| | - Modern Ciphers > Symmetric > Achterbahn
- Cryptography > Modern > Symmetric > Achterbahn Cipher
| | |
ADFGVX Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > ADFGVX Analyzer
- Cryptanalysis > Classical > ADFGVX Heuristic Analysis
- Cryptanalysis > Classical > ADFGVX Dictionary Attack
| | |
| | - Cryptography > Classical > ADFGVX Cipher
- Encryption/Decryption > Classic Encryption/Decryption > ADFGVX
| - Algorithms > Classic > ADFGVX
| Open |
| | - Modern Ciphers > Symmetric > AES
- Cryptography > Modern > Symmetric > AES Encryption with Implicit Conversion
- Cryptography > Modern > Symmetric > AES Cipher (File Input)
- Cryptography > Modern > Symmetric > AES Cipher (Text Input)
- Encryption/Decryption > Modern Encryption/Decryption > Symmetric Encryption/Decryption > AES
| - Algorithms > Symmetric > AES
- Block Ciphers > Rijndael > AES > AES128_ECB
- Block Ciphers > Rijndael > AES > AES256_CFB
- Block Ciphers > Rijndael > AES > AES192_ECB
- Block Ciphers > Rijndael > AES > AES256_CBC
- Block Ciphers > Rijndael > AES > AES128_CBC
- Block Ciphers > Rijndael > AES > AES128_CFB
- Block Ciphers > Rijndael > AES > AES192_OFB
- Block Ciphers > Rijndael > AES > AES192_CFB
- Block Ciphers > Rijndael > AES > AES256_OFB
- Block Ciphers > Rijndael > AES > AES128_OFB
- Block Ciphers > Rijndael > AES > AES256_ECB
- Block Ciphers > Rijndael > AES > AES192_CBC
| |
AES Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Modern > AES Analysis Using Entropy (1)
- Cryptanalysis > Modern > AES Known-Plaintext Analysis (1)
- Cryptanalysis > Modern > AES Analysis Using Entropy (2) – with Changeable Plaintext
- Cryptanalysis > Modern > AES Known-Plaintext Analysis (2)
- Cryptanalysis > Modern Encryption > Symmetric Encryption > AES > Ciphertext-only
- Cryptanalysis > Modern Encryption > Symmetric Encryption > AES > Known plaintext
| | Open |
AES Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | - Modern Ciphers > Symmetric > AES Visualization
- Cryptography > Modern > Symmetric > AES Visualization
| | Open |
| | | - Message Authentication Codes > CMac > CmacAES128
- Message Authentication Codes > CMac > CmacAES192
- Message Authentication Codes > CMac > CmacAES256
- Message Authentication Codes > CBCMac > CBCmacAES256
- Message Authentication Codes > CBCMac > CBCmacAES192
- Message Authentication Codes > CBCMac > CBCmacAES128
| |
| | - Tools > Data flow > Alphabet Permutator
| | |
| | - Tools > Data input/output > Alphabets
| | |
Android Unlock Pattern (AUP) | | | - Visuals > Android Unlock Pattern (AUP)
| |
Ant Colony Optimization (ACO) | | | - Visuals > Ant Colony Optimization (ACO)
| |
| | | | Open |
| | | | |
| | | | |
| | | | Open |
Authentication methods in networks Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
| | - Cryptanalysis > Generic > Autocorrelation
| | Open |
| | - Tools > Misc > Avalanche Visualization
- Cryptanalysis > Modern > Avalanche (AES)
- Cryptanalysis > Modern > Avalanche (Classic Ciphers)
- Cryptanalysis > Modern > Avalanche (Compare Classic Ciphers)
- Cryptanalysis > Modern > Avalanche (DES)
- Cryptanalysis > Modern > Avalanche (Hash Functions)
- Cryptanalysis > Modern > Avalanche (Modern Ciphers)
| | |
| | - Steganography > Baconian Cipher
- Cryptography > Classical > Bacon Cipher
| | |
| | | | Open |
| | | | |
| | | | Open |
| | - Protocols > BB84 Error Detector
- Protocols > BB84 Key Generator
- Protocols > BB84 Photonbase Generator
