René's URL Explorer Experiment


Title: Encryption - Wikipedia

Open Graph Title: Encryption - Wikipedia

Generator: MediaWiki 1.46.0-wmf.10

direct link

Domain: en.wikipedia.org


Hey, it has json ld scripts:
{"@context":"https:\/\/schema.org","@type":"Article","name":"Encryption","url":"https:\/\/en.wikipedia.org\/wiki\/Encryption","sameAs":"http:\/\/www.wikidata.org\/entity\/Q141090","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q141090","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2001-12-19T14:44:08Z","dateModified":"2026-01-09T22:21:45Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/7\/70\/Public_key_encryption_keys.svg","headline":"process of hiding information into an alternative form known as ciphertext"}

referrerorigin-when-cross-origin
format-detectiontelephone=no
og:imagehttps://upload.wikimedia.org/wikipedia/commons/thumb/7/70/Public_key_encryption_keys.svg/1280px-Public_key_encryption_keys.svg.png
og:image:width1200
og:image:height507
og:typewebsite

Links:

Jump to contenthttps://en.wikipedia.org/wiki/Encryption#bodyContent
Main pagehttps://en.wikipedia.org/wiki/Main_Page
Contentshttps://en.wikipedia.org/wiki/Wikipedia:Contents
Current eventshttps://en.wikipedia.org/wiki/Portal:Current_events
Random articlehttps://en.wikipedia.org/wiki/Special:Random
About Wikipediahttps://en.wikipedia.org/wiki/Wikipedia:About
Contact ushttps://en.wikipedia.org/wiki/Wikipedia:Contact_us
Helphttps://en.wikipedia.org/wiki/Help:Contents
Learn to edithttps://en.wikipedia.org/wiki/Help:Introduction
Community portalhttps://en.wikipedia.org/wiki/Wikipedia:Community_portal
Recent changeshttps://en.wikipedia.org/wiki/Special:RecentChanges
Upload filehttps://en.wikipedia.org/wiki/Wikipedia:File_upload_wizard
Special pageshttps://en.wikipedia.org/wiki/Special:SpecialPages
https://en.wikipedia.org/wiki/Main_Page
Search https://en.wikipedia.org/wiki/Special:Search
Donatehttps://donate.wikimedia.org/?wmf_source=donate&wmf_medium=sidebar&wmf_campaign=en.wikipedia.org&uselang=en
Create accounthttps://en.wikipedia.org/w/index.php?title=Special:CreateAccount&returnto=Encryption
Log inhttps://en.wikipedia.org/w/index.php?title=Special:UserLogin&returnto=Encryption
Donatehttps://donate.wikimedia.org/?wmf_source=donate&wmf_medium=sidebar&wmf_campaign=en.wikipedia.org&uselang=en
Create accounthttps://en.wikipedia.org/w/index.php?title=Special:CreateAccount&returnto=Encryption
Log inhttps://en.wikipedia.org/w/index.php?title=Special:UserLogin&returnto=Encryption
(Top) https://en.wikipedia.org/wiki/Encryption
1 History https://en.wikipedia.org/wiki/Encryption#History
1.1 Ancient https://en.wikipedia.org/wiki/Encryption#Ancient
1.2 19th–20th century https://en.wikipedia.org/wiki/Encryption#19th–20th_century
1.3 Modern https://en.wikipedia.org/wiki/Encryption#Modern
2 Encryption in cryptography https://en.wikipedia.org/wiki/Encryption#Encryption_in_cryptography
2.1 Types https://en.wikipedia.org/wiki/Encryption#Types
3 Uses https://en.wikipedia.org/wiki/Encryption#Uses
3.1 Data erasure https://en.wikipedia.org/wiki/Encryption#Data_erasure
4 Limitations https://en.wikipedia.org/wiki/Encryption#Limitations
5 Attacks and countermeasures https://en.wikipedia.org/wiki/Encryption#Attacks_and_countermeasures
6 The debate around encryption https://en.wikipedia.org/wiki/Encryption#The_debate_around_encryption
6.1 Integrity protection of Ciphertexts https://en.wikipedia.org/wiki/Encryption#Integrity_protection_of_Ciphertexts
6.2 Ciphertext length and padding https://en.wikipedia.org/wiki/Encryption#Ciphertext_length_and_padding
7 See also https://en.wikipedia.org/wiki/Encryption#See_also
8 References https://en.wikipedia.org/wiki/Encryption#References
9 Further reading https://en.wikipedia.org/wiki/Encryption#Further_reading
10 External links https://en.wikipedia.org/wiki/Encryption#External_links
Afrikaanshttps://af.wikipedia.org/wiki/Versleuteling
العربيةhttps://ar.wikipedia.org/wiki/%D8%AA%D8%B9%D9%85%D9%8A%D8%A9_(%D8%A5%D8%AC%D8%B1%D8%A7%D8%A6%D9%8A%D8%A9)
Azərbaycancahttps://az.wikipedia.org/wiki/%C5%9Eifrl%C9%99m%C9%99
বাংলাhttps://bn.wikipedia.org/wiki/%E0%A6%97%E0%A7%81%E0%A6%AA%E0%A7%8D%E0%A6%A4%E0%A6%BE%E0%A6%AF%E0%A6%BC%E0%A6%A8
Българскиhttps://bg.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B5
Bosanskihttps://bs.wikipedia.org/wiki/Enkripcija
Catalàhttps://ca.wikipedia.org/wiki/Xifratge
Danskhttps://da.wikipedia.org/wiki/Kryptering
Deutschhttps://de.wikipedia.org/wiki/Verschl%C3%BCsselung
Eestihttps://et.wikipedia.org/wiki/%C5%A0ifreerimine
Ελληνικάhttps://el.wikipedia.org/wiki/%CE%9A%CF%81%CF%85%CF%80%CF%84%CE%BF%CE%B3%CF%81%CE%AC%CF%86%CE%B7%CF%83%CE%B7
Españolhttps://es.wikipedia.org/wiki/Cifrado_(criptograf%C3%ADa)
Esperantohttps://eo.wikipedia.org/wiki/%C4%88ifrado
Euskarahttps://eu.wikipedia.org/wiki/Zifratze
فارسیhttps://fa.wikipedia.org/wiki/%D8%B1%D9%85%D8%B2%DA%AF%D8%B0%D8%A7%D8%B1%DB%8C
Françaishttps://fr.wikipedia.org/wiki/Chiffrement
Gaeilgehttps://ga.wikipedia.org/wiki/Cripti%C3%BAch%C3%A1n
Galegohttps://gl.wikipedia.org/wiki/Cifraxe
한국어https://ko.wikipedia.org/wiki/%EC%95%94%ED%98%B8%ED%99%94
Հայերենhttps://hy.wikipedia.org/wiki/%D4%BE%D5%A1%D5%AE%D5%AF%D5%A1%D5%A3%D6%80%D5%B8%D6%82%D5%B4
हिन्दीhttps://hi.wikipedia.org/wiki/%E0%A4%97%E0%A5%81%E0%A4%AA%E0%A5%8D%E0%A4%A4%E0%A4%B2%E0%A5%87%E0%A4%96%E0%A4%A8
Hrvatskihttps://hr.wikipedia.org/wiki/%C5%A0ifra
Bahasa Indonesiahttps://id.wikipedia.org/wiki/Enkripsi
IsiXhosahttps://xh.wikipedia.org/wiki/I-Encryption
IsiZuluhttps://zu.wikipedia.org/wiki/Ukunyandla
Íslenskahttps://is.wikipedia.org/wiki/Dulritun
Italianohttps://it.wikipedia.org/wiki/Cifratura
עבריתhttps://he.wikipedia.org/wiki/%D7%94%D7%A6%D7%A4%D7%A0%D7%94
ქართულიhttps://ka.wikipedia.org/wiki/%E1%83%A8%E1%83%98%E1%83%A4%E1%83%A0%E1%83%90%E1%83%AA%E1%83%98%E1%83%90
Қазақшаhttps://kk.wikipedia.org/wiki/%D0%9C%D3%99%D0%BB%D1%96%D0%BC%D0%B5%D1%82%D1%82%D0%B5%D1%80%D0%B4%D1%96_%D1%88%D1%8B%D1%80%D2%9B%D0%B0%D1%83
Kiswahilihttps://sw.wikipedia.org/wiki/Usimbaji_fiche
Kurdîhttps://ku.wikipedia.org/wiki/%C5%9Eidandin
Кыргызчаhttps://ky.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BB%D3%A9%D3%A9
Latviešuhttps://lv.wikipedia.org/wiki/%C5%A0ifr%C4%93%C5%A1ana
Lingálahttps://ln.wikipedia.org/wiki/Lib%C3%B3mba
Magyarhttps://hu.wikipedia.org/wiki/Titkos%C3%ADt%C3%A1s
Македонскиhttps://mk.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%B8%D1%80%D0%B0%D1%9A%D0%B5
മലയാളംhttps://ml.wikipedia.org/wiki/%E0%B4%8E%E0%B5%BB%E0%B4%95%E0%B5%8D%E0%B4%B0%E0%B4%BF%E0%B4%AA%E0%B5%8D%E0%B4%B7%E0%B5%BB
Bahasa Melayuhttps://ms.wikipedia.org/wiki/Penyulitan
