| Jump to content | https://en.wikipedia.org/wiki/Encryption#bodyContent |
| Main page | https://en.wikipedia.org/wiki/Main_Page |
| Contents | https://en.wikipedia.org/wiki/Wikipedia:Contents |
| Current events | https://en.wikipedia.org/wiki/Portal:Current_events |
| Random article | https://en.wikipedia.org/wiki/Special:Random |
| About Wikipedia | https://en.wikipedia.org/wiki/Wikipedia:About |
| Contact us | https://en.wikipedia.org/wiki/Wikipedia:Contact_us |
| Help | https://en.wikipedia.org/wiki/Help:Contents |
| Learn to edit | https://en.wikipedia.org/wiki/Help:Introduction |
| Community portal | https://en.wikipedia.org/wiki/Wikipedia:Community_portal |
| Recent changes | https://en.wikipedia.org/wiki/Special:RecentChanges |
| Upload file | https://en.wikipedia.org/wiki/Wikipedia:File_upload_wizard |
| Special pages | https://en.wikipedia.org/wiki/Special:SpecialPages |
|
| https://en.wikipedia.org/wiki/Main_Page |
|
Search
| https://en.wikipedia.org/wiki/Special:Search |
| Donate | https://donate.wikimedia.org/?wmf_source=donate&wmf_medium=sidebar&wmf_campaign=en.wikipedia.org&uselang=en |
| Create account | https://en.wikipedia.org/w/index.php?title=Special:CreateAccount&returnto=Encryption |
| Log in | https://en.wikipedia.org/w/index.php?title=Special:UserLogin&returnto=Encryption |
| Donate | https://donate.wikimedia.org/?wmf_source=donate&wmf_medium=sidebar&wmf_campaign=en.wikipedia.org&uselang=en |
| Create account | https://en.wikipedia.org/w/index.php?title=Special:CreateAccount&returnto=Encryption |
| Log in | https://en.wikipedia.org/w/index.php?title=Special:UserLogin&returnto=Encryption |
|
(Top)
| https://en.wikipedia.org/wiki/Encryption |
|
1
History
| https://en.wikipedia.org/wiki/Encryption#History |
|
1.1
Ancient
| https://en.wikipedia.org/wiki/Encryption#Ancient |
|
1.2
19th–20th century
| https://en.wikipedia.org/wiki/Encryption#19th–20th_century |
|
1.3
Modern
| https://en.wikipedia.org/wiki/Encryption#Modern |
|
2
Encryption in cryptography
| https://en.wikipedia.org/wiki/Encryption#Encryption_in_cryptography |
|
2.1
Types
| https://en.wikipedia.org/wiki/Encryption#Types |
|
3
Uses
| https://en.wikipedia.org/wiki/Encryption#Uses |
|
3.1
Data erasure
| https://en.wikipedia.org/wiki/Encryption#Data_erasure |
|
4
Limitations
| https://en.wikipedia.org/wiki/Encryption#Limitations |
|
5
Attacks and countermeasures
| https://en.wikipedia.org/wiki/Encryption#Attacks_and_countermeasures |
|
6
The debate around encryption
| https://en.wikipedia.org/wiki/Encryption#The_debate_around_encryption |
|
6.1
Integrity protection of Ciphertexts
| https://en.wikipedia.org/wiki/Encryption#Integrity_protection_of_Ciphertexts |
|
6.2
Ciphertext length and padding
| https://en.wikipedia.org/wiki/Encryption#Ciphertext_length_and_padding |
|
7
See also
| https://en.wikipedia.org/wiki/Encryption#See_also |
|
8
References
| https://en.wikipedia.org/wiki/Encryption#References |
|
9
Further reading
| https://en.wikipedia.org/wiki/Encryption#Further_reading |
|
10
External links
| https://en.wikipedia.org/wiki/Encryption#External_links |
| Afrikaans | https://af.wikipedia.org/wiki/Versleuteling |
| العربية | https://ar.wikipedia.org/wiki/%D8%AA%D8%B9%D9%85%D9%8A%D8%A9_(%D8%A5%D8%AC%D8%B1%D8%A7%D8%A6%D9%8A%D8%A9) |
| Azərbaycanca | https://az.wikipedia.org/wiki/%C5%9Eifrl%C9%99m%C9%99 |
| বাংলা | https://bn.wikipedia.org/wiki/%E0%A6%97%E0%A7%81%E0%A6%AA%E0%A7%8D%E0%A6%A4%E0%A6%BE%E0%A6%AF%E0%A6%BC%E0%A6%A8 |
| Български | https://bg.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B5 |
| Bosanski | https://bs.wikipedia.org/wiki/Enkripcija |
| Català | https://ca.wikipedia.org/wiki/Xifratge |
| Dansk | https://da.wikipedia.org/wiki/Kryptering |
| Deutsch | https://de.wikipedia.org/wiki/Verschl%C3%BCsselung |
| Eesti | https://et.wikipedia.org/wiki/%C5%A0ifreerimine |
| Ελληνικά | https://el.wikipedia.org/wiki/%CE%9A%CF%81%CF%85%CF%80%CF%84%CE%BF%CE%B3%CF%81%CE%AC%CF%86%CE%B7%CF%83%CE%B7 |
| Español | https://es.wikipedia.org/wiki/Cifrado_(criptograf%C3%ADa) |
| Esperanto | https://eo.wikipedia.org/wiki/%C4%88ifrado |
| Euskara | https://eu.wikipedia.org/wiki/Zifratze |
| فارسی | https://fa.wikipedia.org/wiki/%D8%B1%D9%85%D8%B2%DA%AF%D8%B0%D8%A7%D8%B1%DB%8C |
| Français | https://fr.wikipedia.org/wiki/Chiffrement |
| Gaeilge | https://ga.wikipedia.org/wiki/Cripti%C3%BAch%C3%A1n |
| Galego | https://gl.wikipedia.org/wiki/Cifraxe |
| 한국어 | https://ko.wikipedia.org/wiki/%EC%95%94%ED%98%B8%ED%99%94 |
| Հայերեն | https://hy.wikipedia.org/wiki/%D4%BE%D5%A1%D5%AE%D5%AF%D5%A1%D5%A3%D6%80%D5%B8%D6%82%D5%B4 |
| हिन्दी | https://hi.wikipedia.org/wiki/%E0%A4%97%E0%A5%81%E0%A4%AA%E0%A5%8D%E0%A4%A4%E0%A4%B2%E0%A5%87%E0%A4%96%E0%A4%A8 |
| Hrvatski | https://hr.wikipedia.org/wiki/%C5%A0ifra |
| Bahasa Indonesia | https://id.wikipedia.org/wiki/Enkripsi |
| IsiXhosa | https://xh.wikipedia.org/wiki/I-Encryption |
| IsiZulu | https://zu.wikipedia.org/wiki/Ukunyandla |
| Íslenska | https://is.wikipedia.org/wiki/Dulritun |
| Italiano | https://it.wikipedia.org/wiki/Cifratura |
| עברית | https://he.wikipedia.org/wiki/%D7%94%D7%A6%D7%A4%D7%A0%D7%94 |
| ქართული | https://ka.wikipedia.org/wiki/%E1%83%A8%E1%83%98%E1%83%A4%E1%83%A0%E1%83%90%E1%83%AA%E1%83%98%E1%83%90 |
| Қазақша | https://kk.wikipedia.org/wiki/%D0%9C%D3%99%D0%BB%D1%96%D0%BC%D0%B5%D1%82%D1%82%D0%B5%D1%80%D0%B4%D1%96_%D1%88%D1%8B%D1%80%D2%9B%D0%B0%D1%83 |
| Kiswahili | https://sw.wikipedia.org/wiki/Usimbaji_fiche |
| Kurdî | https://ku.wikipedia.org/wiki/%C5%9Eidandin |
| Кыргызча | https://ky.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BB%D3%A9%D3%A9 |
| Latviešu | https://lv.wikipedia.org/wiki/%C5%A0ifr%C4%93%C5%A1ana |
| Lingála | https://ln.wikipedia.org/wiki/Lib%C3%B3mba |
| Magyar | https://hu.wikipedia.org/wiki/Titkos%C3%ADt%C3%A1s |
| Македонски | https://mk.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%B8%D1%80%D0%B0%D1%9A%D0%B5 |
| മലയാളം | https://ml.wikipedia.org/wiki/%E0%B4%8E%E0%B5%BB%E0%B4%95%E0%B5%8D%E0%B4%B0%E0%B4%BF%E0%B4%AA%E0%B5%8D%E0%B4%B7%E0%B5%BB |
| Bahasa Melayu | https://ms.wikipedia.org/wiki/Penyulitan |
| Монгол | https://mn.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BB%D1%8D%D0%BB%D1%82 |
| Nederlands | https://nl.wikipedia.org/wiki/Encryptie |
| 日本語 | https://ja.wikipedia.org/wiki/%E6%9A%97%E5%8F%B7 |
| Norsk bokmål | https://no.wikipedia.org/wiki/Kryptering |
| Norsk nynorsk | https://nn.wikipedia.org/wiki/Kryptering |
| Occitan | https://oc.wikipedia.org/wiki/Codatge |
| Oʻzbekcha / ўзбекча | https://uz.wikipedia.org/wiki/Shifrlash |
| پښتو | https://ps.wikipedia.org/wiki/%DA%A9%D9%88%DA%89_%DA%A9%D9%88%D9%84 |
| Piemontèis | https://pms.wikipedia.org/wiki/Cifradura |
| Português | https://pt.wikipedia.org/wiki/Encripta%C3%A7%C3%A3o |
| Română | https://ro.wikipedia.org/wiki/Criptare |