- Protocols > BB84 Photon Decoder
- Protocols > BB84 Photon Encoder
| | |
BB84 Attack = Templates for breaking a function or protocol | | - Protocols > BB84 Man in the Middle
| | |
| | | | Open |
Berlekamp-Massey algorithm | | - Cryptanalysis > Generic > Berlekamp-Massey Algorithm
- Mathematics > Berlekamp-Massey
| | |
| | | - Algorithms > Classic > Bifid
| |
| | - Classic Ciphers > Bifid Cipher
- Cryptography > Classical > Bifid Cipher
| | |
| | | | Open |
| | - Hash Functions > BLAKE
- Hash Functions > Password Storage Using Salted BLAKE-256
- Hash Functions > Password Verification Using Salted BLAKE-256
| | |
| | - Modern Ciphers > Asymmetric > Blind Signature Generator
- Modern Ciphers > Asymmetric > Blind Signature Verifier
| | |
| | - Cryptography > Modern > Symmetric > Block Modes of Symmetric Ciphers
| | |
| | - Protocols > Blockchain
- Protocols > Blockchain Signature Creator
- Protocols > Blockchain Simulation
| | |
| | - Modern Ciphers > Symmetric > Blowfish
- Cryptography > Modern > Symmetric > Blowfish Cipher
| | |
Blum Blum Shub (BBS) – PRNG = Pseudo random number generator | | | - Pseudo Random Number Generators > BBSRandom
| |
| | - Classic Ciphers > Book Cipher
- Cryptography > Classical > Book Cipher with Complete Word Encoding
- Cryptography > Classical > Book Cipher with Single Letter Encoding
| | |
| | | | |
| | | | |
Byte Addition Analysis = Templates for breaking a function or protocol | | | | |
| | - Cryptography > Classical > Caesar Cipher
- Encryption/Decryption > Classic Encryption/Decryption > Caesar
| - Algorithms > Classic > Caesar
| |
Caesar / Rot-13 Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > Caesar Analyzer
- Cryptanalysis > Classical > Caesar Brute-Force Analysis
- Cryptanalysis > Classical > Caesar Analysis Using Character Frequencies
- Cryptanalysis > Classic Encryption > Caesar
| | Open |
Caesar / Rot-13 Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
| | - Modern Ciphers > Symmetric > Camellia
- Cryptography > Modern > Symmetric > Camellia Cipher
| - Block Ciphers > Camellia > Camellia256_CBC
- Block Ciphers > Camellia > Camellia192_CBC
- Block Ciphers > Camellia > Camellia128_CBC
| |
| | | - Message Authentication Codes > CBCMac > CBCmacCamellia
| |
CBC Attack = Templates for breaking a function or protocol | | - Cryptanalysis > Modern > CBC Attack
| | |
| | | - Visuals > Certificate Verification
| |
| | - Modern Ciphers > Symmetric > ChaCha
- Cryptography > Modern > Symmetric > ChaCha Cipher
- Cryptography > Modern > Symmetric > ChaCha Cipher (Presentation)
| | |
| | - Classic Ciphers > Chaocipher
- Cryptography > Classical > Chaocipher
| | |
| | - Cryptography > Classical > Ché Guevara Cipher
| | |
Chinese remainder theorem (CRT) Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | - Visuals > Chinese Remainder Theorem (CRT)
| |
| | | | Open |
| | | - Signatures > CMSSSignature > CMSS
| |
| | - Protocols > Coin Flipping
- Protocols > Coin Flipping Protocol
| | |
| | | | Open |
| | - Cryptanalysis > Generic > Cost Function
- Cryptanalysis > Classical > Cost Functions
| | |
| | - Modern Ciphers > Asymmetric > Cramer-Shoup
- Modern Ciphers > Asymmetric > Cramer-Shoup Key Generator
- Cryptography > Modern > Asymmetric > Cramer-Shoup with AES
| | |
Crib Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Classic Encryption > Transposition > Crib
| | |