Монголhttps://mn.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BB%D1%8D%D0%BB%D1%82
Nederlandshttps://nl.wikipedia.org/wiki/Encryptie
日本語https://ja.wikipedia.org/wiki/%E6%9A%97%E5%8F%B7
Norsk bokmålhttps://no.wikipedia.org/wiki/Kryptering
Norsk nynorskhttps://nn.wikipedia.org/wiki/Kryptering
Occitanhttps://oc.wikipedia.org/wiki/Codatge
Oʻzbekcha / ўзбекчаhttps://uz.wikipedia.org/wiki/Shifrlash
پښتوhttps://ps.wikipedia.org/wiki/%DA%A9%D9%88%DA%89_%DA%A9%D9%88%D9%84
Piemontèishttps://pms.wikipedia.org/wiki/Cifradura
Portuguêshttps://pt.wikipedia.org/wiki/Encripta%C3%A7%C3%A3o
Românăhttps://ro.wikipedia.org/wiki/Criptare
Runa Simihttps://qu.wikipedia.org/wiki/Ukhulliy
Русскийhttps://ru.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5
Shqiphttps://sq.wikipedia.org/wiki/Kriptimi
සිංහලhttps://si.wikipedia.org/wiki/%E0%B6%9C%E0%B7%94%E0%B6%B4%E0%B7%8A%E0%B6%AD_%E0%B6%9A%E0%B7%9A%E0%B6%AD%E0%B6%B1%E0%B6%BA
Simple Englishhttps://simple.wikipedia.org/wiki/Encryption
Slovenščinahttps://sl.wikipedia.org/wiki/%C5%A0ifriranje_sporo%C4%8Dil
Српски / srpskihttps://sr.wikipedia.org/wiki/Enkripcija
Srpskohrvatski / српскохрватскиhttps://sh.wikipedia.org/wiki/Enkripcija
Sundahttps://su.wikipedia.org/wiki/%C3%89nkripsi
Suomihttps://fi.wikipedia.org/wiki/Salaus
Svenskahttps://sv.wikipedia.org/wiki/Kryptering
Tagaloghttps://tl.wikipedia.org/wiki/Enkripsiyon
தமிழ்https://ta.wikipedia.org/wiki/%E0%AE%AE%E0%AE%B1%E0%AF%88%E0%AE%AF%E0%AE%BE%E0%AE%95%E0%AF%8D%E0%AE%95%E0%AE%AE%E0%AF%8D
ไทยhttps://th.wikipedia.org/wiki/%E0%B8%81%E0%B8%B2%E0%B8%A3%E0%B9%80%E0%B8%82%E0%B9%89%E0%B8%B2%E0%B8%A3%E0%B8%AB%E0%B8%B1%E0%B8%AA
Türkçehttps://tr.wikipedia.org/wiki/%C5%9Eifreleme
Українськаhttps://uk.wikipedia.org/wiki/%D0%A8%D0%B8%D1%84%D1%80%D1%83%D0%B2%D0%B0%D0%BD%D0%BD%D1%8F
اردوhttps://ur.wikipedia.org/wiki/%D8%A7%D9%86%DA%A9%D8%B1%D9%BE%D8%B4%D9%86
Tiếng Việthttps://vi.wikipedia.org/wiki/M%C3%A3_h%C3%B3a
吴语https://wuu.wikipedia.org/wiki/%E5%8A%A0%E5%AF%86
粵語https://zh-yue.wikipedia.org/wiki/%E5%8A%A0%E5%AF%86
中文https://zh.wikipedia.org/wiki/%E5%8A%A0%E5%AF%86
Edit linkshttps://www.wikidata.org/wiki/Special:EntityPage/Q141090#sitelinks-wikipedia
Articlehttps://en.wikipedia.org/wiki/Encryption
Talkhttps://en.wikipedia.org/wiki/Talk:Encryption
Readhttps://en.wikipedia.org/wiki/Encryption
Edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit
View historyhttps://en.wikipedia.org/w/index.php?title=Encryption&action=history
Readhttps://en.wikipedia.org/wiki/Encryption
Edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit
View historyhttps://en.wikipedia.org/w/index.php?title=Encryption&action=history
What links herehttps://en.wikipedia.org/wiki/Special:WhatLinksHere/Encryption
Related changeshttps://en.wikipedia.org/wiki/Special:RecentChangesLinked/Encryption
Upload filehttps://en.wikipedia.org/wiki/Wikipedia:File_Upload_Wizard
Permanent linkhttps://en.wikipedia.org/w/index.php?title=Encryption&oldid=1332102725
Page informationhttps://en.wikipedia.org/w/index.php?title=Encryption&action=info
Cite this pagehttps://en.wikipedia.org/w/index.php?title=Special:CiteThisPage&page=Encryption&id=1332102725&wpFormIdentifier=titleform
Get shortened URLhttps://en.wikipedia.org/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FEncryption
Download QR codehttps://en.wikipedia.org/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FEncryption
Download as PDFhttps://en.wikipedia.org/w/index.php?title=Special:DownloadAsPdf&page=Encryption&action=show-download-screen
Printable versionhttps://en.wikipedia.org/w/index.php?title=Encryption&printable=yes
Wikimedia Commonshttps://commons.wikimedia.org/wiki/Category:Cryptographic_algorithms
Wikidata itemhttps://www.wikidata.org/wiki/Special:EntityPage/Q141090
Cryptographyhttps://en.wikipedia.org/wiki/Cryptography
Encryption (album)https://en.wikipedia.org/wiki/Encryption_(album)
Encrypt (film)https://en.wikipedia.org/wiki/Encrypt_(film)
https://en.wikipedia.org/wiki/File:Public_key_encryption_keys.svg
cryptographyhttps://en.wikipedia.org/wiki/Cryptography_law
encodinghttps://en.wikipedia.org/wiki/Code
ideallyhttps://en.wikipedia.org/wiki/Idealism
plaintexthttps://en.wikipedia.org/wiki/Plaintext
ciphertexthttps://en.wikipedia.org/wiki/Ciphertext
pseudo-randomhttps://en.wikipedia.org/wiki/Pseudo-random
keyhttps://en.wikipedia.org/wiki/Key_(cryptography)
algorithmhttps://en.wikipedia.org/wiki/Algorithm
[1]https://en.wikipedia.org/wiki/Encryption#cite_note-:1-1
public-keyhttps://en.wikipedia.org/wiki/Public-key_cryptography
[2]https://en.wikipedia.org/wiki/Encryption#cite_note-:5-2
symmetric-keyhttps://en.wikipedia.org/wiki/Symmetric-key_algorithm
[1]https://en.wikipedia.org/wiki/Encryption#cite_note-:1-1
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=1
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=2
Khnumhotep IIhttps://en.wikipedia.org/wiki/Khnumhotep_II
[3]https://en.wikipedia.org/wiki/Encryption#cite_note-:4-3
Caesar cipherhttps://en.wikipedia.org/wiki/Caesar_cipher
[4]https://en.wikipedia.org/wiki/Encryption#cite_note-4
al-Kindihttps://en.wikipedia.org/wiki/Al-Kindi
frequency analysishttps://en.wikipedia.org/wiki/Frequency_analysis
ciphershttps://en.wikipedia.org/wiki/Cipher
[3]https://en.wikipedia.org/wiki/Encryption#cite_note-:4-3
polyalphabetic cipherhttps://en.wikipedia.org/wiki/Polyalphabetic_cipher
al-Qalqashandihttps://en.wikipedia.org/wiki/Al-Qalqashandi
[2]https://en.wikipedia.org/wiki/Encryption#cite_note-:5-2
Leon Battista Albertihttps://en.wikipedia.org/wiki/Leon_Battista_Alberti
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=3
Thomas Jeffersonhttps://en.wikipedia.org/wiki/Thomas_Jefferson
Jefferson Diskhttps://en.wikipedia.org/wiki/Jefferson_disk
[5]https://en.wikipedia.org/wiki/Encryption#cite_note-5
M-94https://en.wikipedia.org/wiki/M-94_(cipher_machine)
US Armyhttps://en.wikipedia.org/wiki/United_States_Army
[6]https://en.wikipedia.org/wiki/Encryption#cite_note-6
World War IIhttps://en.wikipedia.org/wiki/World_War_II
Axis powershttps://en.wikipedia.org/wiki/Axis_powers
Enigma Machinehttps://en.wikipedia.org/wiki/Enigma_machine
Jefferson Wheelhttps://en.wikipedia.org/wiki/Jefferson_disk
[7]https://en.wikipedia.org/wiki/Encryption#cite_note-7
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=4
Internethttps://en.wikipedia.org/wiki/Internet
[1]https://en.wikipedia.org/wiki/Encryption#cite_note-:1-1
eavesdroppinghttps://en.wikipedia.org/wiki/Eavesdropping
[8]https://en.wikipedia.org/wiki/Encryption#cite_note-8
DEShttps://en.wikipedia.org/wiki/Data_Encryption_Standard
EFF'shttps://en.wikipedia.org/wiki/Electronic_Frontier_Foundation
DES crackerhttps://en.wikipedia.org/wiki/EFF_DES_cracker