| Runa Simi | https://qu.wikipedia.org/wiki/Ukhulliy |
| Русский | https://ru.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5 |
| Shqip | https://sq.wikipedia.org/wiki/Kriptimi |
| සිංහල | https://si.wikipedia.org/wiki/%E0%B6%9C%E0%B7%94%E0%B6%B4%E0%B7%8A%E0%B6%AD_%E0%B6%9A%E0%B7%9A%E0%B6%AD%E0%B6%B1%E0%B6%BA |
| Simple English | https://simple.wikipedia.org/wiki/Encryption |
| Slovenščina | https://sl.wikipedia.org/wiki/%C5%A0ifriranje_sporo%C4%8Dil |
| Српски / srpski | https://sr.wikipedia.org/wiki/Enkripcija |
| Srpskohrvatski / српскохрватски | https://sh.wikipedia.org/wiki/Enkripcija |
| Sunda | https://su.wikipedia.org/wiki/%C3%89nkripsi |
| Suomi | https://fi.wikipedia.org/wiki/Salaus |
| Svenska | https://sv.wikipedia.org/wiki/Kryptering |
| Tagalog | https://tl.wikipedia.org/wiki/Enkripsiyon |
| தமிழ் | https://ta.wikipedia.org/wiki/%E0%AE%AE%E0%AE%B1%E0%AF%88%E0%AE%AF%E0%AE%BE%E0%AE%95%E0%AF%8D%E0%AE%95%E0%AE%AE%E0%AF%8D |
| ไทย | https://th.wikipedia.org/wiki/%E0%B8%81%E0%B8%B2%E0%B8%A3%E0%B9%80%E0%B8%82%E0%B9%89%E0%B8%B2%E0%B8%A3%E0%B8%AB%E0%B8%B1%E0%B8%AA |
| Türkçe | https://tr.wikipedia.org/wiki/%C5%9Eifreleme |
| Українська | https://uk.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D1%83%D0%B2%D0%B0%D0%BD%D0%BD%D1%8F |
| اردو | https://ur.wikipedia.org/wiki/%D8%A7%D9%86%DA%A9%D8%B1%D9%BE%D8%B4%D9%86 |
| Tiếng Việt | https://vi.wikipedia.org/wiki/M%C3%A3_h%C3%B3a |
| 吴语 | https://wuu.wikipedia.org/wiki/%E5%8A%A0%E5%AF%86 |
| 粵語 | https://zh-yue.wikipedia.org/wiki/%E5%8A%A0%E5%AF%86 |
| 中文 | https://zh.wikipedia.org/wiki/%E5%8A%A0%E5%AF%86 |
| Edit links | https://www.wikidata.org/wiki/Special:EntityPage/Q141090#sitelinks-wikipedia |
| Article | https://en.wikipedia.org/wiki/Encryption |
| Talk | https://en.wikipedia.org/wiki/Talk:Encryption |
| Read | https://en.wikipedia.org/wiki/Encryption |
| Edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit |
| View history | https://en.wikipedia.org/w/index.php?title=Encryption&action=history |
| Read | https://en.wikipedia.org/wiki/Encryption |
| Edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit |
| View history | https://en.wikipedia.org/w/index.php?title=Encryption&action=history |
| What links here | https://en.wikipedia.org/wiki/Special:WhatLinksHere/Encryption |
| Related changes | https://en.wikipedia.org/wiki/Special:RecentChangesLinked/Encryption |
| Upload file | https://en.wikipedia.org/wiki/Wikipedia:File_Upload_Wizard |
| Permanent link | https://en.wikipedia.org/w/index.php?title=Encryption&oldid=1332102725 |
| Page information | https://en.wikipedia.org/w/index.php?title=Encryption&action=info |
| Cite this page | https://en.wikipedia.org/w/index.php?title=Special:CiteThisPage&page=Encryption&id=1332102725&wpFormIdentifier=titleform |
| Get shortened URL | https://en.wikipedia.org/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FEncryption |
| Download QR code | https://en.wikipedia.org/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FEncryption |
| Download as PDF | https://en.wikipedia.org/w/index.php?title=Special:DownloadAsPdf&page=Encryption&action=show-download-screen |
| Printable version | https://en.wikipedia.org/w/index.php?title=Encryption&printable=yes |
| Wikimedia Commons | https://commons.wikimedia.org/wiki/Category:Cryptographic_algorithms |
| Wikidata item | https://www.wikidata.org/wiki/Special:EntityPage/Q141090 |
| Cryptography | https://en.wikipedia.org/wiki/Cryptography |
| Encryption (album) | https://en.wikipedia.org/wiki/Encryption_(album) |
| Encrypt (film) | https://en.wikipedia.org/wiki/Encrypt_(film) |
| https://en.wikipedia.org/wiki/File:Public_key_encryption_keys.svg |
| cryptography | https://en.wikipedia.org/wiki/Cryptography_law |
| encoding | https://en.wikipedia.org/wiki/Code |
| ideally | https://en.wikipedia.org/wiki/Idealism |
| plaintext | https://en.wikipedia.org/wiki/Plaintext |
| ciphertext | https://en.wikipedia.org/wiki/Ciphertext |
| pseudo-random | https://en.wikipedia.org/wiki/Pseudo-random |
| key | https://en.wikipedia.org/wiki/Key_(cryptography) |
| algorithm | https://en.wikipedia.org/wiki/Algorithm |
| [1] | https://en.wikipedia.org/wiki/Encryption#cite_note-:1-1 |
| public-key | https://en.wikipedia.org/wiki/Public-key_cryptography |
| [2] | https://en.wikipedia.org/wiki/Encryption#cite_note-:5-2 |
| symmetric-key | https://en.wikipedia.org/wiki/Symmetric-key_algorithm |
| [1] | https://en.wikipedia.org/wiki/Encryption#cite_note-:1-1 |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=1 |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=2 |
| Khnumhotep II | https://en.wikipedia.org/wiki/Khnumhotep_II |
| [3] | https://en.wikipedia.org/wiki/Encryption#cite_note-:4-3 |
| Caesar cipher | https://en.wikipedia.org/wiki/Caesar_cipher |
| [4] | https://en.wikipedia.org/wiki/Encryption#cite_note-4 |
| al-Kindi | https://en.wikipedia.org/wiki/Al-Kindi |
| frequency analysis | https://en.wikipedia.org/wiki/Frequency_analysis |
| ciphers | https://en.wikipedia.org/wiki/Cipher |
| [3] | https://en.wikipedia.org/wiki/Encryption#cite_note-:4-3 |
| polyalphabetic cipher | https://en.wikipedia.org/wiki/Polyalphabetic_cipher |
| al-Qalqashandi | https://en.wikipedia.org/wiki/Al-Qalqashandi |
| [2] | https://en.wikipedia.org/wiki/Encryption#cite_note-:5-2 |
| Leon Battista Alberti | https://en.wikipedia.org/wiki/Leon_Battista_Alberti |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=3 |
| Thomas Jefferson | https://en.wikipedia.org/wiki/Thomas_Jefferson |
| Jefferson Disk | https://en.wikipedia.org/wiki/Jefferson_disk |
| [5] | https://en.wikipedia.org/wiki/Encryption#cite_note-5 |
| M-94 | https://en.wikipedia.org/wiki/M-94_(cipher_machine) |
| US Army | https://en.wikipedia.org/wiki/United_States_Army |
| [6] | https://en.wikipedia.org/wiki/Encryption#cite_note-6 |
| World War II | https://en.wikipedia.org/wiki/World_War_II |
| Axis powers | https://en.wikipedia.org/wiki/Axis_powers |
| Enigma Machine | https://en.wikipedia.org/wiki/Enigma_machine |
| Jefferson Wheel | https://en.wikipedia.org/wiki/Jefferson_disk |
| [7] | https://en.wikipedia.org/wiki/Encryption#cite_note-7 |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=4 |
| Internet | https://en.wikipedia.org/wiki/Internet |
| [1] | https://en.wikipedia.org/wiki/Encryption#cite_note-:1-1 |
| eavesdropping | https://en.wikipedia.org/wiki/Eavesdropping |
| [8] | https://en.wikipedia.org/wiki/Encryption#cite_note-8 |
| DES | https://en.wikipedia.org/wiki/Data_Encryption_Standard |
| EFF's | https://en.wikipedia.org/wiki/Electronic_Frontier_Foundation |
| DES cracker | https://en.wikipedia.org/wiki/EFF_DES_cracker |
| AES | https://en.wikipedia.org/wiki/Advanced_Encryption_Standard |
| TwoFish | https://en.wikipedia.org/wiki/Twofish |
