Category:Cryptography
practice and study of secure communication techniques | |||||
| Upload media | |||||
| Instance of | |||||
|---|---|---|---|---|---|
| Subclass of |
| ||||
| Part of | |||||
| Has part(s) | |||||
| Significant event |
| ||||
| |||||
| To display all parents click on the "▶": |
Pages in category "Category:Cryptography"
- Category:Cryptographers
- Category:Cryptologic Technician (United States Navy)
- Category:Animations of cryptography
- Category:Cryptography diagrams
- Category:Videos of cryptography
- Category:Black Chamber
- Category:Central Security Service
- Category:Government Communications Headquarters
- Category:Advanced Access Content System
- Category:Cryptographic algorithms
- Category:American Cryptogram Association
- Category:Applications of cryptography
- Category:Asymmetric cryptography
- Category:Backdoors in IT
- Category:Chaffing and winnowing
- Category:Conferences in cryptography
- Category:Cryptanalysis
- Category:Cryptography equipment in the National Electronics Museum
- Category:Cryptographic devices
- Category:History of cryptography
- Category:Illegal numbers
- Category:Cryptography in Israel
- Category:Key exchange
- Category:Kryptographisches Experiment (Berlin-Adlershof)
- Category:PBKDF2
- Category:Public-key cryptography
- Category:Quantum cryptography
- Category:Randomness
- Category:Cryptography in Russia
- Category:Cryptographic software
- Category:Somerton Man Code
- Category:Steganography
- Category:Symmetric cryptography
- Category:Traité des chiffres ou secrètes manières d'écrire
- File:"National Security Agency" art detail, from cover of Friedman Lectures on Cryptology (page 1 crop).jpg
- File:1912-8-12 Kryptogramm.png
- File:1D MITMNEW.png
- File:2007-07-20 Polska Wytwórnia Papierów Wartościowych w Warszawie, wejście.jpg
- File:2D MITMNEW.png
- File:98-905 (IA 98-905-crs).pdf
- File:UFO 1output AllOperators.jpg
- File:A single round of Phelix.jpg
- File:A Slidex and separate cards.jpg
- File:A1Z26 cipher.png
- File:AECall with iPhone.png
- File:AES Encryption for AI Model Parameter.gif
- File:Algorithm diagram for EnRUPT.png
- File:Algorithm diagram for XXTEA cipher.svg
- File:Algorythm.png
- File:Alternating GFN-02.png
- File:American-Cryptology-during-the-Cold-War-1945-1989-Book-IV-Cryptologic-Rebirth-1981-1989.pdf
- File:Android-WiFi-Security-Enhanced-Open.jpg
- File:API Call structure for the Sent.ly Web API.png
- File:Appelation crypto controverse.svg
- File:Argon2.png
- File:ArnoldCipherLetter.jpeg
- File:Arnsberger Feme ABC-1437.svg
- File:ARX structure-01.png
- File:As2 ablauf klein.png
- File:Asiacrypt06.jpg
- File:AsincStream.jpg
- File:ASmallSecret.pdf
- File:Asymmetric encryption padlock analogy.svg
- File:Atbash.png
- File:ATM pinpad in german.jpg
- File:Autocorrelation cryptanalisys exmp.png
- File:AutocorrelGraph1.png
- File:AutocorrelGraph2.png
- File:AutocorrelGraph3.png
- File:AutocorrelGraph4.png
- File:B3-2.jpg
- File:B92 protocol quantum key distribution.svg
- File:Baby step giant step copy-01.svg
- File:Baby step giant step-01.png
- File:Backup facebook to google.jpg
- File:Bahaeddin Şakir telegram 4 July 1915.png
- File:Bandeau portail crypto.jpg
- File:BATCO Plastic Insert.jpg
- File:BATCO Wallet.jpg
- File:BATO Vocab Cards.jpg
- File:Bcrypt.png
- File:Beamsplitter and Photodetectors at the core of the luggable quantum crypto unit of the QAP project - FET09 Prague.jpg
- File:BelT hashing scheme.jpg
- File:Bijektivität Mengen.jpg
- File:Bildverschlüsselung.jpg
- File:Bipolar.jpg
- File:Blaise de Vigenère – Traité des Chiffres, 1587.pdf
- File:Bletchley Park last German intercept.JPG
- File:BlockCipherModeofOperationVertical.jpg
- File:BlockcipherModesofOperation.png
- File:Bounty 2 Phrase.png
- File:Bring Chaocipher right wheel letter to zenith.png
- File:Buchstabenverteilung DE EN.png