AEShttps://en.wikipedia.org/wiki/Advanced_Encryption_Standard
TwoFishhttps://en.wikipedia.org/wiki/Twofish
ChaCha20-Poly1305https://en.wikipedia.org/wiki/ChaCha20-Poly1305
Serpenthttps://en.wikipedia.org/wiki/Serpent_(cipher)
backdoorshttps://en.wikipedia.org/wiki/Backdoor_(computing)
Side-channel attackshttps://en.wikipedia.org/wiki/Side-channel_attack
RC4https://en.wikipedia.org/wiki/RC4
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=5
confidentialityhttps://en.wikipedia.org/wiki/Information_security
[1]https://en.wikipedia.org/wiki/Encryption#cite_note-:1-1
passwordshttps://en.wikipedia.org/wiki/Password
interceptorshttps://en.wikipedia.org/wiki/Eavesdropping
[1]https://en.wikipedia.org/wiki/Encryption#cite_note-:1-1
keyshttps://en.wikipedia.org/wiki/Key_(cryptography)
[9]https://en.wikipedia.org/wiki/Encryption#cite_note-:0-9
[10]https://en.wikipedia.org/wiki/Encryption#cite_note-:2-10
modular arithmetichttps://en.wikipedia.org/wiki/Modular_arithmetic
[11]https://en.wikipedia.org/wiki/Encryption#cite_note-11
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=6
symmetric-keyhttps://en.wikipedia.org/wiki/Symmetric-key_algorithm
[12]https://en.wikipedia.org/wiki/Encryption#cite_note-12
public-key cryptographyhttps://en.wikipedia.org/wiki/Public-key_cryptography
[13]https://en.wikipedia.org/wiki/Encryption#cite_note-13
[14]https://en.wikipedia.org/wiki/Encryption#cite_note-14
[15]https://en.wikipedia.org/wiki/Encryption#cite_note-Goldreich-15
[16]https://en.wikipedia.org/wiki/Encryption#cite_note-16
Diffie-Hellman key exchangehttps://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
RSA (Rivest–Shamir–Adleman)https://en.wikipedia.org/wiki/RSA_(cryptosystem)
cryptosystemhttps://en.wikipedia.org/wiki/Cryptosystem
digital signatureshttps://en.wikipedia.org/wiki/Digital_signature
[17]https://en.wikipedia.org/wiki/Encryption#cite_note-17
number theoryhttps://en.wikipedia.org/wiki/Number_theory
prime numbershttps://en.wikipedia.org/wiki/Prime_number
[18]https://en.wikipedia.org/wiki/Encryption#cite_note-18
Pretty Good Privacyhttps://en.wikipedia.org/wiki/Pretty_Good_Privacy
Phil Zimmermannhttps://en.wikipedia.org/wiki/Phil_Zimmermann
Symantechttps://en.wikipedia.org/wiki/NortonLifeLock
[19]https://en.wikipedia.org/wiki/Encryption#cite_note-19
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=7
militarieshttps://en.wikipedia.org/wiki/Military
governmentshttps://en.wikipedia.org/wiki/Government
Computer Security Institutehttps://en.wikipedia.org/wiki/Computer_Security_Institute
[20]https://en.wikipedia.org/wiki/Encryption#cite_note-20
USB flash driveshttps://en.wikipedia.org/wiki/USB_flash_drives
[21]https://en.wikipedia.org/wiki/Encryption#cite_note-KeaneWhyStolen16-21
[22]https://en.wikipedia.org/wiki/Encryption#cite_note-CastriconeFebruary18-22
[23]https://en.wikipedia.org/wiki/Encryption#cite_note-BekProtect16-23
Digital rights managementhttps://en.wikipedia.org/wiki/Digital_rights_management
reverse engineeringhttps://en.wikipedia.org/wiki/Reverse_engineering
copy protectionhttps://en.wikipedia.org/wiki/Copy_protection
[24]https://en.wikipedia.org/wiki/Encryption#cite_note-24
networkshttps://en.wikipedia.org/wiki/Computer_network
e-commercehttps://en.wikipedia.org/wiki/E-commerce
mobile telephoneshttps://en.wikipedia.org/wiki/Mobile_telephone
wireless microphoneshttps://en.wikipedia.org/wiki/Wireless_microphone
wireless intercomhttps://en.wikipedia.org/wiki/Wireless_intercom
Bluetoothhttps://en.wikipedia.org/wiki/Bluetooth
automatic teller machineshttps://en.wikipedia.org/wiki/Automatic_teller_machine
[25]https://en.wikipedia.org/wiki/Encryption#cite_note-25
eavesdroppinghttps://en.wikipedia.org/wiki/Eavesdropping
[26]https://en.wikipedia.org/wiki/Encryption#cite_note-26
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=8
Data erasurehttps://en.wikipedia.org/wiki/Data_erasure
crypto-shreddinghttps://en.wikipedia.org/wiki/Crypto-shredding
iOShttps://en.wikipedia.org/wiki/IOS
effaceablehttps://en.wiktionary.org/wiki/efface
[27]https://en.wikipedia.org/wiki/Encryption#cite_note-27
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=9
[28]https://en.wikipedia.org/wiki/Encryption#cite_note-28
DEShttps://en.wikipedia.org/wiki/Data_Encryption_Standard
brute force attackshttps://en.wikipedia.org/wiki/Brute-force_attack
[29]https://en.wikipedia.org/wiki/Encryption#cite_note-29
Quantum computinghttps://en.wikipedia.org/wiki/Quantum_computing
quantum mechanicshttps://en.wikipedia.org/wiki/Quantum_mechanics
[30]https://en.wikipedia.org/wiki/Encryption#cite_note-30
semiprime numberhttps://en.wikipedia.org/wiki/Semiprime_number
[31]https://en.wikipedia.org/wiki/Encryption#cite_note-31
quantum algorithmshttps://en.wikipedia.org/wiki/Quantum_algorithm
[32]https://en.wikipedia.org/wiki/Encryption#cite_note-32
elliptic curve cryptographyhttps://en.wikipedia.org/wiki/Elliptic-curve_cryptography
citation neededhttps://en.wikipedia.org/wiki/Wikipedia:Citation_needed
[33]https://en.wikipedia.org/wiki/Encryption#cite_note-:3-33
National Security Agencyhttps://en.wikipedia.org/wiki/National_Security_Agency
[34]https://en.wikipedia.org/wiki/Encryption#cite_note-34
[33]https://en.wikipedia.org/wiki/Encryption#cite_note-:3-33
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=10
securityhttps://en.wikipedia.org/wiki/Information_security
privacyhttps://en.wikipedia.org/wiki/Information_privacy
cloudhttps://en.wikipedia.org/wiki/Cloud_computing
Homomorphic encryptionhttps://en.wikipedia.org/wiki/Homomorphic_encryption
secure multi-party computationhttps://en.wikipedia.org/wiki/Secure_multi-party_computation
Turing completehttps://en.wikipedia.org/wiki/Turing_completeness
[35]https://en.wikipedia.org/wiki/Encryption#cite_note-35
stolen ciphertext attackshttps://en.wikipedia.org/wiki/Ciphertext_stealing
[36]https://en.wikipedia.org/wiki/Encryption#cite_note-36
[37]https://en.wikipedia.org/wiki/Encryption#cite_note-37
insider attackshttps://en.wikipedia.org/wiki/Insider_threat
[38]https://en.wikipedia.org/wiki/Encryption#cite_note-38
ransomwarehttps://en.wikipedia.org/wiki/Ransomware
[39]https://en.wikipedia.org/wiki/Encryption#cite_note-39
active defensehttps://en.wikipedia.org/wiki/Active_Defense
[40]https://en.wikipedia.org/wiki/Encryption#cite_note-40
[41]https://en.wikipedia.org/wiki/Encryption#cite_note-41
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=11
right to privacyhttps://en.wikipedia.org/wiki/Right_to_privacy
[42]https://en.wikipedia.org/wiki/Encryption#cite_note-42
Big Techhttps://en.wikipedia.org/wiki/Big_Tech
Applehttps://en.wikipedia.org/wiki/Apple_Inc.