| ChaCha20-Poly1305 | https://en.wikipedia.org/wiki/ChaCha20-Poly1305 |
| Serpent | https://en.wikipedia.org/wiki/Serpent_(cipher) |
| backdoors | https://en.wikipedia.org/wiki/Backdoor_(computing) |
| Side-channel attacks | https://en.wikipedia.org/wiki/Side-channel_attack |
| RC4 | https://en.wikipedia.org/wiki/RC4 |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=5 |
| confidentiality | https://en.wikipedia.org/wiki/Information_security |
| [1] | https://en.wikipedia.org/wiki/Encryption#cite_note-:1-1 |
| passwords | https://en.wikipedia.org/wiki/Password |
| interceptors | https://en.wikipedia.org/wiki/Eavesdropping |
| [1] | https://en.wikipedia.org/wiki/Encryption#cite_note-:1-1 |
| keys | https://en.wikipedia.org/wiki/Key_(cryptography) |
| [9] | https://en.wikipedia.org/wiki/Encryption#cite_note-:0-9 |
| [10] | https://en.wikipedia.org/wiki/Encryption#cite_note-:2-10 |
| modular arithmetic | https://en.wikipedia.org/wiki/Modular_arithmetic |
| [11] | https://en.wikipedia.org/wiki/Encryption#cite_note-11 |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=6 |
| symmetric-key | https://en.wikipedia.org/wiki/Symmetric-key_algorithm |
| [12] | https://en.wikipedia.org/wiki/Encryption#cite_note-12 |
| public-key cryptography | https://en.wikipedia.org/wiki/Public-key_cryptography |
| [13] | https://en.wikipedia.org/wiki/Encryption#cite_note-13 |
| [14] | https://en.wikipedia.org/wiki/Encryption#cite_note-14 |
| [15] | https://en.wikipedia.org/wiki/Encryption#cite_note-Goldreich-15 |
| [16] | https://en.wikipedia.org/wiki/Encryption#cite_note-16 |
| Diffie-Hellman key exchange | https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange |
| RSA (Rivest–Shamir–Adleman) | https://en.wikipedia.org/wiki/RSA_(cryptosystem) |
| cryptosystem | https://en.wikipedia.org/wiki/Cryptosystem |
| digital signatures | https://en.wikipedia.org/wiki/Digital_signature |
| [17] | https://en.wikipedia.org/wiki/Encryption#cite_note-17 |
| number theory | https://en.wikipedia.org/wiki/Number_theory |
| prime numbers | https://en.wikipedia.org/wiki/Prime_number |
| [18] | https://en.wikipedia.org/wiki/Encryption#cite_note-18 |
| Pretty Good Privacy | https://en.wikipedia.org/wiki/Pretty_Good_Privacy |
| Phil Zimmermann | https://en.wikipedia.org/wiki/Phil_Zimmermann |
| Symantec | https://en.wikipedia.org/wiki/NortonLifeLock |
| [19] | https://en.wikipedia.org/wiki/Encryption#cite_note-19 |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=7 |
| militaries | https://en.wikipedia.org/wiki/Military |
| governments | https://en.wikipedia.org/wiki/Government |
| Computer Security Institute | https://en.wikipedia.org/wiki/Computer_Security_Institute |
| [20] | https://en.wikipedia.org/wiki/Encryption#cite_note-20 |
| USB flash drives | https://en.wikipedia.org/wiki/USB_flash_drives |
| [21] | https://en.wikipedia.org/wiki/Encryption#cite_note-KeaneWhyStolen16-21 |
| [22] | https://en.wikipedia.org/wiki/Encryption#cite_note-CastriconeFebruary18-22 |
| [23] | https://en.wikipedia.org/wiki/Encryption#cite_note-BekProtect16-23 |
| Digital rights management | https://en.wikipedia.org/wiki/Digital_rights_management |
| reverse engineering | https://en.wikipedia.org/wiki/Reverse_engineering |
| copy protection | https://en.wikipedia.org/wiki/Copy_protection |
| [24] | https://en.wikipedia.org/wiki/Encryption#cite_note-24 |
| networks | https://en.wikipedia.org/wiki/Computer_network |
| e-commerce | https://en.wikipedia.org/wiki/E-commerce |
| mobile telephones | https://en.wikipedia.org/wiki/Mobile_telephone |
| wireless microphones | https://en.wikipedia.org/wiki/Wireless_microphone |
| wireless intercom | https://en.wikipedia.org/wiki/Wireless_intercom |
| Bluetooth | https://en.wikipedia.org/wiki/Bluetooth |
| automatic teller machines | https://en.wikipedia.org/wiki/Automatic_teller_machine |
| [25] | https://en.wikipedia.org/wiki/Encryption#cite_note-25 |
| eavesdropping | https://en.wikipedia.org/wiki/Eavesdropping |
| [26] | https://en.wikipedia.org/wiki/Encryption#cite_note-26 |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=8 |
| Data erasure | https://en.wikipedia.org/wiki/Data_erasure |
| crypto-shredding | https://en.wikipedia.org/wiki/Crypto-shredding |
| iOS | https://en.wikipedia.org/wiki/IOS |
| effaceable | https://en.wiktionary.org/wiki/efface |
| [27] | https://en.wikipedia.org/wiki/Encryption#cite_note-27 |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=9 |
| [28] | https://en.wikipedia.org/wiki/Encryption#cite_note-28 |
| DES | https://en.wikipedia.org/wiki/Data_Encryption_Standard |
| brute force attacks | https://en.wikipedia.org/wiki/Brute-force_attack |
| [29] | https://en.wikipedia.org/wiki/Encryption#cite_note-29 |
| Quantum computing | https://en.wikipedia.org/wiki/Quantum_computing |
| quantum mechanics | https://en.wikipedia.org/wiki/Quantum_mechanics |
| [30] | https://en.wikipedia.org/wiki/Encryption#cite_note-30 |
| semiprime number | https://en.wikipedia.org/wiki/Semiprime_number |
| [31] | https://en.wikipedia.org/wiki/Encryption#cite_note-31 |
| quantum algorithms | https://en.wikipedia.org/wiki/Quantum_algorithm |
| [32] | https://en.wikipedia.org/wiki/Encryption#cite_note-32 |
| elliptic curve cryptography | https://en.wikipedia.org/wiki/Elliptic-curve_cryptography |
| citation needed | https://en.wikipedia.org/wiki/Wikipedia:Citation_needed |
| [33] | https://en.wikipedia.org/wiki/Encryption#cite_note-:3-33 |
| National Security Agency | https://en.wikipedia.org/wiki/National_Security_Agency |
| [34] | https://en.wikipedia.org/wiki/Encryption#cite_note-34 |
| [33] | https://en.wikipedia.org/wiki/Encryption#cite_note-:3-33 |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=10 |
| security | https://en.wikipedia.org/wiki/Information_security |
| privacy | https://en.wikipedia.org/wiki/Information_privacy |
| cloud | https://en.wikipedia.org/wiki/Cloud_computing |
| Homomorphic encryption | https://en.wikipedia.org/wiki/Homomorphic_encryption |
| secure multi-party computation | https://en.wikipedia.org/wiki/Secure_multi-party_computation |
| Turing complete | https://en.wikipedia.org/wiki/Turing_completeness |
| [35] | https://en.wikipedia.org/wiki/Encryption#cite_note-35 |
| stolen ciphertext attacks | https://en.wikipedia.org/wiki/Ciphertext_stealing |
| [36] | https://en.wikipedia.org/wiki/Encryption#cite_note-36 |
| [37] | https://en.wikipedia.org/wiki/Encryption#cite_note-37 |
| insider attacks | https://en.wikipedia.org/wiki/Insider_threat |
| [38] | https://en.wikipedia.org/wiki/Encryption#cite_note-38 |
| ransomware | https://en.wikipedia.org/wiki/Ransomware |
| [39] | https://en.wikipedia.org/wiki/Encryption#cite_note-39 |
| active defense | https://en.wikipedia.org/wiki/Active_Defense |
| [40] | https://en.wikipedia.org/wiki/Encryption#cite_note-40 |