Cyclic redundancy check (CRC) | | - Hash Functions > CRC Null Problems
- Hash Functions > CRC
| | |
| | - Classic Ciphers > Cylinder Cipher
| | |
| | - Tools > Data flow > Concatenate
- Tools > Data flow > Array Indexer
- Tools > Boolean > Boolean Binary Operator
- Tools > Boolean > Boolean Not Operator
- Tools > Misc > Comparators
- Tools > Misc > Converter
- Tools > Codes > String Decoder
- Tools > Codes > String Encoder
- Tools > Misc > Length
- Tools > Data flow > Variable Load
- Tools > Data flow > Variable Store
- Tools > Misc > Stream Comparator
- Tools > Data input/output > File Output
- Tools > Data flow > Gate
- Tools > Misc > Inc Dec
- Tools > Data input/output > Picture Output
- Tools > Misc > String Operations
- Tools > Data input/output > Text Output
- Tools > Split a Text
- Tools > Loop
| | |
| | - Tools > Data flow > Clock
- Tools > Data input/output > IP Frame Generator
- Tools > Data input/output > Audio Input
- Tools > Data input/output > Audio Output
- Tools > Boolean > Boolean Input
- Tools > Boolean > Boolean Output
- Tools > Misc > ImageProcessor
- Tools > Data input/output > Network Receiver
- Tools > Data input/output > Network Sender
- Tools > Data input/output > Number Input
- Tools > Data input/output > Camera
- Tools > Data input/output > Text Input
- Tools > Data flow > CSVReader
- Tools > Data input/output > Dictionary
- Tools > Data input/output > File Input
- Tools > Take a Picture Using the Webcam
- Tools > Random Decimal Number
| | |
| | - Tools > Misc > Decimalization
- Mathematics > Decimalization
| | |
| | - Modern Ciphers > Symmetric > DES
- Cryptography > Modern > Symmetric > DES Complementation Property
- Cryptography > Modern > Symmetric > DES Cipher
- Encryption/Decryption > Modern Encryption/Decryption > Symmetric Encryption/Decryption > DES
| - Visuals > Inner States of the Data Encryption Standard (DES)
- Block Ciphers > DESede > DESede_CBC
- Password-Based Ciphers > PbeWithSHA1AndDES_CBC
- Password-Based Ciphers > PbeWithMD5AndDES_CBC
| |
DES Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Modern > DES Analysis Using Entropy
- Cryptanalysis > Modern > DES Known-Plaintext Analysis
- Cryptanalysis > Modern > DES Brute-Force Analysis
- Cryptanalysis > Modern Encryption > Symmetric Encryption > DES > Known plaintext
| | |
DES Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | - Modern Ciphers > Symmetric > DESVisualization
- Cryptography > Modern > Symmetric > DES Visualization
| | |
| | | - Message Authentication Codes > CMac > CmacDESede
- Message Authentication Codes > CBCMac > CBCmacDESede
| |
| | | | |
DESL Analysis = Templates for breaking a function or protocol | | | | |
| | | | |
DESX Analysis = Templates for breaking a function or protocol | | | | |
| | | | |
DESXL Analysis = Templates for breaking a function or protocol | | | | |
DGK (homomorphic encryption) | | - Modern Ciphers > Asymmetric > DGK
- Modern Ciphers > Asymmetric > DGK Key Generator
- Cryptography > Modern > Asymmetric > DGK Cipher (Text Input)
| | |
| | | | |
| | | - Message Authentication Codes > HMac > HmacDHA256
| |
Dictionary Attack = Templates for breaking a function or protocol | | - Hash Functions > Dictionary Attack on a Password Hash Value
| | |
Differential cryptanalysis (DCA) | | - Cryptanalysis > Specific > DCA KeyRecovery
- Cryptanalysis > Specific > DCA Oracle
- Cryptanalysis > Specific > DCA PathFinder
