \ Asymmetric \ RSA Encryption [C] \ Modern Ciphers \ Asymmetric \ RSA Key Generator [T] \ Cryptography \ Modern \ Asymmetric \ RSA Key Generator [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Asymmetric Encryption/Decryption \ RSA \ RSA Encryption [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Asymmetric Encryption/Decryption \ RSA \ RSA Decryption | [A] \ Asymmetric Block Ciphers \ RprimeRSA [A] \ Asymmetric Block Ciphers \ RSA [A] \ Asymmetric Block Ciphers \ RbRSA [D] \ Algorithms \ Asymmetric \ RSA [D] \ Visuals \ Extended RSA Cryptosystem | ||
RSA [attack] | X | T/W | Indiv. Procedures \ RSA Cryptosystem \ Lattice-Based Attacks on RSA... Analysis \ Asymmetric Encryption \ Lattice-Based Attacks on RSA... \ Analysis \ Asymmetric Encryption \ Side-Channel Attack on "Textbook RSA"… | [T] \ Cryptanalysis \ Modern \ RSA Common Factor Attack [W] \ Cryptanalysis \ Modern Encryption \ Asymmetric Encryption \ RSA | ||||
RSA [visual] | X | X | Indiv. Procedures \ RSA Cryptosystem \ | RSA (step-by-step) RSA visual and more | ||||
RSA-AES | X | Encrypt/Decrypt \ Hybrid \ RSA-AES… | ||||||
Runs-Test (test PRNG) | X | Analysis \ Analyze Randomness \ Runs Test… | ||||||
Pseudo random number generator (PRNG) of the Secude library | X | Indiv. Procedures \ Tools \ Generate Random Numbers… | ||||||
Secure email (S/MIME) [visual] | X | Indiv. Procedures \ Protocols \ Secure E-Mail with S/MIME… | ||||||
Serial-Test (test PRNG) | X | Analysis \ Analyze Randomness \ Serial Test… | ||||||
Serpent | X | A | Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ Serpent… | [A] \ Block Ciphers \ Serpent \ Serpent192_CBC [A] \ Block Ciphers \ Serpent \ Serpent192_CFB [A] \ Block Ciphers \ Serpent \ Serpent128_OFB [A] \ Block Ciphers \ Serpent \ Serpent256_ECB [A] \ Block Ciphers \ Serpent \ Serpent256_OFB [A] \ Block Ciphers \ Serpent \ Serpent256_CFB [A] \ Block Ciphers \ Serpent \ Serpent128_ECB [A] \ Block Ciphers \ Serpent \ Serpent192_OFB [A] \ Block Ciphers \ Serpent \ Serpent192_ECB [A] \ Block Ciphers \ Serpent \ Serpent128_CBC [A] \ Block Ciphers \ Serpent \ Serpent128_CFB [A] \ Block Ciphers \ Serpent \ Serpent256_CBC | ||||
Serpent [attack] | X | Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ Serpent… | ||||||
SHA | X | C/T | A/D | X | Indiv. Procedures \ Hash \ SHA-1 Indiv. Procedures \ Hash \ SHA-256 Indiv. Procedures \ Hash \ SHA-512 | [C] \ Hash functions \ SHA [T] \ Hash Functions \ SHA-1 Collision [T] \ Hash Functions \ SHA-1 [T] \ Hash Functions \ SHA-256 | [A] \ Message Digests \ SHA384 [A] \ Message Digests \ SHA224 [A] \ Message Digests \ SHA1 [A] \ Message Digests \ SHA256 [A] \ Message Digests \ SHA512 [A] \ Pseudo Random Number Generators \ SHA1PRNG [D] \ Algorithms \ Hash \ SHA-256 [D] \ Algorithms \ Random Number Generator \ SHA-1 [D] \ Algorithms \ Hash \ SHA-3 Candidates | SHA256 |
Shamir's secret sharing (MPC) [visual] | X | Indiv. Procedures \ Secret Sharing Demonstration (Shamir)… | ||||||
Solitaire | X | C/T | Encrypt/Decrypt \ Symmetric (classic) \ Solitaire… | [C] \ Classic Ciphers \ Solitaire [T] \ Cryptography \ Classical \ Solitaire Cipher | ||||
Solitaire [analysis] | X | T/C | Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Solitaire... Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Solitaire… | [T] \ Cryptanalysis \ Classical \ Solitaire Brute-Force Analysis [C] \ Cryptanalysis \ Specific \ Solitaire Analyzer | ||||
Substitution | X | C/T/W | D | X | Encrypt/Decrypt \ Symmetric (classic) \ Substitution / Atbash… | [C] \ Classic Ciphers \ Substitution [T] \ Cryptography \ Classical \ Substitution Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Substitution | [D] \ Algorithms \ Classic \ Substitution | Monoalphabetic Substitution |
Substitution [analysis] | X | C/T/W | D | Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Substitution... Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Substitution… | [C] \ Cryptanalysis \ Specific \ Monoalphabetic Substitution Analyzer [T] \ Cryptanalysis \ Classical \ Monoalphabetic Substitution Analyzer [T] \ Cryptanalysis \ Classical \ Monoalphabetic Substitution Analyzer with Arbitrary Ciphertext Alphabet [W] \ Cryptanalysis \ Classic Encryption \ Monoalphabetic Substitution | [D] \ Analysis \ Substitution Analysis | ||
Transposition (single column transposition) | X | C/T/W | D | X | Encrypt/Decrypt \ Symmetric (classic) \ Permutation / Transposition… | [C] \ Classic Ciphers \ Transposition [T] \ Cryptography \ Classical \ Transposition Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Transposition | [D] \ Algorithms \ Classic \ Transposition | Transposition |
Transposition [analysis] | X | T/C/W | D | Analysis \ Symmetric Encryption (classic) \ Known Plaintext \ Single Column Transposition… | [T] \ Cryptanalysis \ Classical \ Transposition Brute-Force Analysis [T] \ Cryptanalysis \ Classical \ Transposition Crib Analysis [T] \ Cryptanalysis \ Classical \ Transposition Genetic Analysis [T] \ Cryptanalysis \ Classical \ Transposition Hill Climbing Analysis [C] \ Cryptanalysis \ Specific \ Transposition Analyzer [W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Brute-force [W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Genetic | [D] \ Analysis \ Transposition Analysis | ||