- File:C't Kryptokampagne CeBIT 2006.jpg
- File:Car relay attack.png
- File:Cast-128(1).png
- File:Cast-128(2).png
- File:Ccmp decryption scheme.gif
- File:Ccmp encryption scheme.gif
- File:Ccmp packet structure.gif
- File:Ccmp packet structure.svg
- File:Ceazer ziper.png
- File:Certificat Mail.jpg
- File:Certificate-chain.png
- File:Chain Of Trust.svg
- File:Chaocipher right disk permuting.png
- File:Chaocipher wheels starting position.png
- File:Chaocipher wheels.png
- File:Checking timestamp.png
- File:ChemicalPencil.png
- File:Chiffrement asymétrique.png
- File:Chiffrement symétrique.png
- File:Choctaw nation medal of valour 1.jpg
- File:Choctaw nation medal of valour 2.jpg
- File:Chosen-plaintext attack.ogg
- File:Cifratura simmetrica.jpg
- File:Cipher-taxonomy ar.png
- File:Ciphershed screenshot.png
- File:ClockWiseSpiralPath.png
- File:ClockWiseSpiralPathSolution.png
- File:CNSA 2p0 timeline.png
- File:Code Signing.gif
- File:Code wheel.jpg
- File:Codefranch.jpg
- File:Codes, Bukit, Bali, Indonesia.jpg
- File:Combination methods.PNG
- File:Complementation slide.jpg
- File:Constructor.png
- File:Contrasenyes.pdf
- File:Cpa indistinguishability experiment.png
- File:CreacionTBC.png
- File:CriptografiaAsimetrica.png
- File:Crittografia asimmetrica.jpg
- File:CRL in Windows.png
- File:Crypto clipart1.svg
- File:Crypto clipart2.png
- File:Crypto clipart2.svg
- File:Cryptoapi reading.jpg
- File:Cryptogram-example.jpg
- File:Cryptogram-example.svg
- File:Cryptography Barnstar.png
- File:Cryptography clipart1.png
- File:Cryptography Fleuron T116443-1.png
- File:Cryptography goodnesses of a phrase.png
- File:Cryptography.png
- File:Cryptography01.png
- File:Cryptool-logo-cto.png
- File:Cypher core system picture wikimedia.tif
- File:De-Kryptogramm.ogg
- File:De-Kryptologe.ogg
- File:De-Kryptologie.ogg
- File:Degradationcrypt.gif
- File:Delegated path validation.png
- File:DESCIFRADO MENSAJE.jpg
- File:DH-EKE.png
- File:Diagramme sequence.png
- File:Dic letter frequency matrix.png
- File:DifferentialCryptanalysisOfXXTEAFirstApproach.png
- File:Diffie-Hellman Key Exchange Paint Analogy.svg
- File:Diffie-Hellman Key Exchange-modified.png
- File:DiffieHellman.png
- File:Digital certificates chain of trust.png
- File:Digital enrollment and authentication reference process.jpg
- File:Digital Signature diagram fi.svg
- File:Digital Signature diagram ja.svg
- File:Digital voting-01.png
- File:Digital Watermark Cleaning - Sequence.svg
- File:DigitalSignatureSchemes.jpg
- File:Dining cryptographers protocol, announcement, Japanese.svg
- File:Dining cryptographers protocol, anonymity against collusion, Japanese.svg
- File:Dining cryptographers protocol, anonymity set, Japanese.svg
- File:Dining cryptographers protocol, circle graph, Japanese.svg
- File:Dining cryptographers protocol, network graph, Japanese.svg
- File:Dining cryptographers protocol, sharing key with facing cryptographer, Japanese.svg
- File:Dining cryptographers protocol, sharing key with right cryptographer, Japanese.svg
- File:DirectionalSpectra.png
- File:Distance bounding protocole de Hancke et Kuhn.png
- File:Doubling oriented.jpg
- File:Dps protocol redone.png
- File:Dps protocol.png
- File:DUAL EC DRBG.jpg
- File:EAS S-box.jpg
- File:EAX block cipher mode of operation.svg
- File:Ecc over GF-71.png
- File:Efficient and Secure Group Messaging.pdf
- File:EFS operation scheme.png
- File:EJBCA 7.9.0.2 in English – Administration.png
- File:Ejemplo2 wm txt.gif
- File:EKE.png
- File:Encoded letter of Gabriel Luetz d Aramon after 1546 with partial deciphering.jpg
- File:EncripDecrip.png
- File:Encrypt.jpg
- File:Encrypted file.png
- File:Encryption - Asymmetric.svg
- File:Encryption - Symmetric.svg
- File:Encryption example with two people.png
- File:Encryption gnupg 1.png