- Cryptanalysis > Specific > DCA PathVisualizer
- Cryptanalysis > Specific > DCA ToyCipher
- Cryptanalysis > Modern > Differential Cryptanalysis Tutorial 1 (Automatic Mode)
- Cryptanalysis > Modern > Differential Cryptanalysis Tutorial 2 (Automatic Mode)
- Cryptanalysis > Modern > Differential Cryptanalysis Tutorial 3 (Automatic Mode)
| | |
Differential cryptanalysis (DCA) Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | - Cryptanalysis > Modern > Differential Cryptanalysis Tutorial 1 (Tutorial Mode)
- Cryptanalysis > Modern > Differential Cryptanalysis Tutorial 2 (Tutorial Mode)
- Cryptanalysis > Modern > Differential Cryptanalysis Tutorial 3 (Tutorial Mode)
| | |
Dining cryptographers protocol | | - Protocols > Dining Cryptographers Protocol
| | |
| | - Mathematics > Discrete Logarithm
| | |
| | | | |
| | | - Algorithms > Classic > Double Box
| |
| | | - Algorithms > Symmetric > Dragon
| |
| | | - Algorithms > Signature > DSA
- Signatures > DSASignature > RAW/DSA
- Signatures > DSASignature > SHAwithDSA
- Signatures > IQDSASignature > IQDSA
- Signatures > IQDSASignature > RIPEMD160withIQDSA
- Signatures > IQRDSASignature > IQRDSA
- Signatures > IQRDSASignature > RIPEMD160withIQRDSA
| |
| | | - Visuals > Elliptic Curve Calculations
| |
EC calculations Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
EC PRNG = Pseudo random number generator | | | - Pseudo Random Number Generators > ECPRNG
| |
| | | | |
| | | - Signatures > ECDSASignature > SHA1/ECDSA
- Signatures > ECDSASignature > SHA512/ECDSA
- Signatures > ECDSASignature > RawECDSA
- Signatures > ECDSASignature > SHA224/ECDSA
- Signatures > ECDSASignature > SHA256/ECDSA
- Signatures > ECDSASignature > SHA384/ECDSA
| |
| | | | |
| | | | |
| | | - Algorithms > Asymmetric > ElGamal
- Asymmetric Block Ciphers > ElGamal
| |
| | - Tools > Text Encoding (e.g. Base64)
| | |
Encryption with AES and password | | - Tools > Encrypt with password
| | |
| | - Cryptography > Classical > Enigma Cipher Machine
- Encryption/Decryption > Classic Encryption/Decryption > Enigma
| | |
Enigma Attack = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > Enigma Analyzer
- Cryptanalysis > Classical > Enigma Gillogly Attack
- Cryptanalysis > Classical > Enigma Hillclimbing Attack
- Cryptanalysis > Classical > Enigma Simulated Annealing Attack
- Cryptanalysis > Classical > Enigma Turing Bombe Attack
- Cryptanalysis > Classical > Enigma Turing Bombe Attack (with Turnover)
- Cryptanalysis > Classic Encryption > Enigma
| | |
Enigma Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | Open |
Entropy Analysis = Templates for breaking a function or protocol | | | - Analysis > Entropy Analysis
| |
Factorization of a number | | - Cryptanalysis > Generic > Quadratic Sieve
- Cryptanalysis > Generic > Factorizer
- Mathematics > Factorization with Quadratic Sieve (QS)
- Mathematics > Factorization with Trial Division (Brute-Force)
- Crypto tutorials > World of Primes > Factorization > Brute-force
- Crypto tutorials > World of Primes > Factorization > Quadratic Sieve
- Mathematical Functions > Prime Factorization
| | |
| | - Modern Ciphers > Symmetric > FEAL
- Cryptography > Modern > Symmetric > FEAL Cipher
| | |
| | - Cryptography > Classical > Fialka ED Check
- Cryptography > Classical > Fialka ED Mixed Mode Check
- Cryptography > Classical > Fialka ED NumLock10 Check
- Cryptography > Classical > Fialka Key Output