Twofish | X | T | A | Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ Twofish… | [T] \ Cryptography \ Modern \ Symmetric \ Twofish Cipher | [A] \ Block Ciphers \ Twofish | ||
Twofish [attack] | X | Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ Twofish… | ||||||
Zip/Unzip | X | Indiv. Procedures \ Tools \ Compress \ UnZip Indiv. Procedures \ Tools \ Compress \ Zip | ||||||
UU Decode/Encode | X | Indiv. Procedures \ Tools \ Codes \ UU Encode/Decode \ UU Decode Indiv. Procedures \ Tools \ Codes \ UU Encode/Decode \ UU Encode | ||||||
Signature verification | X | D | Digital Signatures, PKI \ Verify Signature… | [D] \ Visuals \ Signature Verification | ||||
Vernam | X | C/T | X | Encrypt/Decrypt \ Symmetric (classic) \ Vernam \ OTP… | [C] \ Classic Ciphers \ Vernam [T] \ Cryptography \ Classical \ Vernam Cipher | Vernam | ||
Vernam [analysis] | X | Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ XOR / Vernam | ||||||
Vigenère cipher | X | C/T/W | D | X | Encrypt/Decrypt \ Symmetric (classic) \ Vigenère… | [C] \ Classic Ciphers \ Vigenère [T] \ Cryptography \ Classical \ Vigenère Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Vigenère | [D] \ Algorithms \ Classic \ Autokey-Vigenère [D] \ Algorithms \ Classic \ Vigenère | Autokey Vigenère |
Vigenère [analysis] | X | T/W/C | D | X | Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Vigenère Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Vigenère (Analysis according to Schroedel)… | [T] \ Cryptanalysis \ Classical \ Vigenère Analysis [W] \ Cryptanalysis \ Classic Encryption \ Vigenère [C] \ Cryptanalysis \ Specific \ Vigenère Analyzer | [D] \ Analysis \ Vigenère Breaker | Vigenère Analysis |
Vigenère [visual] | X | Indiv. Procedures \ Visualization of Algorithms \ Vigenère… | ||||||
Vitányi [analysis] | X | Analysis \ Analyze Randomness \ Vitányi | ||||||
X^2 (mod N) (PRNG) | X | Indiv. Procedures \ Tools \ Generate Random Numbers… | ||||||
XOR | X | C/T/W | D | X | Encrypt/Decrypt \ Symmetric (classic) \ XOR… | [C] \ Classic Ciphers \ XOR [T] \ Cryptography \ Classical \ XOR Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ XOR | [D] \ Algorithms \ Classic \ XOR | XOR |
ASCII | X | ASCII | ||||||
ATBASH | X | Atbash | ||||||
Steganography | C/T | X | [C] \ Steganography \ Image Steganography [T] \ Steganography \ Image Steganography with BPCS [T] \ Steganography \ Image Steganography with LSB [C] \ Steganography \ Text Steganography [T] \ Steganography \ Text Steganography with Capital Letters (Binary Mode) [T] \ Steganography \ Text Steganography with Capital Letters [T] \ Steganography \ Text Steganography with Letter Marking (Binary Mode) [T] \ Steganography \ Text Steganography with Letter Marking [T] \ Steganography \ Text Steganography with Zero Width Spaces | Bacon | ||||
Barcode | X | Barcode | ||||||
Base64 | X | Base64 | ||||||
Beaufort cipher | X | Beaufort | ||||||
Bit shift | X | Bit Shift | ||||||
Corona / COVID | X | Corona Tracing | ||||||
Gronsfeld cipher | X | Gronsfeld | ||||||
Huffman | C/T | D | X | [C] \ Tools \ Codes \ Huffman [T] \ Tools \ Huffman's Algorithm (ASCII) [T] \ Tools \ Huffman's Algorithm (BMG, JPG) [T] \ Tools \ Huffman's Algorithm (UTF-8) | [D] \ Visuals \ Huffman Coding | Huffman | ||
Kamasutra cipher | X | Kamasutra | ||||||
Morse code | C/T/W | X | [C] \ Tools \ Codes \ Morse Code [T] \ Codes \ Morse Code [W] \ Codes \ Morse Code | Morse Code | ||||
Multiplicative cipher | X | Multiplicative | ||||||
N-gram analysis | X | Tabular N-gram Analysis | ||||||
Cipher identifier | X | NCID | ||||||
Tools | C | X | [C] \ Tools \ Misc \ Byte Array Operations [C] \ Cryptanalysis \ Generic \ Contains [C] \ Tools \ Misc \ Number Operation [C] \ Tools \ Misc \ Progress | Numberconverter Password Check Password Generator Password Meter | ||||
OpenSSL | X | OpenSSL | ||||||
Porta | X | Porta | ||||||
Railfence | X | Railfence | ||||||
Redefence | X | Redefence | ||||||
Rotation cipher | X | Rotation | ||||||
Scytale | C/T/W | X | [C] \ Classic Ciphers \ Scytale [T] \ Cryptography \ Classical \ Scytale Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Scytale | Scytale | ||||
Trithemius | X | Trithemius | ||||||
Web terminal | X | Wasm Webterm | ||||||
Alphabet | C | [C] \ Tools \ Data flow \ Alphabet Permutator | ||||||
Substitution cipher | T | [T] \ Cryptography \ Classical \ Substitution Cipher Using a Keyword | ||||||
Camellia | C/T | A | [C] \ Modern Ciphers \ Symmetric \ Camellia [T] \ Cryptography \ Modern \ Symmetric \ Camellia Cipher | [A] \ Block Ciphers \ Camellia \ Camellia256_CBC [A] \ Block Ciphers \ Camellia \ Camellia192_CBC [A] \ Block Ciphers \ Camellia \ Camellia128_CBC | ||||
Data flow | C/T | [C] \ Tools \ Data flow \ Concatenate [C] \ Tools \ Data flow \ Array Indexer [C] \ Tools \ Boolean \ Boolean Binary Operator [C] \ Tools \ Boolean \ Boolean Not Operator [C] \ Tools \ Misc \ Comparators [C] \ Tools \ Misc \ Converter [C] \ Tools \ Codes \ String Decoder [C] \ Tools \ Codes \ String Encoder [C] \ Tools \ Misc \ Length [C] \ Tools \ Data flow \ Variable Load [C] \ Tools \ Data flow \ Variable Store [C] \ Tools \ Misc \ Stream Comparator [T] \ Tools \ Split a Text [C] \ Tools \ Data input/output \ File Output [C] \ Tools \ Data flow \ Gate [T] \ Tools \ Loop [C] \ Tools \ Misc \ Inc Dec [C] \ Tools \ Data input/output \ Picture Output [C] \ Tools \ Misc \ String Operations [C] \ Tools \ Data input/output \ Text Output | ||||||