| [41] | https://en.wikipedia.org/wiki/Encryption#cite_note-41 |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=11 |
| right to privacy | https://en.wikipedia.org/wiki/Right_to_privacy |
| [42] | https://en.wikipedia.org/wiki/Encryption#cite_note-42 |
| Big Tech | https://en.wikipedia.org/wiki/Big_Tech |
| Apple | https://en.wikipedia.org/wiki/Apple_Inc. |
| Google | https://en.wikipedia.org/wiki/Google |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=12 |
| message authentication code | https://en.wikipedia.org/wiki/Message_authentication_code |
| digital signature | https://en.wikipedia.org/wiki/Digital_signature |
| hashing algorithm | https://en.wikipedia.org/wiki/Hash_function |
| PGP signature | https://en.wikipedia.org/wiki/Pretty_Good_Privacy |
| Authenticated encryption | https://en.wikipedia.org/wiki/Authenticated_encryption |
| cryptographic software | https://en.wikipedia.org/wiki/Cryptographic_software |
| hardware to perform encryption | https://en.wikipedia.org/wiki/Hardware_encryption |
| traffic analysis | https://en.wikipedia.org/wiki/Traffic_analysis |
| TEMPEST | https://en.wikipedia.org/wiki/Tempest_(codename) |
| Trojan horse | https://en.wikipedia.org/wiki/Trojan_horse_(computing) |
| [43] | https://en.wikipedia.org/wiki/Encryption#cite_note-43 |
| MACs | https://en.wikipedia.org/wiki/Message_authentication_code |
| digital signatures | https://en.wikipedia.org/wiki/Digital_signature |
| end-to-end | https://en.wikipedia.org/wiki/End-to-end_principle |
| keys | https://en.wikipedia.org/wiki/Key_(cryptography) |
| root certificate | https://en.wikipedia.org/wiki/Root_certificate |
| man-in-the-middle attack | https://en.wikipedia.org/wiki/Man-in-the-middle_attack |
| TLS interception | https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_interception |
| [44] | https://en.wikipedia.org/wiki/Encryption#cite_note-44 |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=13 |
| Padding (cryptography) | https://en.wikipedia.org/wiki/Padding_(cryptography) |
| metadata | https://en.wikipedia.org/wiki/Metadata |
| CRIME | https://en.wikipedia.org/wiki/CRIME |
| BREACH | https://en.wikipedia.org/wiki/BREACH |
| HTTPS | https://en.wikipedia.org/wiki/HTTPS |
| side-channel attack | https://en.wikipedia.org/wiki/Side-channel_attack |
| [45] | https://en.wikipedia.org/wiki/Encryption#cite_note-45 |
| Traffic analysis | https://en.wikipedia.org/wiki/Traffic_analysis |
| padding | https://en.wikipedia.org/wiki/Padding_(cryptography) |
| bandwidth overhead | https://en.wikipedia.org/wiki/Overhead_(computing) |
| randomly | https://en.wikipedia.org/wiki/Padding_(cryptography)#Randomized_padding |
| deterministically | https://en.wikipedia.org/wiki/Padding_(cryptography)#Deterministic_padding |
| padded uniform random blobs (PURBs) | https://en.wikipedia.org/wiki/PURB_(cryptography) |
| metadata | https://en.wikipedia.org/wiki/Metadata |
| information | https://en.wikipedia.org/wiki/Entropy_(information_theory) |
| [46] | https://en.wikipedia.org/wiki/Encryption#cite_note-46 |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=14 |
| Cryptosystem | https://en.wikipedia.org/wiki/Cryptosystem |
| Cold boot attack | https://en.wikipedia.org/wiki/Cold_boot_attack |
| Cryptographic primitive | https://en.wikipedia.org/wiki/Cryptographic_primitive |
| Cryptography standards | https://en.wikipedia.org/wiki/Cryptography_standards |
| Cyberspace Electronic Security Act | https://en.wikipedia.org/wiki/Cyberspace_Electronic_Security_Act |
| Dictionary attack | https://en.wikipedia.org/wiki/Dictionary_attack |
| Disk encryption | https://en.wikipedia.org/wiki/Disk_encryption |
| Encrypted function | https://en.wikipedia.org/wiki/Encrypted_function |
| Enigma machine | https://en.wikipedia.org/wiki/Enigma_machine |
| Export of cryptography | https://en.wikipedia.org/wiki/Export_of_cryptography |
| Geo-blocking | https://en.wikipedia.org/wiki/Geo-blocking |
| Indistinguishability obfuscation | https://en.wikipedia.org/wiki/Indistinguishability_obfuscation |
| Key management | https://en.wikipedia.org/wiki/Key_management |
| Multiple encryption | https://en.wikipedia.org/wiki/Multiple_encryption |
| Physical Layer Encryption | https://en.wikipedia.org/wiki/Information-theoretic_security#Physical_layer_encryption |
| Pretty Good Privacy | https://en.wikipedia.org/wiki/Pretty_Good_Privacy |
| Post-quantum cryptography | https://en.wikipedia.org/wiki/Post-quantum_cryptography |
| Rainbow table | https://en.wikipedia.org/wiki/Rainbow_table |
| Rotor machine | https://en.wikipedia.org/wiki/Rotor_machine |
| Side-channel attack | https://en.wikipedia.org/wiki/Side-channel_attack |
| Substitution cipher | https://en.wikipedia.org/wiki/Substitution_cipher |
| Television encryption | https://en.wikipedia.org/wiki/Television_encryption |
| Tokenization (data security) | https://en.wikipedia.org/wiki/Tokenization_(data_security) |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=15 |
| a | https://en.wikipedia.org/wiki/Encryption#cite_ref-:1_1-0 |
| b | https://en.wikipedia.org/wiki/Encryption#cite_ref-:1_1-1 |
| c | https://en.wikipedia.org/wiki/Encryption#cite_ref-:1_1-2 |
| d | https://en.wikipedia.org/wiki/Encryption#cite_ref-:1_1-3 |
| e | https://en.wikipedia.org/wiki/Encryption#cite_ref-:1_1-4 |
| "An Overview of Cryptography" | https://www.garykessler.net/library/crypto.html |
| a | https://en.wikipedia.org/wiki/Encryption#cite_ref-:5_2-0 |
| b | https://en.wikipedia.org/wiki/Encryption#cite_ref-:5_2-1 |
| Passwords: Philology, Security, Authentication | https://books.google.com/books?id=jbpTDwAAQBAJ&pg=PT26 |
| Harvard University Press | https://en.wikipedia.org/wiki/Harvard_University_Press |
| ISBN | https://en.wikipedia.org/wiki/ISBN_(identifier) |
| 9780674985377 | https://en.wikipedia.org/wiki/Special:BookSources/9780674985377 |
| a | https://en.wikipedia.org/wiki/Encryption#cite_ref-:4_3-0 |
| b | https://en.wikipedia.org/wiki/Encryption#cite_ref-:4_3-1 |
| "History of Cryptography" | https://web.archive.org/web/20200426075650/https://www.binance.vision/security/history-of-cryptography |
| the original | https://www.binance.vision/security/history-of-cryptography |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-4 |
| "Caesar Cipher in Cryptography" | https://www.geeksforgeeks.org/caesar-cipher-in-cryptography/ |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-5 |
| "Wheel Cipher" | https://www.monticello.org/site/research-and-collections/wheel-cipher |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-6 |
| "M-94" | https://www.cryptomuseum.com/crypto/usa/m94/index.htm |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-7 |
| "How did the Enigma machine work?" | https://www.theguardian.com/technology/2014/nov/14/how-did-enigma-machine-work-imitation-game |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-8 |