Googlehttps://en.wikipedia.org/wiki/Google
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=12
message authentication codehttps://en.wikipedia.org/wiki/Message_authentication_code
digital signaturehttps://en.wikipedia.org/wiki/Digital_signature
hashing algorithmhttps://en.wikipedia.org/wiki/Hash_function
PGP signaturehttps://en.wikipedia.org/wiki/Pretty_Good_Privacy
Authenticated encryptionhttps://en.wikipedia.org/wiki/Authenticated_encryption
cryptographic softwarehttps://en.wikipedia.org/wiki/Cryptographic_software
hardware to perform encryptionhttps://en.wikipedia.org/wiki/Hardware_encryption
traffic analysishttps://en.wikipedia.org/wiki/Traffic_analysis
TEMPESThttps://en.wikipedia.org/wiki/Tempest_(codename)
Trojan horsehttps://en.wikipedia.org/wiki/Trojan_horse_(computing)
[43]https://en.wikipedia.org/wiki/Encryption#cite_note-43
MACshttps://en.wikipedia.org/wiki/Message_authentication_code
digital signatureshttps://en.wikipedia.org/wiki/Digital_signature
end-to-endhttps://en.wikipedia.org/wiki/End-to-end_principle
keyshttps://en.wikipedia.org/wiki/Key_(cryptography)
root certificatehttps://en.wikipedia.org/wiki/Root_certificate
man-in-the-middle attackhttps://en.wikipedia.org/wiki/Man-in-the-middle_attack
TLS interceptionhttps://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_interception
[44]https://en.wikipedia.org/wiki/Encryption#cite_note-44
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=13
Padding (cryptography)https://en.wikipedia.org/wiki/Padding_(cryptography)
metadatahttps://en.wikipedia.org/wiki/Metadata
CRIMEhttps://en.wikipedia.org/wiki/CRIME
BREACHhttps://en.wikipedia.org/wiki/BREACH
HTTPShttps://en.wikipedia.org/wiki/HTTPS
side-channel attackhttps://en.wikipedia.org/wiki/Side-channel_attack
[45]https://en.wikipedia.org/wiki/Encryption#cite_note-45
Traffic analysishttps://en.wikipedia.org/wiki/Traffic_analysis
paddinghttps://en.wikipedia.org/wiki/Padding_(cryptography)
bandwidth overheadhttps://en.wikipedia.org/wiki/Overhead_(computing)
randomlyhttps://en.wikipedia.org/wiki/Padding_(cryptography)#Randomized_padding
deterministicallyhttps://en.wikipedia.org/wiki/Padding_(cryptography)#Deterministic_padding
padded uniform random blobs (PURBs)https://en.wikipedia.org/wiki/PURB_(cryptography)
metadatahttps://en.wikipedia.org/wiki/Metadata
informationhttps://en.wikipedia.org/wiki/Entropy_(information_theory)
[46]https://en.wikipedia.org/wiki/Encryption#cite_note-46
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=14
Cryptosystemhttps://en.wikipedia.org/wiki/Cryptosystem
Cold boot attackhttps://en.wikipedia.org/wiki/Cold_boot_attack
Cryptographic primitivehttps://en.wikipedia.org/wiki/Cryptographic_primitive
Cryptography standardshttps://en.wikipedia.org/wiki/Cryptography_standards
Cyberspace Electronic Security Acthttps://en.wikipedia.org/wiki/Cyberspace_Electronic_Security_Act
Dictionary attackhttps://en.wikipedia.org/wiki/Dictionary_attack
Disk encryptionhttps://en.wikipedia.org/wiki/Disk_encryption
Encrypted functionhttps://en.wikipedia.org/wiki/Encrypted_function
Enigma machinehttps://en.wikipedia.org/wiki/Enigma_machine
Export of cryptographyhttps://en.wikipedia.org/wiki/Export_of_cryptography
Geo-blockinghttps://en.wikipedia.org/wiki/Geo-blocking
Indistinguishability obfuscationhttps://en.wikipedia.org/wiki/Indistinguishability_obfuscation
Key managementhttps://en.wikipedia.org/wiki/Key_management
Multiple encryptionhttps://en.wikipedia.org/wiki/Multiple_encryption
Physical Layer Encryptionhttps://en.wikipedia.org/wiki/Information-theoretic_security#Physical_layer_encryption
Pretty Good Privacyhttps://en.wikipedia.org/wiki/Pretty_Good_Privacy
Post-quantum cryptographyhttps://en.wikipedia.org/wiki/Post-quantum_cryptography
Rainbow tablehttps://en.wikipedia.org/wiki/Rainbow_table
Rotor machinehttps://en.wikipedia.org/wiki/Rotor_machine
Side-channel attackhttps://en.wikipedia.org/wiki/Side-channel_attack
Substitution cipherhttps://en.wikipedia.org/wiki/Substitution_cipher
Television encryptionhttps://en.wikipedia.org/wiki/Television_encryption
Tokenization (data security)https://en.wikipedia.org/wiki/Tokenization_(data_security)
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=15
ahttps://en.wikipedia.org/wiki/Encryption#cite_ref-:1_1-0
bhttps://en.wikipedia.org/wiki/Encryption#cite_ref-:1_1-1
chttps://en.wikipedia.org/wiki/Encryption#cite_ref-:1_1-2
dhttps://en.wikipedia.org/wiki/Encryption#cite_ref-:1_1-3
ehttps://en.wikipedia.org/wiki/Encryption#cite_ref-:1_1-4
"An Overview of Cryptography"https://www.garykessler.net/library/crypto.html
ahttps://en.wikipedia.org/wiki/Encryption#cite_ref-:5_2-0
bhttps://en.wikipedia.org/wiki/Encryption#cite_ref-:5_2-1
Passwords: Philology, Security, Authenticationhttps://books.google.com/books?id=jbpTDwAAQBAJ&pg=PT26
Harvard University Presshttps://en.wikipedia.org/wiki/Harvard_University_Press
ISBNhttps://en.wikipedia.org/wiki/ISBN_(identifier)
9780674985377https://en.wikipedia.org/wiki/Special:BookSources/9780674985377
ahttps://en.wikipedia.org/wiki/Encryption#cite_ref-:4_3-0
bhttps://en.wikipedia.org/wiki/Encryption#cite_ref-:4_3-1
"History of Cryptography"https://web.archive.org/web/20200426075650/https://www.binance.vision/security/history-of-cryptography
the originalhttps://www.binance.vision/security/history-of-cryptography
^https://en.wikipedia.org/wiki/Encryption#cite_ref-4
"Caesar Cipher in Cryptography"https://www.geeksforgeeks.org/caesar-cipher-in-cryptography/
^https://en.wikipedia.org/wiki/Encryption#cite_ref-5
"Wheel Cipher"https://www.monticello.org/site/research-and-collections/wheel-cipher
^https://en.wikipedia.org/wiki/Encryption#cite_ref-6
"M-94"https://www.cryptomuseum.com/crypto/usa/m94/index.htm
^https://en.wikipedia.org/wiki/Encryption#cite_ref-7
"How did the Enigma machine work?"https://www.theguardian.com/technology/2014/nov/14/how-did-enigma-machine-work-imitation-game
^https://en.wikipedia.org/wiki/Encryption#cite_ref-8
"The Evolution of Encryption"https://www.wired.com/insights/2013/05/the-evolution-of-encryption/
^https://en.wikipedia.org/wiki/Encryption#cite_ref-:0_9-0
doihttps://en.wikipedia.org/wiki/Doi_(identifier)