Cyclic redundancy check (CRC) | T/C | [T] \ Hash Functions \ CRC Null Problems [C] \ Hash functions \ CRC [T] \ Hash Functions \ CRC | ||||||
Scytale [analysis] | T/W | [T] \ Cryptanalysis \ Classical \ Scytale Brute-Force Analysis [W] \ Cryptanalysis \ Classic Encryption \ Scytale | ||||||
Achterbahn | C/T | [C] \ Modern Ciphers \ Symmetric \ Achterbahn [T] \ Cryptography \ Modern \ Symmetric \ Achterbahn Cipher | ||||||
Alphabets | C | [C] \ Tools \ Data input/output \ Alphabets | ||||||
Bacon cipher | C/T | [C] \ Steganography \ Baconian Cipher [T] \ Cryptography \ Classical \ Bacon Cipher | ||||||
Berlekamp-Massey algorithm | C/T | [C] \ Cryptanalysis \ Generic \ Berlekamp-Massey Algorithm [T] \ Mathematics \ Berlekamp-Massey | ||||||
Book cipher | C/T | [C] \ Classic Ciphers \ Book Cipher [T] \ Cryptography \ Classical \ Book Cipher with Complete Word Encoding [T] \ Cryptography \ Classical \ Book Cipher with Single Letter Encoding | ||||||
Chaocipher | C/T | [C] \ Classic Ciphers \ Chaocipher [T] \ Cryptography \ Classical \ Chaocipher | ||||||
Data input/output | C/T | [C] \ Tools \ Data flow \ Clock [C] \ Tools \ Data input/output \ IP Frame Generator [C] \ Tools \ Data input/output \ Audio Input [C] \ Tools \ Data input/output \ Audio Output [C] \ Tools \ Boolean \ Boolean Input [T] \ Tools \ Take a Picture Using the Webcam [C] \ Tools \ Boolean \ Boolean Output [T] \ Tools \ Random Decimal Number [C] \ Tools \ Misc \ ImageProcessor [C] \ Tools \ Data input/output \ Network Receiver [C] \ Tools \ Data input/output \ Network Sender [C] \ Tools \ Data input/output \ Number Input [C] \ Tools \ Data input/output \ Camera [C] \ Tools \ Data input/output \ Text Input [C] \ Tools \ Data flow \ CSVReader [C] \ Tools \ Data input/output \ Dictionary [C] \ Tools \ Data input/output \ File Input | ||||||
Cylinder cipher | C | [C] \ Classic Ciphers \ Cylinder Cipher | ||||||
M94 | T | [T] \ Cryptography \ Classical \ M94 Test Messages from Joseph O. Mauborgne | ||||||
Enigma | C/T/W | [C] \ Classic Ciphers \ Enigma [T] \ Cryptography \ Classical \ Enigma Cipher Machine [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Enigma | ||||||
Enigma [attack] | T/W/C | [T] \ Cryptanalysis \ Classical \ Enigma Gillogly Attack [T] \ Cryptanalysis \ Classical \ Enigma Hillclimbing Attack [T] \ Cryptanalysis \ Classical \ Enigma Simulated Annealing Attack [T] \ Cryptanalysis \ Classical \ Enigma Turing Bombe Attack [T] \ Cryptanalysis \ Classical \ Enigma Turing Bombe Attack (with Turnover) [W] \ Cryptanalysis \ Classic Encryption \ Enigma [C] \ Cryptanalysis \ Specific \ Enigma Analyzer | ||||||
Fialka | C/T | [C] \ Classic Ciphers \ Fialka [T] \ Cryptography \ Classical \ Fialka ED Check [T] \ Cryptography \ Classical \ Fialka ED Mixed Mode Check [T] \ Cryptography \ Classical \ Fialka ED NumLock10 Check [T] \ Cryptography \ Classical \ Fialka Key Output [T] \ Cryptography \ Classical \ Fialka M-125-3 PROTON II [T] \ Cryptography \ Classical \ Fialka M-125 PROTON I | ||||||
Friedman test | T/C | D | [T] \ Cryptanalysis \ Classical \ Friedman Test for Classical Ciphers [C] \ Cryptanalysis \ Generic \ Friedman Test | [D] \ Analysis \ Friedman Test | ||||
WEP [attack] | T/C | [T] \ Protocols \ WEP Attack [C] \ Protocols \ Attacks on the WEP Protocol | ||||||
Josse cipher | C/T | [C] \ Classic Ciphers \ Josse Cipher [T] \ Cryptography \ Classical \ Josse Cipher | ||||||
Kasiski test | C/T | [C] \ Cryptanalysis \ Generic \ Kasiski's Test [T] \ Cryptanalysis \ Classical \ Kasiski's Test and Autocorrelation | ||||||
Pseudo random number generator (PRNG) | C/T/W | [C] \ Tools \ Random Number \ LFSR [C] \ Tools \ Random Number \ NLFSR [C] \ Tools \ Random Number \ Random Number Generator [T] \ Tools \ Random Number Generators [W] \ Tools \ Random numbers | ||||||
LFSR | T | D | [T] \ Mathematics \ Linear Feedback Shift Register (LFSR) | [D] \ Algorithms \ Symmetric \ LFSR | ||||
M-138 | C/T | [C] \ Classic Ciphers \ M-138 [T] \ Cryptography \ Classical \ M-138 | ||||||
M-138 [attack] | C/T | [C] \ Cryptanalysis \ Specific \ M-138 Analyzer [T] \ Cryptanalysis \ Classical \ M-138 Ciphertext-Only Attack [T] \ Cryptanalysis \ Classical \ M-138 Known-Plaintext Attack [T] \ Cryptanalysis \ Classical \ M-138 Partially-Known Plaintext Attack | ||||||
Visual codes (QR, EAN8, WAN13, Code39, Code128, PDF417) | T/C/W | [T] \ Codes \ RSA Signed QR Code [T] \ Codes \ QR Code Encryption [C] \ Tools \ Codes \ Visual Decoder [T] \ Codes \ QR Code File Decoding [T] \ Codes \ Detection of Optical Codes [C] \ Tools \ Codes \ Visual Encoder [T] \ Codes \ QR Code Creation [W] \ Codes \ Create visual code [W] \ Codes \ Decode visual code | ||||||
PKCS#5 AES | T | [T] \ Cryptography \ Modern \ Symmetric \ AES with PKCS#5 [T] \ Cryptography \ Modern \ Symmetric \ AES (CBC) with PKCS#5 and IV [T] \ Cryptography \ Modern \ Symmetric \ AES (ECB) with PKCS#5 | ||||||
MD5 [analysis] | W | [W] \ Cryptanalysis \ Modern Encryption \ Hash Functions \ MD5 | ||||||
Mexican Army cipher | C/T | [C] \ Classic Ciphers \ Mexican Army Cipher Disk [T] \ Cryptography \ Classical \ Mexican Army Cipher Disk | ||||||
Mexican Army cipher [analysis] | C/T | [C] \ Cryptanalysis \ Specific \ Mexican Army Cipher Disk Analyzer [T] \ Cryptanalysis \ Classical \ Brute-Force Attack on the Mexican Army Cipher Disk | ||||||