- Cryptography > Classical > Fialka M-125-3 PROTON II
- Cryptography > Classical > Fialka M-125 PROTON I
| | |
FIPS PUB-140-1 (test PRNG = Pseudo random number generator ) | | | | |
Fleissner Grille Analysis = Templates for breaking a function or protocol | | | - Analysis > Fleissner-Grille Analysis
| |
| | | - Message Digests > FORK256
| |
| | | - Message Authentication Codes > HMac > HmacFORK256
| |
Format preserving encryption (FPE) (FF1, FF2, FF3 and DFF) | | - Modern Ciphers > Symmetric > Format Preserving Encryption (FPE)
- Cryptography > Modern > Symmetric > Format Preserving Encryption (XML)
- Cryptography > Modern > Symmetric > Format Preserving Encryption
| | |
| | - Cryptanalysis > Generic > Frequency Test
- Cryptanalysis > Classical > Frequency Analysis
| - Analysis > Frequency Analysis
| Open |
| | - Cryptanalysis > Generic > Friedman Test
- Cryptanalysis > Classical > Friedman Test for Classical Ciphers
| | |
| | | | |
| | | - Signatures > GMSSSignature > GMSSwithSHA512
- Signatures > GMSSSignature > GMSSwithSHA1
- Signatures > GMSSSignature > GMSSwithSHA224
- Signatures > GMSSSignature > GMSSwithSHA256
- Signatures > GMSSSignature > GMSSwithSHA384
| |
| | - Modern Ciphers > Symmetric > GOST Magma
- Cryptography > Modern > Symmetric > GOST Magma Cipher
| | |
| | | - Signatures > IQGQSignature > IQGQ
- Signatures > IQGQSignature > RIPEMD160withIQGQ
| |
| | - Modern Ciphers > Symmetric > Grain v1
- Cryptography > Modern > Symmetric > Grain v1 Cipher
| | |
| | | | Open |
| | - Hash Functions > Grøstl
- Hash Functions > Password Storage Using Salted Grøstl-256
- Hash Functions > Password Verification Using Salted Grøstl-256
| | |
| | - Classic Ciphers > Hagelin Machine
- Cryptography > Classical > Hagelin Machine
| | |
| | - Tools > Misc > HammingDistance
- Mathematics > Hamming Distance
| | |
Hash algorithms Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | - Visuals > Hash Sensitivity
| |
Hash Attack = Templates for breaking a function or protocol (collisions) | | | | |
| | | | |
| | - Modern Ciphers > Symmetric > HC128
- Cryptography > Modern > Symmetric > HC128 Cipher
| | |
Heartbleed Analysis = Templates for breaking a function or protocol | | - Protocols > Heartbleed Test
- Tools > Heartbleed analysis
| | |
| | - Modern Ciphers > Symmetric > HIGHT
| | |
| | - Cryptography > Modern > Symmetric > HIGHT Cipher
| | |
| | - Classic Ciphers > Hill Cipher
- Cryptography > Classical > Hill Cipher
| | Open |
Hill cipher Analysis = Templates for breaking a function or protocol | | | | |
| | | | |
| | | | |
Homomorphic Encryption (HE) (with RSA, Paillier, Gentry & Hallevi) | | | - Visuals > Homomorphic Encryption (HE)
| |
Homophonic substitution Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > Homophonic Substitution Analyzer
- Cryptanalysis > Classical > Homophonic Substitution Analysis
| | |
Homophonic substitution cipher | | - Cryptography > Classical > Homophonic Substitution Cipher and Nomenclature – Decryption
- Cryptography > Classical > Homophonic Substitution Cipher and Nomenclature – Encryption
| | |
| | | | |
| | - Tools > Huffman's Algorithm (ASCII)
- Tools > Huffman's Algorithm (BMG, JPG)
- Tools > Huffman's Algorithm (UTF-8)
| | Open |
| | | - Algorithms > Symmetric > IDEA
- Block Ciphers > IDEA > IDEA_CFB
- Block Ciphers > IDEA > IDEA_ECB
- Block Ciphers > IDEA > IDEA_OFB
- Block Ciphers > IDEA > IDEA_CBC
| |