| "The Evolution of Encryption" | https://www.wired.com/insights/2013/05/the-evolution-of-encryption/ |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-:0_9-0 |
| doi | https://en.wikipedia.org/wiki/Doi_(identifier) |
| 10.1016/B978-0-12-802324-2.00011-7 | https://doi.org/10.1016%2FB978-0-12-802324-2.00011-7 |
| ISBN | https://en.wikipedia.org/wiki/ISBN_(identifier) |
| 978-0-12-802324-2 | https://en.wikipedia.org/wiki/Special:BookSources/978-0-12-802324-2 |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-:2_10-0 |
| "Classification of Cryptographic Keys" | https://www.cryptomathic.com/news-events/blog/classification-of-cryptographic-keys-functions-and-properties |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-11 |
| "Chapter 3. Modular Arithmetic" | https://web.archive.org/web/20211011110748/https://www.doc.ic.ac.uk/~mrh/330tutor/ch03.html |
| the original | https://www.doc.ic.ac.uk/~mrh/330tutor/ch03.html |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-12 |
| "Symmetric-key encryption software" | https://web.archive.org/web/20220310103427/http://iaktueller.de/Collatz.py |
| the original | https://iaktueller.de/Collatz.py |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-13 |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-14 |
| "Public-Key Encryption – how GCHQ got there first!" | https://web.archive.org/web/20100519084635/https://www.gchq.gov.uk/history/pke.html |
| the original | https://www.gchq.gov.uk/history/pke.html |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-Goldreich_15-0 |
| Goldreich, Oded. | https://en.wikipedia.org/wiki/Oded_Goldreich |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-16 |
| Bibcode | https://en.wikipedia.org/wiki/Bibcode_(identifier) |
| 1976ITIT...22..644D | https://ui.adsabs.harvard.edu/abs/1976ITIT...22..644D |
| doi | https://en.wikipedia.org/wiki/Doi_(identifier) |
| 10.1109/TIT.1976.1055638 | https://doi.org/10.1109%2FTIT.1976.1055638 |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-17 |
| "The RSA Algorithm: A Mathematical History of the Ubiquitous Cryptological Algorithm" | https://web.archive.org/web/20220331215424/https://www.sccs.swarthmore.edu/users/10/mkelly1/rsa.pdf |
| the original | https://www.sccs.swarthmore.edu/users/10/mkelly1/rsa.pdf |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-18 |
| "Short Message Service Encoding Using the Rivest-Shamir-Adleman Algorithm" | https://doi.org/10.15575%2Fjoin.v4i1.264 |
| doi | https://en.wikipedia.org/wiki/Doi_(identifier) |
| 10.15575/join.v4i1.264 | https://doi.org/10.15575%2Fjoin.v4i1.264 |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-19 |
| "Symantec buys encryption specialist PGP for $300M" | https://web.archive.org/web/20200131201636/https://www.computerworld.com/article/2517739/symantec-buys-encryption-specialist-pgp-for--300m.html |
| the original | https://www.computerworld.com/article/2517739/symantec-buys-encryption-specialist-pgp-for--300m.html |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-20 |
| i.cmpnet.com | https://i.cmpnet.com/v2.gocsi.com/pdf/CSIsurvey2008.pdf |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-KeaneWhyStolen16_21-0 |
| "Why stolen laptops still cause data breaches, and what's being done to stop them" | https://www.pcworld.com/article/3021316/security/why-stolen-laptops-still-cause-data-breaches-and-whats-being-done-to-stop-them.html |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-CastriconeFebruary18_22-0 |
| "Health Care Group News: $3.5 M OCR Settlement for Five Breaches Affecting Fewer Than 500 Patients Each" | https://www.natlawreview.com/article/february-2-2018-health-care-group-news-35-m-ocr-settlement-five-breaches-affecting |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-BekProtect16_23-0 |
| "Protect Your Company from Theft: Self Encrypting Drives" | https://blog.westerndigital.com/protect-your-company-from-theft-self-encrypting-drives/ |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-24 |
| "DRM" | https://www.eff.org/issues/drm |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-25 |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-26 |
| "Data Encryption in Transit Guideline" | https://security.berkeley.edu/data-encryption-transit-guideline |
| Archived | https://web.archive.org/web/20231205085812/https://security.berkeley.edu/data-encryption-transit-guideline |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-27 |
| "Welcome" | https://support.apple.com/guide/security/welcome/web |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-28 |
| doi | https://en.wikipedia.org/wiki/Doi_(identifier) |
| 10.29322/IJSRP.8.7.2018.p7978 | https://doi.org/10.29322%2FIJSRP.8.7.2018.p7978 |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-29 |
| "Encryption methods: An overview" | https://www.ionos.com/digitalguide/server/security/encryption-methods-an-overview/ |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-30 |
| "Quantum computers vastly outperform supercomputers when it comes to energy efficiency" | https://physicsworld.com/a/quantum-computers-vastly-outperform-supercomputers-when-it-comes-to-energy-efficiency/ |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-31 |
| "How Shor's Algorithm Breaks RSA: A Quantum Computing Guide | SpinQ" | https://www.spinquanta.com/news-detail/shors-algorithm |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-32 |
| doi | https://en.wikipedia.org/wiki/Doi_(identifier) |
| 10.1080/23335777.2020.1811384 | https://doi.org/10.1080%2F23335777.2020.1811384 |
| S2CID | https://en.wikipedia.org/wiki/S2CID_(identifier) |
| 225312133 | https://api.semanticscholar.org/CorpusID:225312133 |
| a | https://en.wikipedia.org/wiki/Encryption#cite_ref-:3_33-0 |
| b | https://en.wikipedia.org/wiki/Encryption#cite_ref-:3_33-1 |
| "The Potential of Quantum Computing and Machine Learning to Advance Clinical Research and Change the Practice of Medicine" | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6205278 |
| PMC | https://en.wikipedia.org/wiki/PMC_(identifier) |
| 6205278 | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6205278 |
| PMID | https://en.wikipedia.org/wiki/PMID_(identifier) |
| 30385997 | https://pubmed.ncbi.nlm.nih.gov/30385997 |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-34 |
| "Post-Quantum Cybersecurity Resources" | https://web.archive.org/web/20210118015943/https://www.nsa.gov/what-we-do/cybersecurity/post-quantum-cybersecurity-resources/ |
| the original | https://www.nsa.gov/what-we-do/cybersecurity/post-quantum-cybersecurity-resources/ |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-35 |
| "Horus: Fine-Grained Encryption-Based Security for Large-Scale Storage" | https://web.archive.org/web/20220215072921/https://www.ssrc.ucsc.edu/Papers/li-fast13.pdf |