Nihilist cipher | C/T | [C] \ Classic Ciphers \ Nihilist Cipher [T] \ Cryptography \ Classical \ Nihilist Cipher | ||||||
NLFSR | T | [T] \ Mathematics \ Non-Linear Feedback Shift Register (NLFSR) | ||||||
Password-based key derivation functions | C/T | [C] \ Hash functions \ PBKDF [T] \ Hash Functions \ Password-Based Key Derivation Functions | ||||||
Dictionary [attack] | T | [T] \ Hash Functions \ Dictionary Attack on a Password Hash Value | ||||||
Avalanche effect | C/T | [C] \ Tools \ Misc \ Avalanche Visualization [T] \ Cryptanalysis \ Modern \ Avalanche (AES) [T] \ Cryptanalysis \ Modern \ Avalanche (Classic Ciphers) [T] \ Cryptanalysis \ Modern \ Avalanche (Compare Classic Ciphers) [T] \ Cryptanalysis \ Modern \ Avalanche (DES) [T] \ Cryptanalysis \ Modern \ Avalanche (Hash Functions) [T] \ Cryptanalysis \ Modern \ Avalanche (Modern Ciphers) | ||||||
BB84 | C | [C] \ Protocols \ BB84 Error Detector [C] \ Protocols \ BB84 Key Generator [C] \ Protocols \ BB84 Photonbase Generator [C] \ Protocols \ BB84 Photon Decoder [C] \ Protocols \ BB84 Photon Encoder | ||||||
Key exchange (BB84) | T | [T] \ Protocols \ BB84 Key Exchange with Eavesdropping Attack [T] \ Protocols \ BB84 Key Exchange | ||||||
BB84 [attack] | C | [C] \ Protocols \ BB84 Man in the Middle | ||||||
Bifid cipher | C/T | [C] \ Classic Ciphers \ Bifid Cipher [T] \ Cryptography \ Classical \ Bifid Cipher | ||||||
BLAKE | C/T | [C] \ Hash functions \ BLAKE [T] \ Hash Functions \ BLAKE [T] \ Hash Functions \ Password Storage Using Salted BLAKE-256 [T] \ Hash Functions \ Password Verification Using Salted BLAKE-256 | ||||||
Blind signature | C | [C] \ Modern Ciphers \ Asymmetric \ Blind Signature Generator [C] \ Modern Ciphers \ Asymmetric \ Blind Signature Verifier | ||||||
Paillier | T/C | [T] \ Cryptography \ Modern \ Asymmetric \ Blind Signature with Paillier [T] \ Cryptography \ Modern \ Asymmetric \ Blind Signature with RSA [T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Voting) [T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher with Blinding [T] \ Cryptography \ Modern \ Asymmetric \ Paillier Key Generator [C] \ Modern Ciphers \ Asymmetric \ Paillier Key Generator | ||||||
Blockchain | C/T | [C] \ Protocols \ Blockchain [T] \ Protocols \ Blockchain Simulation [C] \ Protocols \ Blockchain Signature Creator | ||||||
Blowfish | C/T | [C] \ Modern Ciphers \ Symmetric \ Blowfish [T] \ Cryptography \ Modern \ Symmetric \ Blowfish Cipher | ||||||
Threefish | T | [T] \ Cryptography \ Modern \ Symmetric \ Threefish Cipher | ||||||
Boolean functions | T | [T] \ Mathematics \ Booleans | ||||||
ISAP bit commitment scheme | T/C | [T] \ Mathematics \ ISAP Bit Commitment Scheme [C] \ Protocols \ ISAP Bit Commitment Scheme | ||||||
ISBN | T | [T] \ Codes \ ISBN-10 Check [T] \ Codes \ ISBN-13 Check | ||||||
Paillier (homomorphic encryption) | T/C | [T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Number Input) [T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher with Addition [C] \ Modern Ciphers \ Asymmetric \ Paillier [T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Text Input) | ||||||
Coin flipping protocol | T/C | [T] \ Protocols \ Coin Flipping Protocol [C] \ Protocols \ Coin Flipping | ||||||
Key exchange (Diffie-Hellman DH) | T | D | [T] \ Protocols \ Diffie-Hellman Key-Exchange [T] \ Protocols \ Diffie-Hellman Key-Exchange over Network | [D] \ Visuals \ Diffie-Hellman Key Exchange (EC) | ||||
Dining cryptographers protocol | T | [T] \ Protocols \ Dining Cryptographers Protocol | ||||||
Yao's millionaire problem (protocol) (MPC) | T/C | [T] \ Protocols \ Yao's Millionaire Problem Protocol [C] \ Protocols \ Yao 1 [C] \ Protocols \ Yao 2 [C] \ Protocols \ Yao 3 | ||||||
Zero knowledge protocol | T/C | D | [T] \ Protocols \ Zero Knowledge Protocol [C] \ Protocols \ Zero Knowledge Prover [C] \ Protocols \ Zero Knowledge Verifier | [D] \ Visuals \ Zero-Knowledge: Magic Door [D] \ Visuals \ Zero-Knowledge: Fiat Shamir [D] \ Visuals \ Zero-Knowledge: Feige Fiat Shamir [D] \ Visuals \ Zero-Knowledge: Graph Isomorphism | ||||
ChaCha | C/T | [C] \ Modern Ciphers \ Symmetric \ ChaCha [T] \ Cryptography \ Modern \ Symmetric \ ChaCha Cipher [T] \ Cryptography \ Modern \ Symmetric \ ChaCha Cipher (Presentation) | ||||||
Encoding | T/W | [T] \ Tools \ Text Encoding (e.g. Base64) [W] \ Codes \ Encoding | ||||||
Cost function | C/T | [C] \ Cryptanalysis \ Generic \ Cost Function [T] \ Cryptanalysis \ Classical \ Cost Functions | ||||||
SDES [analysis] | T/W | [T] \ Cryptanalysis \ Modern \ SDES Brute-Force Analysis [T] \ Cryptanalysis \ Modern \ SDES Analysis Using Entropy [T] \ Cryptanalysis \ Modern \ SDES Known-Plaintext Analysis [W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ SDES \ Ciphertext-only [W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ SDES \ Known plaintext | ||||||
Cramer-Shoup | C/T | [C] \ Modern Ciphers \ Asymmetric \ Cramer-Shoup [T] \ Cryptography \ Modern \ Asymmetric \ Cramer-Shoup with AES [C] \ Modern Ciphers \ Asymmetric \ Cramer-Shoup Key Generator | ||||||
CBC [attack] | T | [T] \ Cryptanalysis \ Modern \ CBC Attack | ||||||