IDEA Attack = Templates for breaking a function or protocol | | | | |
| | | - Message Authentication Codes > CBCMac > CBCmacIDEA
| |
IDP Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > IDP Analyzer
| | |
| | - Hash functions > ImageHash
- Hash Functions > ImageHash
- Hash Functions > ImageHash – Smooth Comparison
| | |
Inverse congruence generator (ICG) ( PRNG = Pseudo random number generator ) | | | | |
ISAP bit commitment scheme | | - Protocols > ISAP Bit Commitment Scheme
- Mathematics > ISAP Bit Commitment Scheme
| | |
| | - Codes > ISBN-10 Check
- Codes > ISBN-13 Check
| | |
| | - Classic Ciphers > Josse Cipher
- Cryptography > Classical > Josse Cipher
| | |
| | | | Open |
| | - Cryptanalysis > Generic > Kasiski's Test
- Cryptanalysis > Classical > Kasiski's Test and Autocorrelation
| | |
Keccak (hash, cipher, PRNG = Pseudo random number generator ) | | - Cryptography > Modern > Symmetric > Keccak Cipher
- Hash Functions > Keccak Hash (SHA-3)
- Tools > Keccak Pseudorandom Number Generator (PRNG)
| | |
Key derivation function (KDF) | | - Hash functions > HKDF SHA-256
- Hash functions > KKDF SHA-256
- Hash functions > KKDF SHAKE256
- Hash Functions > KDF Performance Comparison (without Presentation)
- Hash Functions > KDF Performance Comparison (with Presentation)
| | |
| | - Protocols > BB84 Key Exchange with Eavesdropping Attack
- Protocols > BB84 Key Exchange
| | |
Key exchange (Diffie-Hellman DH) | | - Protocols > Diffie-Hellman Key-Exchange
- Protocols > Diffie-Hellman Key-Exchange over Network
| - Visuals > Diffie-Hellman Key Exchange (EC)
| |
Key exchange (Diffie-Hellman DH) (Perfect Forward Secrecy) Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
Key exchange (multipartite) | | | - Visuals > Multipartite Key Exchange (BD II)
| |
Key generation from password (PKCS#5) | | | | |
| | - Cryptanalysis > Specific > KeySearcher
| | |
| | | | |
| | | | |
Kleptography (4 methods generating a prime, SETUP Attack = Templates for breaking a function or protocol ) | | | | |
| | | - Visuals > Merkle-Hellman Knapsack Cryptosystem
| |
Kryptos K1 Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Classical > Kryptos K1 Analysis
| | |
Kryptos K2 Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Classical > Kryptos K2 Analysis
| | |
| | - Classic Ciphers > LAMBDA1
- Cryptography > Modern > Symmetric > LAMBDA1 Block Cipher
| | |
Lattice Attack = Templates for breaking a function or protocol | | - Crypto tutorials > Lattice-based Cryptography > Lattice-based cryptanalysis > Merkle-Hellman Knapsack
- Crypto tutorials > Lattice-based Cryptography > Lattice-based cryptanalysis > RSA (Coppersmith's attack)
| | |
Lattice Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | - Crypto tutorials > Lattice-based Cryptography
- Crypto tutorials > Lattice-based Cryptography > Lattice-based cryptography > GGH
- Crypto tutorials > Lattice-based Cryptography > Lattice-based cryptography > LWE
- Crypto tutorials > Lattice-based Cryptography > Shortest Vector Problem (SVP) > Gauss algorithm
- Crypto tutorials > Lattice-based Cryptography > Shortest Vector Problem (SVP) > LLL algorithm
- Crypto tutorials > Lattice-based Cryptography > Closest Vector Problem (CVP) > Find closest vector
| | |
| | | | |
| | - Mathematics > Levenshtein Distance
| | |
| | - Mathematics > Linear Feedback Shift Register (LFSR)
| - Algorithms > Symmetric > LFSR
| |