10.1016/B978-0-12-802324-2.00011-7https://doi.org/10.1016%2FB978-0-12-802324-2.00011-7
ISBNhttps://en.wikipedia.org/wiki/ISBN_(identifier)
978-0-12-802324-2https://en.wikipedia.org/wiki/Special:BookSources/978-0-12-802324-2
^https://en.wikipedia.org/wiki/Encryption#cite_ref-:2_10-0
"Classification of Cryptographic Keys"https://www.cryptomathic.com/news-events/blog/classification-of-cryptographic-keys-functions-and-properties
^https://en.wikipedia.org/wiki/Encryption#cite_ref-11
"Chapter 3. Modular Arithmetic"https://web.archive.org/web/20211011110748/https://www.doc.ic.ac.uk/~mrh/330tutor/ch03.html
the originalhttps://www.doc.ic.ac.uk/~mrh/330tutor/ch03.html
^https://en.wikipedia.org/wiki/Encryption#cite_ref-12
"Symmetric-key encryption software"https://web.archive.org/web/20220310103427/http://iaktueller.de/Collatz.py
the originalhttps://iaktueller.de/Collatz.py
^https://en.wikipedia.org/wiki/Encryption#cite_ref-13
^https://en.wikipedia.org/wiki/Encryption#cite_ref-14
"Public-Key Encryption – how GCHQ got there first!"https://web.archive.org/web/20100519084635/https://www.gchq.gov.uk/history/pke.html
the originalhttps://www.gchq.gov.uk/history/pke.html
^https://en.wikipedia.org/wiki/Encryption#cite_ref-Goldreich_15-0
Goldreich, Oded.https://en.wikipedia.org/wiki/Oded_Goldreich
^https://en.wikipedia.org/wiki/Encryption#cite_ref-16
Bibcodehttps://en.wikipedia.org/wiki/Bibcode_(identifier)
1976ITIT...22..644Dhttps://ui.adsabs.harvard.edu/abs/1976ITIT...22..644D
doihttps://en.wikipedia.org/wiki/Doi_(identifier)
10.1109/TIT.1976.1055638https://doi.org/10.1109%2FTIT.1976.1055638
^https://en.wikipedia.org/wiki/Encryption#cite_ref-17
"The RSA Algorithm: A Mathematical History of the Ubiquitous Cryptological Algorithm"https://web.archive.org/web/20220331215424/https://www.sccs.swarthmore.edu/users/10/mkelly1/rsa.pdf
the originalhttps://www.sccs.swarthmore.edu/users/10/mkelly1/rsa.pdf
^https://en.wikipedia.org/wiki/Encryption#cite_ref-18
"Short Message Service Encoding Using the Rivest-Shamir-Adleman Algorithm"https://doi.org/10.15575%2Fjoin.v4i1.264
doihttps://en.wikipedia.org/wiki/Doi_(identifier)
10.15575/join.v4i1.264https://doi.org/10.15575%2Fjoin.v4i1.264
^https://en.wikipedia.org/wiki/Encryption#cite_ref-19
"Symantec buys encryption specialist PGP for $300M"https://web.archive.org/web/20200131201636/https://www.computerworld.com/article/2517739/symantec-buys-encryption-specialist-pgp-for--300m.html
the originalhttps://www.computerworld.com/article/2517739/symantec-buys-encryption-specialist-pgp-for--300m.html
^https://en.wikipedia.org/wiki/Encryption#cite_ref-20
i.cmpnet.comhttps://i.cmpnet.com/v2.gocsi.com/pdf/CSIsurvey2008.pdf
^https://en.wikipedia.org/wiki/Encryption#cite_ref-KeaneWhyStolen16_21-0
"Why stolen laptops still cause data breaches, and what's being done to stop them"https://www.pcworld.com/article/3021316/security/why-stolen-laptops-still-cause-data-breaches-and-whats-being-done-to-stop-them.html
^https://en.wikipedia.org/wiki/Encryption#cite_ref-CastriconeFebruary18_22-0
"Health Care Group News: $3.5 M OCR Settlement for Five Breaches Affecting Fewer Than 500 Patients Each"https://www.natlawreview.com/article/february-2-2018-health-care-group-news-35-m-ocr-settlement-five-breaches-affecting
^https://en.wikipedia.org/wiki/Encryption#cite_ref-BekProtect16_23-0
"Protect Your Company from Theft: Self Encrypting Drives"https://blog.westerndigital.com/protect-your-company-from-theft-self-encrypting-drives/
^https://en.wikipedia.org/wiki/Encryption#cite_ref-24
"DRM"https://www.eff.org/issues/drm
^https://en.wikipedia.org/wiki/Encryption#cite_ref-25
^https://en.wikipedia.org/wiki/Encryption#cite_ref-26
"Data Encryption in Transit Guideline"https://security.berkeley.edu/data-encryption-transit-guideline
Archivedhttps://web.archive.org/web/20231205085812/https://security.berkeley.edu/data-encryption-transit-guideline
^https://en.wikipedia.org/wiki/Encryption#cite_ref-27
"Welcome"https://support.apple.com/guide/security/welcome/web
^https://en.wikipedia.org/wiki/Encryption#cite_ref-28
doihttps://en.wikipedia.org/wiki/Doi_(identifier)
10.29322/IJSRP.8.7.2018.p7978https://doi.org/10.29322%2FIJSRP.8.7.2018.p7978
^https://en.wikipedia.org/wiki/Encryption#cite_ref-29
"Encryption methods: An overview"https://www.ionos.com/digitalguide/server/security/encryption-methods-an-overview/
^https://en.wikipedia.org/wiki/Encryption#cite_ref-30
"Quantum computers vastly outperform supercomputers when it comes to energy efficiency"https://physicsworld.com/a/quantum-computers-vastly-outperform-supercomputers-when-it-comes-to-energy-efficiency/
^https://en.wikipedia.org/wiki/Encryption#cite_ref-31
"How Shor's Algorithm Breaks RSA: A Quantum Computing Guide | SpinQ"https://www.spinquanta.com/news-detail/shors-algorithm
^https://en.wikipedia.org/wiki/Encryption#cite_ref-32
doihttps://en.wikipedia.org/wiki/Doi_(identifier)
10.1080/23335777.2020.1811384https://doi.org/10.1080%2F23335777.2020.1811384
S2CIDhttps://en.wikipedia.org/wiki/S2CID_(identifier)
225312133https://api.semanticscholar.org/CorpusID:225312133
ahttps://en.wikipedia.org/wiki/Encryption#cite_ref-:3_33-0
bhttps://en.wikipedia.org/wiki/Encryption#cite_ref-:3_33-1
"The Potential of Quantum Computing and Machine Learning to Advance Clinical Research and Change the Practice of Medicine"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6205278
PMChttps://en.wikipedia.org/wiki/PMC_(identifier)
6205278https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6205278
PMIDhttps://en.wikipedia.org/wiki/PMID_(identifier)
30385997https://pubmed.ncbi.nlm.nih.gov/30385997
^https://en.wikipedia.org/wiki/Encryption#cite_ref-34
"Post-Quantum Cybersecurity Resources"https://web.archive.org/web/20210118015943/https://www.nsa.gov/what-we-do/cybersecurity/post-quantum-cybersecurity-resources/
the originalhttps://www.nsa.gov/what-we-do/cybersecurity/post-quantum-cybersecurity-resources/
^https://en.wikipedia.org/wiki/Encryption#cite_ref-35
"Horus: Fine-Grained Encryption-Based Security for Large-Scale Storage"https://web.archive.org/web/20220215072921/https://www.ssrc.ucsc.edu/Papers/li-fast13.pdf
the originalhttps://www.ssrc.ucsc.edu/Papers/li-fast13.pdf