Padding oracle attack (POA) | T/C | [T] \ Cryptanalysis \ Modern \ Padding Oracle Attack on AES [T] \ Cryptanalysis \ Modern \ Padding Oracle Attack on DES [C] \ Cryptanalysis \ Specific \ Padding Oracle [C] \ Cryptanalysis \ Specific \ Padding Oracle Attack | ||||||
Secure Chat – Applied Cryptography | T | [T] \ Tools \ Simple Video and Audio Chat Using AES Encryption [T] \ Tools \ Diffie-Hellman AES Video Audio Chat [T] \ Tools \ Simple AES Chat | ||||||
Block mode | T | [T] \ Cryptography \ Modern \ Symmetric \ Block Modes of Symmetric Ciphers | ||||||
SDES | C/T/W | [C] \ Modern Ciphers \ Symmetric \ SDES [T] \ Cryptography \ Modern \ Symmetric \ SDES Cipher [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ SDES | ||||||
Differential cryptanalysis (DCA) | C/T | [C] \ Cryptanalysis \ Specific \ DCA KeyRecovery [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 1 (Automatic Mode) [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 2 (Automatic Mode) [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 3 (Automatic Mode) [C] \ Cryptanalysis \ Specific \ DCA Oracle [C] \ Cryptanalysis \ Specific \ DCA PathFinder [C] \ Cryptanalysis \ Specific \ DCA PathVisualizer [C] \ Cryptanalysis \ Specific \ DCA ToyCipher | ||||||
Differential cryptanalysis (DCA) [visual] | T | [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 1 (Tutorial Mode) [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 2 (Tutorial Mode) [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 3 (Tutorial Mode) | ||||||
Decimalization | C/T | [C] \ Tools \ Misc \ Decimalization [T] \ Mathematics \ Decimalization | ||||||
DGK (homomorphic encryption) | C/T | [C] \ Modern Ciphers \ Asymmetric \ DGK [T] \ Cryptography \ Modern \ Asymmetric \ DGK Cipher (Text Input) [C] \ Modern Ciphers \ Asymmetric \ DGK Key Generator | ||||||
FEAL | C/T | [C] \ Modern Ciphers \ Symmetric \ FEAL [T] \ Cryptography \ Modern \ Symmetric \ FEAL Cipher | ||||||
Format preserving encryption (FPE) (FF1, FF2, FF3 and DFF) | C/T | [C] \ Modern Ciphers \ Symmetric \ Format Preserving Encryption (FPE) [T] \ Cryptography \ Modern \ Symmetric \ Format Preserving Encryption (XML) [T] \ Cryptography \ Modern \ Symmetric \ Format Preserving Encryption | ||||||
Grain | C/T | [C] \ Modern Ciphers \ Symmetric \ Grain v1 [T] \ Cryptography \ Modern \ Symmetric \ Grain v1 Cipher | ||||||
Grøstl | C/T | [C] \ Hash functions \ Grøstl [T] \ Hash Functions \ Grøstl [T] \ Hash Functions \ Password Storage Using Salted Grøstl-256 [T] \ Hash Functions \ Password Verification Using Salted Grøstl-256 | ||||||
Hagelin Machine | C/T | [C] \ Classic Ciphers \ Hagelin Machine [T] \ Cryptography \ Classical \ Hagelin Machine | ||||||
HC128 | C/T | [C] \ Modern Ciphers \ Symmetric \ HC128 [T] \ Cryptography \ Modern \ Symmetric \ HC128 Cipher | ||||||
HIGHT | C | [C] \ Modern Ciphers \ Symmetric \ HIGHT | ||||||
HIGHT cipher | T | [T] \ Cryptography \ Modern \ Symmetric \ HIGHT Cipher | ||||||
Key derivation function (KDF) | C/T | [C] \ Hash functions \ HKDF SHA-256 [T] \ Hash Functions \ KDF Performance Comparison (without Presentation) [T] \ Hash Functions \ KDF Performance Comparison (with Presentation) [C] \ Hash functions \ KKDF SHA-256 [C] \ Hash functions \ KKDF SHAKE256 | ||||||
Homophonic substitution [analysis] | C/T | [C] \ Cryptanalysis \ Specific \ Homophonic Substitution Analyzer [T] \ Cryptanalysis \ Classical \ Homophonic Substitution Analysis | ||||||
Zodiac-408 [analysis] | T | [T] \ Cryptanalysis \ Classical \ Zodiac-408 Analysis | ||||||
ImageHash | C/T | [C] \ Hash functions \ ImageHash [T] \ Hash Functions \ ImageHash [T] \ Hash Functions \ ImageHash – Smooth Comparison | ||||||
Keccak (hash, cipher, PRNG) | C/T | [C] \ Hash functions \ Keccak [T] \ Cryptography \ Modern \ Symmetric \ Keccak Cipher [T] \ Hash Functions \ Keccak Hash (SHA-3) [T] \ Tools \ Keccak Pseudorandom Number Generator (PRNG) | ||||||
LAMBDA1 | C/T | [C] \ Classic Ciphers \ LAMBDA1 [T] \ Cryptography \ Modern \ Symmetric \ LAMBDA1 Block Cipher | ||||||
M209 | C/T | [C] \ Classic Ciphers \ M-209 [T] \ Cryptography \ Classical \ M209 Cipher Machine [T] \ Cryptography \ Classical \ M209 Key Setup | ||||||
GOST Magma cipher | C/T | [C] \ Modern Ciphers \ Symmetric \ GOST Magma [T] \ Cryptography \ Modern \ Symmetric \ GOST Magma Cipher | ||||||
Mickey 2 | C/T | [C] \ Modern Ciphers \ Symmetric \ Mickey 2 [T] \ Cryptography \ Modern \ Symmetric \ Mickey 2 Cipher | ||||||
Heartbleed [analysis] | T/W | [T] \ Protocols \ Heartbleed Test [W] \ Tools \ Heartbleed analysis | ||||||
HTTP protocol | T | [T] \ Protocols \ HTTP Request | ||||||
Simple webserver | T | [T] \ Protocols \ Simple Webserver | ||||||
Simple multi-client communication – Applied Cryptography | T | [T] \ Protocols \ Simple Multi Client Communication | ||||||
Discrete logarithm | T | [T] \ Mathematics \ Discrete Logarithm | ||||||
Oblivious transfer protocol (MPC) | C/T | [C] \ Protocols \ Oblivious Transfer 1 [T] \ Protocols \ Oblivious Transfer Protocol (1 out of n) [C] \ Protocols \ Oblivious Transfer 2 | ||||||
Purple | C/T | [C] \ Classic Ciphers \ Purple [T] \ Cryptography \ Classical \ PURPLE Cipher Machine | ||||||
Rabbit | C/T | [C] \ Modern Ciphers \ Symmetric \ Rabbit [T] \ Cryptography \ Modern \ Symmetric \ Rabbit Cipher | ||||||
PRESENT | T/C | [T] \ Cryptography \ Modern \ Symmetric \ PRESENT Cipher [C] \ Modern Ciphers \ Symmetric \ PRESENT | ||||||