Linear congruence generator (LCG) ( PRNG = Pseudo random number generator ) | | | | |
| | - Cryptography > Classical > M-138
| | |
M-138 Attack = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > M-138 Analyzer
- Cryptanalysis > Classical > M-138 Ciphertext-Only Attack
- Cryptanalysis > Classical > M-138 Known-Plaintext Attack
- Cryptanalysis > Classical > M-138 Partially-Known Plaintext Attack
| | |
| | - Cryptography > Classical > M209 Cipher Machine
- Cryptography > Classical > M209 Key Setup
| | |
| | - Cryptography > Classical > M94 Test Messages from Joseph O. Mauborgne
| | |
| | | | |
MARS Attack = Templates for breaking a function or protocol | | | | |
| | | - Message Authentication Codes > CBCMac > CBCmacMARS
| |
| | | - Visuals > McEliece Cryptosystem
- Hybrid Ciphers > McElieceFujisakiCipher
- Hybrid Ciphers > McElieceKobaraImaiCipher
| |
| | | - Asymmetric Block Ciphers > McEliecePKCS
| |
| | | - Message Digests > MD5
- Message Digests > MD4
| |
| | | | |
| | | - Message Authentication Codes > HMac > HmacMD4
| |
| | - Hash functions > MD5
- Cryptanalysis > Specific > MD5 Collider
- Hash Functions > MD5 Collision Finder
- Hash Functions > MD5 Salted Hash Comparison
- Hash Functions > MD5
| - Algorithms > Hash > MD5
- Algorithms > MAC > HMacMD5
- Message Authentication Codes > HMac > HmacMD5
| |
MD5 Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Modern Encryption > Hash Functions > MD5
| | |
| | | - Visuals > Merkle Signatures (XMSS^MT)
- Signatures > MerkleOTSSignature > MerkleOTSwithSHA512
- Signatures > MerkleOTSSignature > MerkleOTSwithSHA384
- Signatures > MerkleOTSSignature > MerkleOTSwithSHA1
- Signatures > MerkleOTSSignature > MerkleOTSwithSHA256
| |
| | - Classic Ciphers > Mexican Army Cipher Disk
- Cryptography > Classical > Mexican Army Cipher Disk
| | |
Mexican Army cipher Analysis = Templates for breaking a function or protocol | | - Cryptanalysis > Specific > Mexican Army Cipher Disk Analyzer
- Cryptanalysis > Classical > Brute-Force Attack on the Mexican Army Cipher Disk
| | |
| | - Modern Ciphers > Symmetric > Mickey 2
- Cryptography > Modern > Symmetric > Mickey 2 Cipher
| | |
| | | | |
| | | - Message Authentication Codes > CBCMac > CBCmacMisty1
| |
| | - Tools > Codes > Morse Code
| | Open |
| | | | Open |
Multivariate cryptography | | | - Visuals > Multivariate Cryptography
| |
N-gram Analysis = Templates for breaking a function or protocol | | | | |
N-gram Analysis = Templates for breaking a function or protocol | | | | Open |
| | - Cryptography > Classical > Navajo Code
| | |
| | | - Asymmetric Block Ciphers > Niederreiter
- Signatures > NiederreiterCFS
| |
Nihilist Visual = Visualization of inner workings, e.g. via the presentation mode within a CT2 component | | | | |
| | - Classic Ciphers > Nihilist Cipher
- Cryptography > Classical > Nihilist Cipher
| | |
| | - Mathematics > Non-Linear Feedback Shift Register (NLFSR)
| | |
| | | | Open |
Number theory (also see Primes) | | - Mathematics > Calculating with Big Numbers
- Mathematics > Linear Congruential Generator
- Crypto tutorials > World of Primes > Number theory > Number-theoretic functions
- Crypto tutorials > World of Primes > Number theory > Primitive roots
- Crypto tutorials > World of Primes > Number theory > Goldbach's conjecture
| | Open |
Oblivious transfer protocol ( MPC = Multi-party communication ) | | - Protocols > Oblivious Transfer 1
- Protocols > Oblivious Transfer 2
|