| the original | https://www.ssrc.ucsc.edu/Papers/li-fast13.pdf |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-36 |
| "The Padding Oracle Attack – why crypto is terrifying" | https://robertheaton.com/2013/07/29/padding-oracle-attack/ |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-37 |
| "Researchers crack open unusually advanced malware that hid for 5 years" | https://arstechnica.com/security/2016/08/researchers-crack-open-unusually-advanced-malware-that-hid-for-5-years/ |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-38 |
| "New cloud attack takes full control of virtual machines with little effort" | https://arstechnica.com/security/2016/08/new-attack-steals-private-crypto-keys-by-corrupting-data-in-computer-memory/ |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-39 |
| Tahoe-LAFS | https://en.wikipedia.org/wiki/Tahoe-LAFS |
| Storj | https://storj.io/index.html |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-40 |
| "Moving Target Defense (MTD) – NIST CSRC Glossary" | https://csrc.nist.gov/glossary/term/moving_target_defense |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-41 |
| CryptoMove | https://www.cryptomove.com |
| Archived | https://web.archive.org/web/20210206131311/https://www.cryptomove.com/ |
| Wayback Machine | https://en.wikipedia.org/wiki/Wayback_Machine |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-42 |
| "The Modern Encryption Debate: What's at Stake?" | https://circleid.com/posts/20221102-the-modern-encryption-debate-whats-at-stake |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-43 |
| "What is a Trojan Virus – Malware Protection – Kaspersky Lab US" | https://usa.kaspersky.com/internet-security-center/threats/trojans#.VV3oaWDTvfY |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-44 |
| "Kazakhstan Begins Intercepting HTTPS Internet Traffic Of All Citizens Forcefully" | https://thehackernews.com/2019/07/kazakhstan-https-security-certificate.html |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-45 |
| Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS) | https://tools.ietf.org/html/rfc7457 |
| ^ | https://en.wikipedia.org/wiki/Encryption#cite_ref-46 |
| "Reducing Metadata Leakage from Encrypted Files and Communication with PURBs" | https://petsymposium.org/2019/files/papers/issue4/popets-2019-0056.pdf |
| arXiv | https://en.wikipedia.org/wiki/ArXiv_(identifier) |
| 1806.03160 | https://arxiv.org/abs/1806.03160 |
| doi | https://en.wikipedia.org/wiki/Doi_(identifier) |
| 10.2478/popets-2019-0056 | https://doi.org/10.2478%2Fpopets-2019-0056 |
| S2CID | https://en.wikipedia.org/wiki/S2CID_(identifier) |
| 47011059 | https://api.semanticscholar.org/CorpusID:47011059 |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=16 |
| Fouché Gaines, Helen | https://en.wikipedia.org/wiki/Helen_Fouch%C3%A9_Gaines |
| Cryptanalysis: A Study of Ciphers and Their Solution | https://archive.org/details/cryptanalysis00hele |
| ISBN | https://en.wikipedia.org/wiki/ISBN_(identifier) |
| 978-0486200972 | https://en.wikipedia.org/wiki/Special:BookSources/978-0486200972 |
| citation | https://en.wikipedia.org/wiki/Template:Citation |
| help | https://en.wikipedia.org/wiki/Help:CS1_errors#invalid_isbn_date |
| Kahn, David | https://en.wikipedia.org/wiki/David_Kahn_(writer) |
| ISBN | https://en.wikipedia.org/wiki/ISBN_(identifier) |
| 0-684-83130-9 | https://en.wikipedia.org/wiki/Special:BookSources/0-684-83130-9 |
| Preneel, Bart | https://en.wikipedia.org/wiki/Bart_Preneel |
| ISBN | https://en.wikipedia.org/wiki/ISBN_(identifier) |
| 978-3-540-67517-4 | https://en.wikipedia.org/wiki/Special:BookSources/978-3-540-67517-4 |
| Sinkov, Abraham | https://en.wikipedia.org/wiki/Abraham_Sinkov |
| ISBN | https://en.wikipedia.org/wiki/ISBN_(identifier) |
| 0-88385-622-0 | https://en.wikipedia.org/wiki/Special:BookSources/0-88385-622-0 |
| ISBN | https://en.wikipedia.org/wiki/ISBN_(identifier) |
| 978-3-755-76117-4 | https://en.wikipedia.org/wiki/Special:BookSources/978-3-755-76117-4 |
| ISBN | https://en.wikipedia.org/wiki/ISBN_(identifier) |
| 978-1466570269 | https://en.wikipedia.org/wiki/Special:BookSources/978-1466570269 |
| Concealing for Freedom: The Making of Encryption, Secure Messaging and Digital Liberties (Foreword by Laura DeNardis)(open access) | https://web.archive.org/web/20220602103410/https://www.matteringpress.org/wp-content/uploads/2022/05/Concealing-for-Freedom-ePDF.pdf |
| ISBN | https://en.wikipedia.org/wiki/ISBN_(identifier) |
| 978-1-912729-22-7 | https://en.wikipedia.org/wiki/Special:BookSources/978-1-912729-22-7 |
| the original | https://www.matteringpress.org/wp-content/uploads/2022/05/Concealing-for-Freedom-ePDF.pdf |
| edit | https://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=17 |
| https://en.wikipedia.org/wiki/File:Wiktionary-logo-en-v2.svg |
| encryption | https://en.wiktionary.org/wiki/encryption |
| https://en.wikipedia.org/wiki/File:Commons-logo.svg |
| Cryptographic algorithms | https://commons.wikimedia.org/wiki/Category:Cryptographic_algorithms |
| v | https://en.wikipedia.org/wiki/Template:Cryptography_navbox |
| t | https://en.wikipedia.org/wiki/Template_talk:Cryptography_navbox |
| e | https://en.wikipedia.org/wiki/Special:EditPage/Template:Cryptography_navbox |
| Cryptography | https://en.wikipedia.org/wiki/Cryptography |
| History of cryptography | https://en.wikipedia.org/wiki/History_of_cryptography |
| Outline of cryptography | https://en.wikipedia.org/wiki/Outline_of_cryptography |
| Classical cipher | https://en.wikipedia.org/wiki/Classical_cipher |
| Cryptographic protocol | https://en.wikipedia.org/wiki/Cryptographic_protocol |
| Authentication protocol | https://en.wikipedia.org/wiki/Authentication_protocol |
| Cryptographic primitive | https://en.wikipedia.org/wiki/Cryptographic_primitive |
| Cryptanalysis | https://en.wikipedia.org/wiki/Cryptanalysis |
| Cryptocurrency | https://en.wikipedia.org/wiki/Cryptocurrency |
| Cryptosystem | https://en.wikipedia.org/wiki/Cryptosystem |
| Cryptographic nonce | https://en.wikipedia.org/wiki/Cryptographic_nonce |
| Cryptovirology | https://en.wikipedia.org/wiki/Cryptovirology |
| Hash function | https://en.wikipedia.org/wiki/Hash_function |
| Cryptographic hash function | https://en.wikipedia.org/wiki/Cryptographic_hash_function |
| Key derivation function | https://en.wikipedia.org/wiki/Key_derivation_function |
| Secure Hash Algorithms | https://en.wikipedia.org/wiki/Secure_Hash_Algorithms |
| Digital signature | https://en.wikipedia.org/wiki/Digital_signature |
| Kleptography | https://en.wikipedia.org/wiki/Kleptography |
| Key (cryptography) | https://en.wikipedia.org/wiki/Key_(cryptography) |
| Key exchange | https://en.wikipedia.org/wiki/Key_exchange |