^https://en.wikipedia.org/wiki/Encryption#cite_ref-36
"The Padding Oracle Attack – why crypto is terrifying"https://robertheaton.com/2013/07/29/padding-oracle-attack/
^https://en.wikipedia.org/wiki/Encryption#cite_ref-37
"Researchers crack open unusually advanced malware that hid for 5 years"https://arstechnica.com/security/2016/08/researchers-crack-open-unusually-advanced-malware-that-hid-for-5-years/
^https://en.wikipedia.org/wiki/Encryption#cite_ref-38
"New cloud attack takes full control of virtual machines with little effort"https://arstechnica.com/security/2016/08/new-attack-steals-private-crypto-keys-by-corrupting-data-in-computer-memory/
^https://en.wikipedia.org/wiki/Encryption#cite_ref-39
Tahoe-LAFShttps://en.wikipedia.org/wiki/Tahoe-LAFS
Storjhttps://storj.io/index.html
^https://en.wikipedia.org/wiki/Encryption#cite_ref-40
"Moving Target Defense (MTD) – NIST CSRC Glossary"https://csrc.nist.gov/glossary/term/moving_target_defense
^https://en.wikipedia.org/wiki/Encryption#cite_ref-41
CryptoMovehttps://www.cryptomove.com
Archivedhttps://web.archive.org/web/20210206131311/https://www.cryptomove.com/
Wayback Machinehttps://en.wikipedia.org/wiki/Wayback_Machine
^https://en.wikipedia.org/wiki/Encryption#cite_ref-42
"The Modern Encryption Debate: What's at Stake?"https://circleid.com/posts/20221102-the-modern-encryption-debate-whats-at-stake
^https://en.wikipedia.org/wiki/Encryption#cite_ref-43
"What is a Trojan Virus – Malware Protection – Kaspersky Lab US"https://usa.kaspersky.com/internet-security-center/threats/trojans#.VV3oaWDTvfY
^https://en.wikipedia.org/wiki/Encryption#cite_ref-44
"Kazakhstan Begins Intercepting HTTPS Internet Traffic Of All Citizens Forcefully"https://thehackernews.com/2019/07/kazakhstan-https-security-certificate.html
^https://en.wikipedia.org/wiki/Encryption#cite_ref-45
Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)https://tools.ietf.org/html/rfc7457
^https://en.wikipedia.org/wiki/Encryption#cite_ref-46
"Reducing Metadata Leakage from Encrypted Files and Communication with PURBs"https://petsymposium.org/2019/files/papers/issue4/popets-2019-0056.pdf
arXivhttps://en.wikipedia.org/wiki/ArXiv_(identifier)
1806.03160https://arxiv.org/abs/1806.03160
doihttps://en.wikipedia.org/wiki/Doi_(identifier)
10.2478/popets-2019-0056https://doi.org/10.2478%2Fpopets-2019-0056
S2CIDhttps://en.wikipedia.org/wiki/S2CID_(identifier)
47011059https://api.semanticscholar.org/CorpusID:47011059
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=16
Fouché Gaines, Helenhttps://en.wikipedia.org/wiki/Helen_Fouch%C3%A9_Gaines
Cryptanalysis: A Study of Ciphers and Their Solutionhttps://archive.org/details/cryptanalysis00hele
ISBNhttps://en.wikipedia.org/wiki/ISBN_(identifier)
978-0486200972https://en.wikipedia.org/wiki/Special:BookSources/978-0486200972
citationhttps://en.wikipedia.org/wiki/Template:Citation
helphttps://en.wikipedia.org/wiki/Help:CS1_errors#invalid_isbn_date
Kahn, Davidhttps://en.wikipedia.org/wiki/David_Kahn_(writer)
ISBNhttps://en.wikipedia.org/wiki/ISBN_(identifier)
0-684-83130-9https://en.wikipedia.org/wiki/Special:BookSources/0-684-83130-9
Preneel, Barthttps://en.wikipedia.org/wiki/Bart_Preneel
ISBNhttps://en.wikipedia.org/wiki/ISBN_(identifier)
978-3-540-67517-4https://en.wikipedia.org/wiki/Special:BookSources/978-3-540-67517-4
Sinkov, Abrahamhttps://en.wikipedia.org/wiki/Abraham_Sinkov
ISBNhttps://en.wikipedia.org/wiki/ISBN_(identifier)
0-88385-622-0https://en.wikipedia.org/wiki/Special:BookSources/0-88385-622-0
ISBNhttps://en.wikipedia.org/wiki/ISBN_(identifier)
978-3-755-76117-4https://en.wikipedia.org/wiki/Special:BookSources/978-3-755-76117-4
ISBNhttps://en.wikipedia.org/wiki/ISBN_(identifier)
978-1466570269https://en.wikipedia.org/wiki/Special:BookSources/978-1466570269
Concealing for Freedom: The Making of Encryption, Secure Messaging and Digital Liberties (Foreword by Laura DeNardis)(open access)https://web.archive.org/web/20220602103410/https://www.matteringpress.org/wp-content/uploads/2022/05/Concealing-for-Freedom-ePDF.pdf
ISBNhttps://en.wikipedia.org/wiki/ISBN_(identifier)
978-1-912729-22-7https://en.wikipedia.org/wiki/Special:BookSources/978-1-912729-22-7
the originalhttps://www.matteringpress.org/wp-content/uploads/2022/05/Concealing-for-Freedom-ePDF.pdf
edithttps://en.wikipedia.org/w/index.php?title=Encryption&action=edit§ion=17
https://en.wikipedia.org/wiki/File:Wiktionary-logo-en-v2.svg
encryptionhttps://en.wiktionary.org/wiki/encryption
https://en.wikipedia.org/wiki/File:Commons-logo.svg
Cryptographic algorithmshttps://commons.wikimedia.org/wiki/Category:Cryptographic_algorithms
vhttps://en.wikipedia.org/wiki/Template:Cryptography_navbox
thttps://en.wikipedia.org/wiki/Template_talk:Cryptography_navbox
ehttps://en.wikipedia.org/wiki/Special:EditPage/Template:Cryptography_navbox
Cryptographyhttps://en.wikipedia.org/wiki/Cryptography
History of cryptographyhttps://en.wikipedia.org/wiki/History_of_cryptography
Outline of cryptographyhttps://en.wikipedia.org/wiki/Outline_of_cryptography
Classical cipherhttps://en.wikipedia.org/wiki/Classical_cipher
Cryptographic protocolhttps://en.wikipedia.org/wiki/Cryptographic_protocol
Authentication protocolhttps://en.wikipedia.org/wiki/Authentication_protocol
Cryptographic primitivehttps://en.wikipedia.org/wiki/Cryptographic_primitive
Cryptanalysishttps://en.wikipedia.org/wiki/Cryptanalysis
Cryptocurrencyhttps://en.wikipedia.org/wiki/Cryptocurrency
Cryptosystemhttps://en.wikipedia.org/wiki/Cryptosystem
Cryptographic noncehttps://en.wikipedia.org/wiki/Cryptographic_nonce
Cryptovirologyhttps://en.wikipedia.org/wiki/Cryptovirology
Hash functionhttps://en.wikipedia.org/wiki/Hash_function
Cryptographic hash functionhttps://en.wikipedia.org/wiki/Cryptographic_hash_function
Key derivation functionhttps://en.wikipedia.org/wiki/Key_derivation_function
Secure Hash Algorithmshttps://en.wikipedia.org/wiki/Secure_Hash_Algorithms
Digital signaturehttps://en.wikipedia.org/wiki/Digital_signature
Kleptographyhttps://en.wikipedia.org/wiki/Kleptography
Key (cryptography)https://en.wikipedia.org/wiki/Key_(cryptography)
Key exchangehttps://en.wikipedia.org/wiki/Key_exchange
Key generatorhttps://en.wikipedia.org/wiki/Key_generator