RAPPOR | C/T | [C] \ Protocols \ RAPPOR [T] \ Protocols \ RAPPOR | ||||||
Salsa20 | C/T | [C] \ Modern Ciphers \ Symmetric \ Salsa20 [T] \ Cryptography \ Modern \ Symmetric \ Salsa20 Cipher | ||||||
SAT solver | C/T | [C] \ Cryptanalysis \ Generic \ SAT Solver [T] \ Mathematics \ SAT Solver (File Input) [T] \ Mathematics \ SAT Solver (Text Input) | ||||||
SIGABA cipher | C/T | [C] \ Classic Ciphers \ SIGABA [T] \ Cryptography \ Classical \ SIGABA Cipher Machine | ||||||
Sosemanuk | C/T | [C] \ Modern Ciphers \ Symmetric \ Sosemanuk [T] \ Cryptography \ Modern \ Symmetric \ Sosemanuk Cipher | ||||||
Spanish strip cipher (SSC) | C/T | [C] \ Classic Ciphers \ Spanish Strip Cipher [T] \ Cryptography \ Classical \ Spanish Strip Cipher | ||||||
Speck cipher | C/T | [C] \ Modern Ciphers \ Symmetric \ Speck [T] \ Cryptography \ Modern \ Symmetric \ Speck Cipher | ||||||
T-310 | C/T | [C] \ Classic Ciphers \ T-310 [T] \ Cryptography \ Classical \ T-310/50 Cipher Machine [T] \ Cryptography \ Classical \ T-310/51 Cipher Machine | ||||||
Transcriptor [analysis] | C/T | [C] \ Cryptanalysis \ Generic \ Transcriptor [T] \ Cryptanalysis \ Classical \ Transcriptor – Manual Mode [T] \ Cryptanalysis \ Classical \ Transcriptor – Semi-Automatic Mode | ||||||
Trifid cipher | C/T | [C] \ Classic Ciphers \ Trifid Cipher [T] \ Cryptography \ Classical \ Trifid cipher | ||||||
VIC cipher | C/T | [C] \ Classic Ciphers \ VIC Cipher [T] \ Cryptography \ Classical \ VIC Cipher | ||||||
Visual cryptography | C/T | [C] \ Modern Ciphers \ Symmetric \ Visual Cryptography [T] \ Cryptography \ Modern \ Symmetric \ Visual Cryptography | ||||||
VCard | T | [T] \ Codes \ vCard | ||||||
Watermark creator | C/T | [C] \ Steganography \ Watermark Creator [T] \ Steganography \ Watermark Creator – Invisible Watermark [T] \ Steganography \ Watermark Creator – Robustness [T] \ Steganography \ Watermark Creator – Visible Watermark | ||||||
Straddling checkerboard cipher | C/T | [C] \ Classic Ciphers \ Straddling Checkerboard [T] \ Cryptography \ Classical \ Straddling Checkerboard | ||||||
Chè Guevara cipher | T | [T] \ Cryptography \ Classical \ Ché Guevara Cipher | ||||||
Gematria | T | [T] \ Codes \ Gematria | ||||||
Navajo code | T | [T] \ Cryptography \ Classical \ Navajo Code | ||||||
Syllabary cipher | C/T | [C] \ Classic Ciphers \ Syllabary Cipher [T] \ Cryptography \ Classical \ Syllabary Cipher | ||||||
T9 code | C/T | [C] \ Tools \ Codes \ T9-Code [T] \ Codes \ T9 Code | ||||||
TEA | C/T/W | [C] \ Modern Ciphers \ Symmetric \ TEA [T] \ Cryptography \ Modern \ Symmetric \ TEA Cipher [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ TEA | ||||||
Trivium | C | [C] \ Modern Ciphers \ Symmetric \ Trivium | ||||||
Trivium cipher | T | [T] \ Cryptography \ Modern \ Symmetric \ Trivium Cipher | ||||||
Kryptos K1 [analysis] | T | [T] \ Cryptanalysis \ Classical \ Kryptos K1 Analysis | ||||||
Kryptos K2 [analysis] | T | [T] \ Cryptanalysis \ Classical \ Kryptos K2 Analysis | ||||||
WEP | C | [C] \ Protocols \ WEP Protocol | ||||||
One-time pad (OTP) | T | [T] \ Cryptography \ Classical \ One-Time Pad Demo [T] \ Cryptography \ Classical \ One-Time Pad Misusage | ||||||
Word pattern [analysis] | T/C | [T] \ Cryptanalysis \ Classical \ Wordpattern Analysis [T] \ Cryptanalysis \ Classical \ Wordpattern Analysis with Self-Defined Dictionary [C] \ Cryptanalysis \ Generic \ Word Patterns | ||||||
Hamming distance | C/T | [C] \ Tools \ Misc \ HammingDistance [T] \ Mathematics \ Hamming Distance | ||||||
IDP [analysis] | C | [C] \ Cryptanalysis \ Specific \ IDP Analyzer | ||||||
Transposition (double column transposition) [attack] | T | [T] \ Cryptanalysis \ Classical \ Dictionary Attack on the Double Columnar Transposition Cipher | ||||||
Key searcher | C | [C] \ Cryptanalysis \ Specific \ KeySearcher | ||||||
Lattice [visual] | N | [N] \ Crypto tutorials \ Lattice-based Cryptography [N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptography \ GGH [N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptography \ LWE [N] \ Crypto tutorials \ Lattice-based Cryptography \ Shortest Vector Problem (SVP) \ Gauss algorithm [N] \ Crypto tutorials \ Lattice-based Cryptography \ Shortest Vector Problem (SVP) \ LLL algorithm [N] \ Crypto tutorials \ Lattice-based Cryptography \ Closest Vector Problem (CVP) \ Find closest vector | ||||||
Lattice [attack] | N | [N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptanalysis \ Merkle-Hellman Knapsack [N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptanalysis \ RSA (Coppersmith's attack) | ||||||
PKCS#1 [attack] | N | [N] \ Crypto tutorials \ Attacks on PKCS#1 [N] \ Crypto tutorials \ Attacks on PKCS#1 \ Attacks on PKCS#1 \ Bleichenbacher attack [N] \ Crypto tutorials \ Attacks on PKCS#1 \ Attacks on PKCS#1 \ Attack with shorter keys (Kuehn) | ||||||
PKCS#5 | C | [C] \ Hash functions \ PKCS#5 | ||||||
Powering [visual] | N | [N] \ Crypto tutorials \ World of Primes \ Number theory \ Powering (iterating exponent) [N] \ Crypto tutorials \ World of Primes \ Number theory \ Powering (iterating base)(RSA) | ||||||
RIPEMD | C/T | A | [C] \ Hash functions \ RIPEMD160 [T] \ Hash Functions \ RIPEMD160 | [A] \ Message Digests \ RIPEMD320 [A] \ Message Digests \ RIPEMD128 [A] \ Message Digests \ RIPEMD160 [A] \ Message Digests \ RIPEMD256 | ||||