- File:Encryption gnupg 2.png
- File:Encryption gnupg 3.png
- File:Encryption gnupg 4.png
- File:Encryption gnupg 5.png
- File:Encryption gnupg 6.png
- File:Encryption gnupg 7.png
- File:Encryption gnupg 8.png
- File:Encryption unsuccessful. The data on your phone is no longer accessible.jpg
- File:Encryption1.png
- File:EncryptionTerminology-ar.svg
- File:Encryptr.png
- File:Encyclopedia of Cryptography and Security.jpg
- File:End-to-End Encryption.png
- File:Enkriptimi dhe dekriptimi me PGP.png
- File:ENTER Gretag 1.jpg
- File:ENTER Gretag 3.jpg
- File:Erasure code work principle.png
- File:Esquema per il·lustrar el xifratge simetric.PNG
- File:Extendedvalidation.PNG
- File:FBacon alfa1.jpg
- File:FBacon alfa2.jpg
- File:Fcsr1.png
- File:FEAL-f.png
- File:FEAL-fk.png
- File:FEAL-scheme.png
- File:Filetopia-Screen 1.png
- File:Finalcrypt GUI Log.png
- File:Finalcrypt GUI Main.png
- File:FIPS140-2validationflowchart.jpg
- File:Fips186-2.svg
- File:Firefox 3 rc1 Extended Validation SSL address bar and certificate detail.PNG
- File:Firma Digital Asimétrica.png
- File:Firma digital.jpg
- File:FirstQuantumCryptoScheme.jpg
- File:Forward Secrecy - Instant Perfect forward Secrecy.png
- File:FrameSmal5.gif
- File:FrameSmall2.gif
- File:FrameSmall3.gif
- File:FrameSmall4.gif
- File:Friedman Lectures on Cryptology.pdf
- File:FuncR.png
- File:Function search 2.png
- File:Function search cycle.png
- File:FWB(K).png
- File:FWB(K-szyfrowane).png
- File:FWB.png
- File:Gamma123.PNG
- File:Gammirovanie GOST.png
- File:Gammirovanie s obratnoy svyazyu GOST.png
- File:Garbled circuit AND gate illustration.svg
- File:Garbled circuit AND gate truth table illustration.svg
- File:Generation meсhanism of Yarrow algorithm.png
- File:Generic Bootstrapping Architecture.jpg
- File:GetDownGetEncrypted.jpeg
- File:GoldBug MELODICA Calling.png
- File:Green Keys.jpg
- File:GSM auth A8.jpg
- File:Générateur de mot de passe.png
- File:Génération de clés cryptographiques avec la biométrie.jpg
- File:Hash attack.png
- File:Hash function2-es.svg
- File:Hashalgorithm.png
- File:Hellman.png
- File:Hollman cas.png
- File:Homomorphic Encryption Setup.jpg
- File:Honey Encryption Beispiel.png
- File:Hsspf decrypt 1.png
- File:Hsspf decrypt 2.png
- File:Hvqfn housing.JPG
- File:Hybrid algorithm ru.png
- File:Hybrid algorithm.jpg
- File:Hybride Verschlüsselung.png
- File:IAPM-Jutla.jpg
- File:Identity Based Encryption Steps.png
- File:IGE mode-01.png
- File:Illustration for Hasse's Theorem.png
- File:Illustration of digital signature.svg
- File:Imitovstavka GOST.png
- File:IPC DLP 4.jpg
- File:Jak wygląda szyfrowanie maili?.png
- File:Jennifier Heil nagra example.jpg
- File:JSC-Databases-and-Flow.GIF
- File:Jules verne cryptogramme.png
- File:Ka Kb generating.jpeg
- File:Kerberos forwiki.jpg
- File:Kerberos-simple.svg
- File:Key planer.png
- File:Key to cryptography 17th century chronograph.jpg
- File:KeyWord.png
- File:Khufu algorithm.jpg
- File:Khufuscheme.png
- File:Kodierungstabelle dt.-sprachige Buchstabenhäufigkeit.png
- File:Kryptolomikar.jpg
- File:Kryptostuff5.jpg
- File:La cryptographie militaire--cover.jpg
- File:La Cryptographie Militaire.jpg
- File:La Roncière decryption line by line.png
- File:La Roncière Levasseur cryptogram.png
- File:La Roncière translation.png
- File:Lana1.svg
- File:Large-pigeon-message.png
- File:LEA round function-01.png
- File:LEAFFormationScheme.png
- File:Leiden Stadhuis plaque 2.jpg
- File:Letrapv.gif
- File:Letter frequency probability matrix.png
- File:Letters 1666 1668 Queen Christina to Decio Azzolino National Archives Sweden K394 038 297.png
- File:LEX (bytes extraction).png
- File:Lexnet.gif
- File:LFSR Example.png
- File:LFSR Galois Example.png
- File:LFSR Galois.png
- File:LFSR Majority.png
- File:LFSR multiple.png
- File:LFSR multiple1.png
- File:LFSR1.png