Key schedulehttps://en.wikipedia.org/wiki/Key_schedule
Key stretchinghttps://en.wikipedia.org/wiki/Key_stretching
Keygenhttps://en.wikipedia.org/wiki/Keygen
Machineshttps://en.wikipedia.org/wiki/Template:Cryptography_machines
Ransomwarehttps://en.wikipedia.org/wiki/Ransomware
Random number generationhttps://en.wikipedia.org/wiki/Random_number_generation
Cryptographically secure pseudorandom number generatorhttps://en.wikipedia.org/wiki/Cryptographically_secure_pseudorandom_number_generator
Pseudorandom noisehttps://en.wikipedia.org/wiki/Pseudorandom_noise
Secure channelhttps://en.wikipedia.org/wiki/Secure_channel
Insecure channelhttps://en.wikipedia.org/wiki/Insecure_channel
Subliminal channelhttps://en.wikipedia.org/wiki/Subliminal_channel
Decryptionhttps://en.wikipedia.org/wiki/Decryption
End-to-end encryptionhttps://en.wikipedia.org/wiki/End-to-end_encryption
Harvest now, decrypt laterhttps://en.wikipedia.org/wiki/Harvest_now,_decrypt_later
Information-theoretic securityhttps://en.wikipedia.org/wiki/Information-theoretic_security
Plaintexthttps://en.wikipedia.org/wiki/Plaintext
Codetexthttps://en.wikipedia.org/wiki/Codetext
Ciphertexthttps://en.wikipedia.org/wiki/Ciphertext
Shared secrethttps://en.wikipedia.org/wiki/Shared_secret
Trapdoor functionhttps://en.wikipedia.org/wiki/Trapdoor_function
Trusted timestampinghttps://en.wikipedia.org/wiki/Trusted_timestamping
Key-based routinghttps://en.wikipedia.org/wiki/Key-based_routing
Onion routinghttps://en.wikipedia.org/wiki/Onion_routing
Garlic routinghttps://en.wikipedia.org/wiki/Garlic_routing
Kademliahttps://en.wikipedia.org/wiki/Kademlia
Mix networkhttps://en.wikipedia.org/wiki/Mix_network
Cryptographic hash functionhttps://en.wikipedia.org/wiki/Cryptographic_hash_function
Block cipherhttps://en.wikipedia.org/wiki/Block_cipher
Stream cipherhttps://en.wikipedia.org/wiki/Stream_cipher
Symmetric-key algorithmhttps://en.wikipedia.org/wiki/Symmetric-key_algorithm
Authenticated encryptionhttps://en.wikipedia.org/wiki/Authenticated_encryption
Public-key cryptographyhttps://en.wikipedia.org/wiki/Public-key_cryptography
Quantum key distributionhttps://en.wikipedia.org/wiki/Quantum_key_distribution
Quantum cryptographyhttps://en.wikipedia.org/wiki/Quantum_cryptography
Post-quantum cryptographyhttps://en.wikipedia.org/wiki/Post-quantum_cryptography
Message authentication codehttps://en.wikipedia.org/wiki/Message_authentication_code
Random numbershttps://en.wikipedia.org/wiki/Cryptographically_secure_pseudorandom_number_generator
Steganographyhttps://en.wikipedia.org/wiki/Steganography
Categoryhttps://en.wikipedia.org/wiki/Category:Cryptography
vhttps://en.wikipedia.org/wiki/Template:Information_security
thttps://en.wikipedia.org/wiki/Template_talk:Information_security
ehttps://en.wikipedia.org/wiki/Special:EditPage/Template:Information_security
Information securityhttps://en.wikipedia.org/wiki/Information_security
Threatshttps://en.wikipedia.org/wiki/Threat_(computer)
Adwarehttps://en.wikipedia.org/wiki/Adware
Advanced persistent threathttps://en.wikipedia.org/wiki/Advanced_persistent_threat
Arbitrary code executionhttps://en.wikipedia.org/wiki/Arbitrary_code_execution
Backdoorshttps://en.wikipedia.org/wiki/Backdoor_(computing)
Forkhttps://en.wikipedia.org/wiki/Fork_bomb
Logichttps://en.wikipedia.org/wiki/Logic_bomb
Timehttps://en.wikipedia.org/wiki/Time_bomb_(software)
Ziphttps://en.wikipedia.org/wiki/Zip_bomb
Hardware backdoorshttps://en.wikipedia.org/wiki/Hardware_backdoor
Code injectionhttps://en.wikipedia.org/wiki/Code_injection
Crimewarehttps://en.wikipedia.org/wiki/Crimeware
Cross-site scriptinghttps://en.wikipedia.org/wiki/Cross-site_scripting
Cross-site leakshttps://en.wikipedia.org/wiki/Cross-site_leaks
DOM clobberinghttps://en.wikipedia.org/wiki/DOM_clobbering
History sniffinghttps://en.wikipedia.org/wiki/History_sniffing
Cryptojackinghttps://en.wikipedia.org/wiki/Cryptojacking
Botnetshttps://en.wikipedia.org/wiki/Botnet
Data breachhttps://en.wikipedia.org/wiki/Data_breach
Drive-by downloadhttps://en.wikipedia.org/wiki/Drive-by_download
Browser Helper Objectshttps://en.wikipedia.org/wiki/Browser_Helper_Object
Viruseshttps://en.wikipedia.org/wiki/Computer_virus
Data scrapinghttps://en.wikipedia.org/wiki/Data_scraping
Denial-of-service attackhttps://en.wikipedia.org/wiki/Denial-of-service_attack
Eavesdroppinghttps://en.wikipedia.org/wiki/Eavesdropping
Email fraudhttps://en.wikipedia.org/wiki/Email_fraud
Email spoofinghttps://en.wikipedia.org/wiki/Email_spoofing
Exploitshttps://en.wikipedia.org/wiki/Exploit_(computer_security)
Fraudulent dialershttps://en.wikipedia.org/wiki/Dialer#Fraudulent_dialer
Hacktivismhttps://en.wikipedia.org/wiki/Hacktivism
Infostealerhttps://en.wikipedia.org/wiki/Infostealer
Insecure direct object referencehttps://en.wikipedia.org/wiki/Insecure_direct_object_reference
Keystroke loggershttps://en.wikipedia.org/wiki/Keystroke_logging
Malwarehttps://en.wikipedia.org/wiki/Malware
Payloadhttps://en.wikipedia.org/wiki/Payload_(computing)
Phishinghttps://en.wikipedia.org/wiki/Phishing
Voicehttps://en.wikipedia.org/wiki/Voice_phishing
Polymorphic enginehttps://en.wikipedia.org/wiki/Polymorphic_engine
Privilege escalationhttps://en.wikipedia.org/wiki/Privilege_escalation
Ransomwarehttps://en.wikipedia.org/wiki/Ransomware
Rootkitshttps://en.wikipedia.org/wiki/Rootkit
Scarewarehttps://en.wikipedia.org/wiki/Scareware
Shellcodehttps://en.wikipedia.org/wiki/Shellcode
Spamminghttps://en.wikipedia.org/wiki/Spamming
Social engineeringhttps://en.wikipedia.org/wiki/Social_engineering_(security)
Spywarehttps://en.wikipedia.org/wiki/Spyware
Software bugshttps://en.wikipedia.org/wiki/Software_bug
Trojan horseshttps://en.wikipedia.org/wiki/Trojan_horse_(computing)
Hardware Trojanshttps://en.wikipedia.org/wiki/Hardware_Trojan
Remote access trojanshttps://en.wikipedia.org/wiki/Remote_access_trojan
Vulnerabilityhttps://en.wikipedia.org/wiki/Vulnerability_(computer_security)
Web shellshttps://en.wikipedia.org/wiki/Web_shell
Wiperhttps://en.wikipedia.org/wiki/Wiper_(malware)
Wormshttps://en.wikipedia.org/wiki/Computer_worm
SQL injectionhttps://en.wikipedia.org/wiki/SQL_injection