Password hash (SHA-1) | T | [T] \ Hash Functions \ Password Store Using Salted SHA-1 [T] \ Hash Functions \ Password Verification Using Salted SHA-1 | ||||||
PBKDF-1 (PKCS#5 2.0) | T | [T] \ Hash Functions \ PBKDF-1 (PKCS#5 2.0) | ||||||
Levenshtein distance | T | [T] \ Mathematics \ Levenshtein Distance | ||||||
Tiger | C/T | A | [C] \ Hash functions \ Tiger [T] \ Hash Functions \ Tiger | [A] \ Message Digests \ Tiger | ||||
Transposition (double column transposition) | T | [T] \ Cryptography \ Classical \ Double Columnar Transposition Cipher | ||||||
Whirlpool | C/T | [C] \ Hash functions \ Whirlpool [T] \ Hash Functions \ Whirlpool | ||||||
Crib [analysis] | W | [W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Crib | ||||||
Encryption with AES and password | W | [W] \ Tools \ Encrypt with password | ||||||
ElGamal | A/D | [A] \ Asymmetric Block Ciphers \ ElGamal [D] \ Algorithms \ Asymmetric \ ElGamal | ||||||
McEliece signature | A | [A] \ Asymmetric Block Ciphers \ McEliecePKCS | ||||||
Niederreiter | A | [A] \ Asymmetric Block Ciphers \ Niederreiter [A] \ Signatures \ NiederreiterCFS | ||||||
RC5 | A | [A] \ Block Ciphers \ RC5 | ||||||
Shacal | A | [A] \ Block Ciphers \ Shacal [A] \ Block Ciphers \ Shacal2 | ||||||
SAFER++ | A | [A] \ Block Ciphers \ SAFER++ [A] \ Message Authentication Codes \ CBCMac \ CBCmacSAFER++ | ||||||
SAFER+ | A | [A] \ Block Ciphers \ SAFER+ [A] \ Message Authentication Codes \ CBCMac \ CBCmacSAFER+ | ||||||
Misty | A | [A] \ Block Ciphers \ Misty1 | ||||||
ECIES | A | [A] \ Hybrid Ciphers \ ECIES | ||||||
McEliece | A/D | [A] \ Hybrid Ciphers \ McElieceFujisakiCipher [A] \ Hybrid Ciphers \ McElieceKobaraImaiCipher [D] \ Visuals \ McEliece Cryptosystem | ||||||
AES MAC | A | [A] \ Message Authentication Codes \ CMac \ CmacAES128 [A] \ Message Authentication Codes \ CMac \ CmacAES192 [A] \ Message Authentication Codes \ CMac \ CmacAES256 [A] \ Message Authentication Codes \ CBCMac \ CBCmacAES256 [A] \ Message Authentication Codes \ CBCMac \ CBCmacAES192 [A] \ Message Authentication Codes \ CBCMac \ CBCmacAES128 | ||||||
DES MAC | A | [A] \ Message Authentication Codes \ CMac \ CmacDESede [A] \ Message Authentication Codes \ CBCMac \ CBCmacDESede | ||||||
Tiger MAC | A | [A] \ Message Authentication Codes \ HMac \ HmacTiger | ||||||
FORK MAC | A | [A] \ Message Authentication Codes \ HMac \ HmacFORK256 | ||||||
SHA MAC | A | [A] \ Message Authentication Codes \ HMac \ HmacSHA512 [A] \ Message Authentication Codes \ HMac \ HmacSHA1 [A] \ Message Authentication Codes \ HMac \ HmacSHA224 [A] \ Message Authentication Codes \ HMac \ HmacSHA256 [A] \ Message Authentication Codes \ HMac \ HmacSHA384 | ||||||
RIPEMD MAC | A | [A] \ Message Authentication Codes \ HMac \ HmacRIPEMD256 [A] \ Message Authentication Codes \ HMac \ HmacRIPEMD128 [A] \ Message Authentication Codes \ HMac \ HmacRIPEMD160 [A] \ Message Authentication Codes \ HMac \ HmacRIPEMD320 | ||||||
DHA MAC | A | [A] \ Message Authentication Codes \ HMac \ HmacDHA256 | ||||||
Serpent MAC | A | [A] \ Message Authentication Codes \ CBCMac \ CBCmacSerpent | ||||||
RC5 MAC | A | [A] \ Message Authentication Codes \ CBCMac \ CBCmacRC5 | ||||||
RC6 MAC | A | [A] \ Message Authentication Codes \ CBCMac \ CBCmacRC6 | ||||||
RC2 MAC | A | [A] \ Message Authentication Codes \ CBCMac \ CBCmacRC2 | ||||||
IDEA MAC | A | [A] \ Message Authentication Codes \ CBCMac \ CBCmacIDEA | ||||||
Misty MAC | A | [A] \ Message Authentication Codes \ CBCMac \ CBCmacMisty1 | ||||||
MARS MAC | A | [A] \ Message Authentication Codes \ CBCMac \ CBCmacMARS | ||||||
Camellia MAC | A | [A] \ Message Authentication Codes \ CBCMac \ CBCmacCamellia | ||||||
Twofish MAC | A | [A] \ Message Authentication Codes \ CBCMac \ CBCmacTwofish | ||||||
Shacal MAC | A | [A] \ Message Authentication Codes \ CBCMac \ CBCmacShacal [A] \ Message Authentication Codes \ CBCMac \ CBCmacShacal2 | ||||||
TwoTrack MAC | A | [A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac160 [A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac64 [A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac32 [A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac96 [A] \ Message Authentication Codes \ TwoTrackMac \ TTmac128 | ||||||
DHA | A | [A] \ Message Digests \ DHA256 | ||||||
VSH | A | [A] \ Message Digests \ VSH | ||||||
MD | A | [A] \ Message Digests \ MD5 [A] \ Message Digests \ MD4 | ||||||
FORK | A | [A] \ Message Digests \ FORK256 | ||||||
PBES2 | A | [A] \ Password-Based Ciphers \ PBES2 | ||||||
Blum Blum Shub (BBS) – PRNG | A | [A] \ Pseudo Random Number Generators \ BBSRandom | ||||||
EC PRNG | A | [A] \ Pseudo Random Number Generators \ ECPRNG | ||||||
RSA signature | A | [A] \ Signatures \ RprimeRSA [A] \ Signatures \ RSASignaturePKCS1v15 \ RIPEMD160/RSA [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA384withRSA [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA1/RSA/RAW [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA512withRSA [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA384/RSA/RAW [A] \ Signatures \ RSASignaturePKCS1v15 \ MD5withRSA [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA224/RSA [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA256withRSA [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA1/RSA [A] \ Signatures \ RSASignaturePKCS1v15 \ MD5/RSA/RAW [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA512/RSA/RAW [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA224/RSA/RAW [A] \ Signatures \ RSASignaturePKCS1v15 \ RIPEMD160/RSA/RAW [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA256/RSA/RAW [A] \ Signatures \ RbRSA [A] \ Signatures \ SSL_MD5andSHA1withRSA | ||||||