| Key generator | https://en.wikipedia.org/wiki/Key_generator |
| Key schedule | https://en.wikipedia.org/wiki/Key_schedule |
| Key stretching | https://en.wikipedia.org/wiki/Key_stretching |
| Keygen | https://en.wikipedia.org/wiki/Keygen |
| Machines | https://en.wikipedia.org/wiki/Template:Cryptography_machines |
| Ransomware | https://en.wikipedia.org/wiki/Ransomware |
| Random number generation | https://en.wikipedia.org/wiki/Random_number_generation |
| Cryptographically secure pseudorandom number generator | https://en.wikipedia.org/wiki/Cryptographically_secure_pseudorandom_number_generator |
| Pseudorandom noise | https://en.wikipedia.org/wiki/Pseudorandom_noise |
| Secure channel | https://en.wikipedia.org/wiki/Secure_channel |
| Insecure channel | https://en.wikipedia.org/wiki/Insecure_channel |
| Subliminal channel | https://en.wikipedia.org/wiki/Subliminal_channel |
| Decryption | https://en.wikipedia.org/wiki/Decryption |
| End-to-end encryption | https://en.wikipedia.org/wiki/End-to-end_encryption |
| Harvest now, decrypt later | https://en.wikipedia.org/wiki/Harvest_now,_decrypt_later |
| Information-theoretic security | https://en.wikipedia.org/wiki/Information-theoretic_security |
| Plaintext | https://en.wikipedia.org/wiki/Plaintext |
| Codetext | https://en.wikipedia.org/wiki/Codetext |
| Ciphertext | https://en.wikipedia.org/wiki/Ciphertext |
| Shared secret | https://en.wikipedia.org/wiki/Shared_secret |
| Trapdoor function | https://en.wikipedia.org/wiki/Trapdoor_function |
| Trusted timestamping | https://en.wikipedia.org/wiki/Trusted_timestamping |
| Key-based routing | https://en.wikipedia.org/wiki/Key-based_routing |
| Onion routing | https://en.wikipedia.org/wiki/Onion_routing |
| Garlic routing | https://en.wikipedia.org/wiki/Garlic_routing |
| Kademlia | https://en.wikipedia.org/wiki/Kademlia |
| Mix network | https://en.wikipedia.org/wiki/Mix_network |
| Cryptographic hash function | https://en.wikipedia.org/wiki/Cryptographic_hash_function |
| Block cipher | https://en.wikipedia.org/wiki/Block_cipher |
| Stream cipher | https://en.wikipedia.org/wiki/Stream_cipher |
| Symmetric-key algorithm | https://en.wikipedia.org/wiki/Symmetric-key_algorithm |
| Authenticated encryption | https://en.wikipedia.org/wiki/Authenticated_encryption |
| Public-key cryptography | https://en.wikipedia.org/wiki/Public-key_cryptography |
| Quantum key distribution | https://en.wikipedia.org/wiki/Quantum_key_distribution |
| Quantum cryptography | https://en.wikipedia.org/wiki/Quantum_cryptography |
| Post-quantum cryptography | https://en.wikipedia.org/wiki/Post-quantum_cryptography |
| Message authentication code | https://en.wikipedia.org/wiki/Message_authentication_code |
| Random numbers | https://en.wikipedia.org/wiki/Cryptographically_secure_pseudorandom_number_generator |
| Steganography | https://en.wikipedia.org/wiki/Steganography |
| Category | https://en.wikipedia.org/wiki/Category:Cryptography |
| v | https://en.wikipedia.org/wiki/Template:Information_security |
| t | https://en.wikipedia.org/wiki/Template_talk:Information_security |
| e | https://en.wikipedia.org/wiki/Special:EditPage/Template:Information_security |
| Information security | https://en.wikipedia.org/wiki/Information_security |
| Threats | https://en.wikipedia.org/wiki/Threat_(computer) |
| Adware | https://en.wikipedia.org/wiki/Adware |
| Advanced persistent threat | https://en.wikipedia.org/wiki/Advanced_persistent_threat |
| Arbitrary code execution | https://en.wikipedia.org/wiki/Arbitrary_code_execution |
| Backdoors | https://en.wikipedia.org/wiki/Backdoor_(computing) |
| Fork | https://en.wikipedia.org/wiki/Fork_bomb |
| Logic | https://en.wikipedia.org/wiki/Logic_bomb |
| Time | https://en.wikipedia.org/wiki/Time_bomb_(software) |
| Zip | https://en.wikipedia.org/wiki/Zip_bomb |
| Hardware backdoors | https://en.wikipedia.org/wiki/Hardware_backdoor |
| Code injection | https://en.wikipedia.org/wiki/Code_injection |
| Crimeware | https://en.wikipedia.org/wiki/Crimeware |
| Cross-site scripting | https://en.wikipedia.org/wiki/Cross-site_scripting |
| Cross-site leaks | https://en.wikipedia.org/wiki/Cross-site_leaks |
| DOM clobbering | https://en.wikipedia.org/wiki/DOM_clobbering |
| History sniffing | https://en.wikipedia.org/wiki/History_sniffing |
| Cryptojacking | https://en.wikipedia.org/wiki/Cryptojacking |
| Botnets | https://en.wikipedia.org/wiki/Botnet |
| Data breach | https://en.wikipedia.org/wiki/Data_breach |
| Drive-by download | https://en.wikipedia.org/wiki/Drive-by_download |
| Browser Helper Objects | https://en.wikipedia.org/wiki/Browser_Helper_Object |
| Viruses | https://en.wikipedia.org/wiki/Computer_virus |
| Data scraping | https://en.wikipedia.org/wiki/Data_scraping |
| Denial-of-service attack | https://en.wikipedia.org/wiki/Denial-of-service_attack |
| Eavesdropping | https://en.wikipedia.org/wiki/Eavesdropping |
| Email fraud | https://en.wikipedia.org/wiki/Email_fraud |
| Email spoofing | https://en.wikipedia.org/wiki/Email_spoofing |
| Exploits | https://en.wikipedia.org/wiki/Exploit_(computer_security) |
| Fraudulent dialers | https://en.wikipedia.org/wiki/Dialer#Fraudulent_dialer |
| Hacktivism | https://en.wikipedia.org/wiki/Hacktivism |
| Infostealer | https://en.wikipedia.org/wiki/Infostealer |
| Insecure direct object reference | https://en.wikipedia.org/wiki/Insecure_direct_object_reference |
| Keystroke loggers | https://en.wikipedia.org/wiki/Keystroke_logging |
| Malware | https://en.wikipedia.org/wiki/Malware |
| Payload | https://en.wikipedia.org/wiki/Payload_(computing) |
| Phishing | https://en.wikipedia.org/wiki/Phishing |
| Voice | https://en.wikipedia.org/wiki/Voice_phishing |
| Polymorphic engine | https://en.wikipedia.org/wiki/Polymorphic_engine |
| Privilege escalation | https://en.wikipedia.org/wiki/Privilege_escalation |
| Ransomware | https://en.wikipedia.org/wiki/Ransomware |
| Rootkits | https://en.wikipedia.org/wiki/Rootkit |
| Scareware | https://en.wikipedia.org/wiki/Scareware |
| Shellcode | https://en.wikipedia.org/wiki/Shellcode |
| Spamming | https://en.wikipedia.org/wiki/Spamming |
| Social engineering | https://en.wikipedia.org/wiki/Social_engineering_(security) |
| Spyware | https://en.wikipedia.org/wiki/Spyware |
| Software bugs | https://en.wikipedia.org/wiki/Software_bug |
| Trojan horses | https://en.wikipedia.org/wiki/Trojan_horse_(computing) |
| Hardware Trojans | https://en.wikipedia.org/wiki/Hardware_Trojan |
| Remote access trojans | https://en.wikipedia.org/wiki/Remote_access_trojan |
| Vulnerability | https://en.wikipedia.org/wiki/Vulnerability_(computer_security) |
| Web shells | https://en.wikipedia.org/wiki/Web_shell |
| Wiper | https://en.wikipedia.org/wiki/Wiper_(malware) |