Rogue security softwarehttps://en.wikipedia.org/wiki/Rogue_security_software
Zombiehttps://en.wikipedia.org/wiki/Zombie_(computing)
https://en.wikipedia.org/wiki/File:CIAJMK1209-en.svg
Application securityhttps://en.wikipedia.org/wiki/Application_security
Secure codinghttps://en.wikipedia.org/wiki/Secure_coding
Secure by designhttps://en.wikipedia.org/wiki/Secure_by_design
Misuse casehttps://en.wikipedia.org/wiki/Misuse_case
Computer access controlhttps://en.wikipedia.org/wiki/Computer_access_control
Authenticationhttps://en.wikipedia.org/wiki/Authentication
Multi-factor authenticationhttps://en.wikipedia.org/wiki/Multi-factor_authentication
Authorizationhttps://en.wikipedia.org/wiki/Authorization
Computer security softwarehttps://en.wikipedia.org/wiki/Computer_security_software
Antivirus softwarehttps://en.wikipedia.org/wiki/Antivirus_software
Security-focused operating systemhttps://en.wikipedia.org/wiki/Security-focused_operating_system
Data-centric securityhttps://en.wikipedia.org/wiki/Data-centric_security
Software obfuscationhttps://en.wikipedia.org/wiki/Obfuscation_(software)
Data maskinghttps://en.wikipedia.org/wiki/Data_masking
Firewallhttps://en.wikipedia.org/wiki/Firewall_(computing)
Intrusion detection systemhttps://en.wikipedia.org/wiki/Intrusion_detection_system
Host-based intrusion detection systemhttps://en.wikipedia.org/wiki/Host-based_intrusion_detection_system
Anomaly detectionhttps://en.wikipedia.org/wiki/Anomaly_detection
Information security managementhttps://en.wikipedia.org/wiki/Information_security_management
Information risk managementhttps://en.wikipedia.org/wiki/Information_risk_management
Security information and event managementhttps://en.wikipedia.org/wiki/Security_information_and_event_management
Runtime application self-protectionhttps://en.wikipedia.org/wiki/Runtime_application_self-protection
Site isolationhttps://en.wikipedia.org/wiki/Site_isolation
Computer securityhttps://en.wikipedia.org/wiki/Computer_security
Automotive securityhttps://en.wikipedia.org/wiki/Automotive_security
Cybercrimehttps://en.wikipedia.org/wiki/Cybercrime
Cybersex traffickinghttps://en.wikipedia.org/wiki/Cybersex_trafficking
Computer fraudhttps://en.wikipedia.org/wiki/Computer_fraud
Cybergeddonhttps://en.wikipedia.org/wiki/Cybergeddon
Cyberterrorismhttps://en.wikipedia.org/wiki/Cyberterrorism
Cyberwarfarehttps://en.wikipedia.org/wiki/Cyberwarfare
Electronic warfarehttps://en.wikipedia.org/wiki/Electronic_warfare
Information warfarehttps://en.wikipedia.org/wiki/Information_warfare
Internet securityhttps://en.wikipedia.org/wiki/Internet_security
Mobile securityhttps://en.wikipedia.org/wiki/Mobile_security
Network securityhttps://en.wikipedia.org/wiki/Network_security
Copy protectionhttps://en.wikipedia.org/wiki/Copy_protection
Digital rights managementhttps://en.wikipedia.org/wiki/Digital_rights_management
Authority control databaseshttps://en.wikipedia.org/wiki/Help:Authority_control
https://www.wikidata.org/wiki/Q141090#identifiers
GNDhttps://d-nb.info/gnd/4352893-4
United Stateshttps://id.loc.gov/authorities/sh94001524
Francehttps://catalogue.bnf.fr/ark:/12148/cb12467539g
BnF datahttps://data.bnf.fr/ark:/12148/cb12467539g
Japanhttps://id.ndl.go.jp/auth/ndlna/00560252
Czech Republichttps://aleph.nkp.cz/F/?func=find-c&local_base=aut&ccl_term=ica=ph127801&CON_LNG=ENG
Israelhttps://www.nli.org.il/en/authorities/987007563687305171
Yale LUXhttps://lux.collections.yale.edu/view/concept/0cf6f18c-be87-4b70-93d4-915cb159cc84
https://en.wikipedia.org/w/index.php?title=Encryption&oldid=1332102725https://en.wikipedia.org/w/index.php?title=Encryption&oldid=1332102725
Categorieshttps://en.wikipedia.org/wiki/Help:Category
Cryptographyhttps://en.wikipedia.org/wiki/Category:Cryptography
Data protectionhttps://en.wikipedia.org/wiki/Category:Data_protection
Webarchive template wayback linkshttps://en.wikipedia.org/wiki/Category:Webarchive_template_wayback_links
Articles with short descriptionhttps://en.wikipedia.org/wiki/Category:Articles_with_short_description
Short description is different from Wikidatahttps://en.wikipedia.org/wiki/Category:Short_description_is_different_from_Wikidata
All articles with unsourced statementshttps://en.wikipedia.org/wiki/Category:All_articles_with_unsourced_statements
Articles with unsourced statements from July 2020https://en.wikipedia.org/wiki/Category:Articles_with_unsourced_statements_from_July_2020
CS1 errors: ISBN datehttps://en.wikipedia.org/wiki/Category:CS1_errors:_ISBN_date
Commons category link is on Wikidatahttps://en.wikipedia.org/wiki/Category:Commons_category_link_is_on_Wikidata
Creative Commons Attribution-ShareAlike 4.0 Licensehttps://en.wikipedia.org/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License
Terms of Usehttps://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use
Privacy Policyhttps://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy
Wikimedia Foundation, Inc.https://wikimediafoundation.org/
Privacy policyhttps://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy
About Wikipediahttps://en.wikipedia.org/wiki/Wikipedia:About
Disclaimershttps://en.wikipedia.org/wiki/Wikipedia:General_disclaimer
Contact Wikipediahttps://en.wikipedia.org/wiki/Wikipedia:Contact_us
Legal & safety contactshttps://foundation.wikimedia.org/wiki/Special:MyLanguage/Legal:Wikimedia_Foundation_Legal_and_Safety_Contact_Information
Code of Conducthttps://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct
Developershttps://developer.wikimedia.org
Statisticshttps://stats.wikimedia.org/#/en.wikipedia.org
Cookie statementhttps://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement
Mobile viewhttps://en.wikipedia.org/w/index.php?title=Encryption&mobileaction=toggle_view_mobile
https://www.wikimedia.org/
https://www.mediawiki.org/
https://en.wikipedia.org/wiki/Encryption
https://en.wikipedia.org/wiki/Encryption
https://en.wikipedia.org/wiki/Encryption
https://en.wikipedia.org/wiki/Encryption
https://en.wikipedia.org/wiki/Encryption
https://en.wikipedia.org/wiki/Encryption
https://en.wikipedia.org/wiki/Encryption
Add topic https://en.wikipedia.org/wiki/Encryption

Viewport: width=1120

Robots: max-image-preview:standard


URLs of crawlers that visited me.