Portal:Cryptography
Cryptography Portal
Cryptography (from Greek κρύπτω, "to hide, to conceal, to obscure", and γράφω, "to etch, to inscribe, to write down") is, traditionally, the study of means of converting information from its normal, comprehensible form into an incomprehensible format, rendering it unreadable without secret knowledge — the art of encryption. Cryptography is often used to replace or in combination with steganography. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, the field of cryptography has expanded its remit in two ways. Firstly, it provides mechanisms for more than just keeping secrets: schemes like digital signatures and digital cash, for example. Secondly, cryptography has come to be in widespread use by many civilians who do not have extraordinary needs for secrecy, although typically it is transparently built into the infrastructure for computing and telecommunications, and users are not aware of it.
Selected article
The Enigma machine was a portable cipher machine used to encrypt and decrypt secret messages. More precisely, Enigma was a family of related electro-mechanical rotor machines — there is a variety of different models.The Enigma was used commercially from the early 1920s on, and was also adopted by military and governmental services of a number of nations — most famously, by Nazi Germany before and during World War II. The German military model, the Wehrmacht Enigma, is the version most commonly discussed. Allied codebreakers were, in many cases, able to decrypt messages protected by the machine (see cryptanalysis of the Enigma). The intelligence gained through this source — codenamed Ultra — was a significant aid to the Allied war effort. Some historians have suggested that the end of the European war was hastened by up to a year or more because of the decryption of German ciphers.
Selected picture
Did you know...
...that the Pigpen cipher was used by the Freemasons for correspondence and record keeping?
...that Polish mathematician Marian Rejewski (pictured) deduced the wiring of the German Enigma machine in 1932 using theorems about permutations?
...that acoustic cryptanalysis is a type of attack that exploits sound in order to compromise a system?
...that one scheme to defeat spam involves proving that the sender has performed a small amount of computation, a proof-of-work system?
Miscellaneous
- WikiProject Cryptography
- WikiReader in Cryptography — Inactive since 2007.
- Automatic link: Recent changes in articles about cryptography
- Topics in cryptography — an annotated list of cryptography topics
Categories
Authentication methods | Cryptographers | Cryptography | Cryptographic algorithms | Cryptographic attacks | Cryptographic hardware | Cryptographic protocols | Cryptographic software | Cryptography organizations | Randomness | Steganography | Cryptography law
News
- Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger presented the first key-recovery attacks on full AES. [1]
Things you can do
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Algebra | Analysis | Category theory |
Computer science |
Cryptography | Discrete mathematics |
Geometry |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Logic | Mathematics | Number theory |
Physics | Science | Set theory | Statistics | Topology |
- What are portals?
- List of portals
- Featured portals
Other Portals
- What are portals?
- List of portals
- Featured portals
|