| Worms | https://en.wikipedia.org/wiki/Computer_worm |
| SQL injection | https://en.wikipedia.org/wiki/SQL_injection |
| Rogue security software | https://en.wikipedia.org/wiki/Rogue_security_software |
| Zombie | https://en.wikipedia.org/wiki/Zombie_(computing) |
| https://en.wikipedia.org/wiki/File:CIAJMK1209-en.svg |
| Application security | https://en.wikipedia.org/wiki/Application_security |
| Secure coding | https://en.wikipedia.org/wiki/Secure_coding |
| Secure by design | https://en.wikipedia.org/wiki/Secure_by_design |
| Misuse case | https://en.wikipedia.org/wiki/Misuse_case |
| Computer access control | https://en.wikipedia.org/wiki/Computer_access_control |
| Authentication | https://en.wikipedia.org/wiki/Authentication |
| Multi-factor authentication | https://en.wikipedia.org/wiki/Multi-factor_authentication |
| Authorization | https://en.wikipedia.org/wiki/Authorization |
| Computer security software | https://en.wikipedia.org/wiki/Computer_security_software |
| Antivirus software | https://en.wikipedia.org/wiki/Antivirus_software |
| Security-focused operating system | https://en.wikipedia.org/wiki/Security-focused_operating_system |
| Data-centric security | https://en.wikipedia.org/wiki/Data-centric_security |
| Software obfuscation | https://en.wikipedia.org/wiki/Obfuscation_(software) |
| Data masking | https://en.wikipedia.org/wiki/Data_masking |
| Firewall | https://en.wikipedia.org/wiki/Firewall_(computing) |
| Intrusion detection system | https://en.wikipedia.org/wiki/Intrusion_detection_system |
| Host-based intrusion detection system | https://en.wikipedia.org/wiki/Host-based_intrusion_detection_system |
| Anomaly detection | https://en.wikipedia.org/wiki/Anomaly_detection |
| Information security management | https://en.wikipedia.org/wiki/Information_security_management |
| Information risk management | https://en.wikipedia.org/wiki/Information_risk_management |
| Security information and event management | https://en.wikipedia.org/wiki/Security_information_and_event_management |
| Runtime application self-protection | https://en.wikipedia.org/wiki/Runtime_application_self-protection |
| Site isolation | https://en.wikipedia.org/wiki/Site_isolation |
| Computer security | https://en.wikipedia.org/wiki/Computer_security |
| Automotive security | https://en.wikipedia.org/wiki/Automotive_security |
| Cybercrime | https://en.wikipedia.org/wiki/Cybercrime |
| Cybersex trafficking | https://en.wikipedia.org/wiki/Cybersex_trafficking |
| Computer fraud | https://en.wikipedia.org/wiki/Computer_fraud |
| Cybergeddon | https://en.wikipedia.org/wiki/Cybergeddon |
| Cyberterrorism | https://en.wikipedia.org/wiki/Cyberterrorism |
| Cyberwarfare | https://en.wikipedia.org/wiki/Cyberwarfare |
| Electronic warfare | https://en.wikipedia.org/wiki/Electronic_warfare |
| Information warfare | https://en.wikipedia.org/wiki/Information_warfare |
| Internet security | https://en.wikipedia.org/wiki/Internet_security |
| Mobile security | https://en.wikipedia.org/wiki/Mobile_security |
| Network security | https://en.wikipedia.org/wiki/Network_security |
| Copy protection | https://en.wikipedia.org/wiki/Copy_protection |
| Digital rights management | https://en.wikipedia.org/wiki/Digital_rights_management |
| Authority control databases | https://en.wikipedia.org/wiki/Help:Authority_control |
| https://www.wikidata.org/wiki/Q141090#identifiers |
| GND | https://d-nb.info/gnd/4352893-4 |
| United States | https://id.loc.gov/authorities/sh94001524 |
| France | https://catalogue.bnf.fr/ark:/12148/cb12467539g |
| BnF data | https://data.bnf.fr/ark:/12148/cb12467539g |
| Japan | https://id.ndl.go.jp/auth/ndlna/00560252 |
| Czech Republic | https://aleph.nkp.cz/F/?func=find-c&local_base=aut&ccl_term=ica=ph127801&CON_LNG=ENG |
| Israel | https://www.nli.org.il/en/authorities/987007563687305171 |
| Yale LUX | https://lux.collections.yale.edu/view/concept/0cf6f18c-be87-4b70-93d4-915cb159cc84 |
| https://en.wikipedia.org/w/index.php?title=Encryption&oldid=1332102725 | https://en.wikipedia.org/w/index.php?title=Encryption&oldid=1332102725 |
| Categories | https://en.wikipedia.org/wiki/Help:Category |
| Cryptography | https://en.wikipedia.org/wiki/Category:Cryptography |
| Data protection | https://en.wikipedia.org/wiki/Category:Data_protection |
| Webarchive template wayback links | https://en.wikipedia.org/wiki/Category:Webarchive_template_wayback_links |
| Articles with short description | https://en.wikipedia.org/wiki/Category:Articles_with_short_description |
| Short description is different from Wikidata | https://en.wikipedia.org/wiki/Category:Short_description_is_different_from_Wikidata |
| All articles with unsourced statements | https://en.wikipedia.org/wiki/Category:All_articles_with_unsourced_statements |
| Articles with unsourced statements from July 2020 | https://en.wikipedia.org/wiki/Category:Articles_with_unsourced_statements_from_July_2020 |
| CS1 errors: ISBN date | https://en.wikipedia.org/wiki/Category:CS1_errors:_ISBN_date |
| Commons category link is on Wikidata | https://en.wikipedia.org/wiki/Category:Commons_category_link_is_on_Wikidata |
| Creative Commons Attribution-ShareAlike 4.0 License | https://en.wikipedia.org/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License |
| Terms of Use | https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use |
| Privacy Policy | https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy |
| Wikimedia Foundation, Inc. | https://wikimediafoundation.org/ |
| Privacy policy | https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy |
| About Wikipedia | https://en.wikipedia.org/wiki/Wikipedia:About |
| Disclaimers | https://en.wikipedia.org/wiki/Wikipedia:General_disclaimer |
| Contact Wikipedia | https://en.wikipedia.org/wiki/Wikipedia:Contact_us |
| Legal & safety contacts | https://foundation.wikimedia.org/wiki/Special:MyLanguage/Legal:Wikimedia_Foundation_Legal_and_Safety_Contact_Information |
| Code of Conduct | https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct |
| Developers | https://developer.wikimedia.org |
| Statistics | https://stats.wikimedia.org/#/en.wikipedia.org |
| Cookie statement | https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement |
| Mobile view | https://en.wikipedia.org/w/index.php?title=Encryption&mobileaction=toggle_view_mobile |
| https://www.wikimedia.org/ |
| https://www.mediawiki.org/ |
|
| https://en.wikipedia.org/wiki/Encryption |
|
| https://en.wikipedia.org/wiki/Encryption |
|
| https://en.wikipedia.org/wiki/Encryption |
|
| https://en.wikipedia.org/wiki/Encryption |
|
| https://en.wikipedia.org/wiki/Encryption |
|
| https://en.wikipedia.org/wiki/Encryption |
|
| https://en.wikipedia.org/wiki/Encryption |
|
Add topic
| https://en.wikipedia.org/wiki/Encryption |