GQ signature | A | [A] \ Signatures \ IQGQSignature \ IQGQ [A] \ Signatures \ IQGQSignature \ RIPEMD160withIQGQ | ||||||
Winternitz signature | A/D | [A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_1 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_3 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_4 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_1 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_2 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_3 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_3 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_4 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_2 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_1 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_1 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_4 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_2 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_4 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_3 [D] \ Visuals \ Winternitz OT-Signature (WOTS / WOTS+) | ||||||
CMSS signature | A | [A] \ Signatures \ CMSSSignature \ CMSS | ||||||
GMSS signature | A | [A] \ Signatures \ GMSSSignature \ GMSSwithSHA512 [A] \ Signatures \ GMSSSignature \ GMSSwithSHA1 [A] \ Signatures \ GMSSSignature \ GMSSwithSHA224 [A] \ Signatures \ GMSSSignature \ GMSSwithSHA256 [A] \ Signatures \ GMSSSignature \ GMSSwithSHA384 | ||||||
Merkle signature | A/D | [A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA512 [A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA384 [A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA1 [A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA256 [D] \ Visuals \ Merkle Signatures (XMSS^MT) | ||||||
Bifid | D | [D] \ Algorithms \ Classic \ Bifid | ||||||
Double box | D | [D] \ Algorithms \ Classic \ Double Box | ||||||
Dragon | D | [D] \ Algorithms \ Symmetric \ Dragon | ||||||
Fleissner Grille [analysis] | D | [D] \ Analysis \ Fleissner-Grille Analysis | ||||||
Viterbi [analysis] | D | [D] \ Analysis \ Viterbi Analysis | ||||||
Divider game | D | [D] \ Games \ Divider Game | ||||||
Zudo-Ku | D | [D] \ Games \ Zudo-Ku | ||||||
Key exchange (multipartite) | D | [D] \ Visuals \ Multipartite Key Exchange (BD II) | ||||||
Ant Colony Optimization (ACO) | D | [D] \ Visuals \ Ant Colony Optimization (ACO) | ||||||
Android Unlock Pattern (AUP) | D | [D] \ Visuals \ Android Unlock Pattern (AUP) | ||||||
Shanks Babystep-Giantstep | D | [D] \ Visuals \ Shanks Babystep-Giantstep | ||||||
Certificate verification | D | [D] \ Visuals \ Certificate Verification | ||||||
EC calculations | D | [D] \ Visuals \ Elliptic Curve Calculations | ||||||
Reciprocal subtraction | D | [D] \ Visuals \ Extended Euclidean / Reciprocal Subtraction | ||||||
Homomorphic Encryption (HE) (with RSA, Paillier, Gentry & Hallevi) | D | [D] \ Visuals \ Homomorphic Encryption (HE) | ||||||
Public-Key Infrastructure | D | [D] \ Visuals \ Public-Key Infrastructure | ||||||
Kleptography (4 methods generating a prime, SETUP attack) | D | [D] \ Visuals \ Kleptography | ||||||
Knapsack | D | [D] \ Visuals \ Merkle-Hellman Knapsack Cryptosystem | ||||||
Rabin cryptosystem | D | [D] \ Visuals \ Rabin Cryptosystem | ||||||
Multivariate cryptography | D | [D] \ Visuals \ Multivariate Cryptography | ||||||
Redactable signature schemes (RSS) | D | [D] \ Visuals \ Redactable Signature Schemes (RSS) | ||||||
Shamir's secret sharing (MPC) | D | [D] \ Visuals \ Shamir's Secret Sharing | ||||||
Square and multiply | D | [D] \ Visuals \ Simple Power Analysis / Square and Multiply | ||||||
SPHINCS signature | D | [D] \ Visuals \ SPHINCS Signature | ||||||
SPHINCS+ signature | D | [D] \ Visuals \ SPHINCS+ Signature | ||||||
TLS handshake | D | [D] \ Visuals \ SSL/TLS Handshake | ||||||
Verifiable secret sharing (VSS) | D | [D] \ Visuals \ Verifiable Secret Sharing |
Explanation
Abbreviation | Meaning |
---|---|
X | CT1, CTO: Function is implemented within this program. |
D | JCT: Function is implemented in the Default Perspective (document-centric view). |
A | JCT: Function is implemented in the Algorithm Perspective (function-centric view). |
C | CT2: Function is available as a component on the left of a workspace in CT2. |
T | CT2: Function is demonstrated in a ready-to-run sample template. |
N | CT2: Function is available in the navigation bar. |
W | CT2: Function is part of the wizards. |
[x] | Path for navigation area x. |
<PFAD>\<FUNKTION>* | There are different variants for this <FEATURE> under <PATH>. |
Postfixes
Function groups (leftmost column) often end with an indication w.r.t. in which way the preceding subject is used or demonstrated.
Postfix | Meaning |
---|---|
[visual] | Visualization of inner workings, e.g. via the presentation mode within a CT2 component |
[PRNG] | Pseudo random number generator |
[attack or analysis] | Templates for breaking a function or protocol |
[MPC] | Multi-party communication |