- File:LFSR2.png
- File:LFSR3.png
- File:LMD-KP.nsa-cf.jpg
- File:Locating the letter "A" on the right (plaintext) Chaocipher wheel.png
- File:Lorenz Tiltman Break HQIBPEXEZMUG.jpg
- File:Luffa-step-funct.png
- File:Luffa-step-function.png
- File:Luruvopo1.png
- File:MainFormOTPS.JPG
- File:Mal sh.jpg
- File:Mal sha1.jpg
- File:Malicious sh.jpg
- File:ManglingFunct.jpg
- File:ManInTheMiddle.png
- File:Manual of Cryptography - 1911.pdf
- File:Manual.pdf
- File:MapearTBC.png
- File:Marked ballot.jpg
- File:MCMC annealing probability accuulation.png
- File:Meet in the middle en cifrado simétrico por bloques.svg
- File:Memorial Jerzy Różycki.JPG
- File:Mensaje en codigo francmason.png
- File:Misty01.png
- File:MKB obtencion.jpg
- File:MKB structure.png
- File:ModT basics.PNG
- File:Monte carlo method.svg
- File:MS 210 - example ciphered text and diagram.jpg
- File:Msg-encrypted.png
- File:Munitions T-shirt (back).jpg
- File:Munitions T-shirt (front).jpg
- File:Museo del mare Ammiraglio Carlo Mirabello - Tortona, 04.jpg
- File:N-Hash function.png
- File:N-hash sum.png
- File:NATO link 11 Broadcasting on 3-25-2022 at 4469.3kHz.wav
- File:New schema principe relay.png
- File:NonExitTorRelay.JPG
- File:NS cifratura-canale-decifratura.jpg
- File:NSSK forwiki.jpg
- File:NumerosII.png
- File:Ocsp-request.png
- File:Ocsp-responce.png
- File:One block of Phelix encryption.jpg
- File:One-Time-Codes.png
- File:Operators are standing by.jpg
- File:Orange-book-small.PNG
- File:Oskar Stürzinger 2002.jpg
- File:OTP (.jpg
- File:Otway Rees.jpg
- File:Overview of Methods of Cryptographic Calling.png
- File:Pageface.jpg
- File:Part of a Banbury Sheet as used in Banburismus.jpg
- File:PassWord Strength.png
- File:PCBC.svg
- File:Permuting Chaocipher left wheel.png
- File:Perpetual Treasure Code University of Brattleboro 79 Main Street downtown Brattleboro VT September 2023.jpg
- File:PhelixHardware.jpg
- File:Pike jpg.JPG
- File:PKCS15 File structure.png
- File:Pkinit.jpg
- File:Playfair Cipher 01 HI to BM textless.png
- File:Playfair Cipher 02 DE to OD textless.png
- File:Playfair Cipher 02 DE to OD.png
- File:Playfair Cipher 03 TH to ZB.png
- File:Playfair Cipher 04 EG to XD.png
- File:Playfair Cipher 05 OL to NA.png
- File:Playfair Cipher 10 EX to XD textless.png
- File:Playfair Cipher 10 EX to XD.png
- File:Podpis cyfrowy.svg
- File:Polygraphiae 2.jpg
- File:Polygraphiae 3.jpg
- File:Pool types.jpg
- File:Portrait Adam Back photographe Alexandre Sitter.webp
- File:Power attack full.png
- File:Power attack.png
- File:PreComputedDict.png
- File:Preliminary Historical Report on the Solution of the "B" Machine.pdf
- File:PRESENT Structure-01.png
- File:Prime-numbers-internal-structure.gif
- File:Primecoin-QT.PNG
- File:Principe des distance bounding protocols.png
- File:Private key signing.svg
- File:Probability distribution in regard of letter frequency.png
- File:Proof of Work challenge response.svg
- File:Proof of Work solution verification.svg
- File:Psi.png
- File:Public key (cryptography).png
- File:Public key encryption for rsa only key.jpg
- File:Public key encryption keys.png
- File:Public key encryption keys.svg
- File:Purplemsg.PNG
- File:PyBitMessage (русская версия).PNG
- File:PyBitMessage-client.png
- File:QT-КошелекMFCoin.jpg
- File:Quado Roman character set.png
- File:Quantum coin flip spaces.svg
- File:QuantumFred.jpg
- File:Rabbit decryption.png
- File:Rabbit encryption.png
- File:Random number categories and respective generators (chinese simplified).png
- File:Rating Badge CT.jpg
- File:Red and Purple - A Story Retold.pdf
- File:RedBlack.png
- File:RedNotepad.PNG
- File:Relay attack sip dataflow.png
- File:Rngtest FIPS-140-2 screenshot.png
- File:Rockex.jpg
- File:RussianCipher.png
- File:S-Box.png
- File:SAM - The Secure Architecture Model (SAM).png
- File:Sam card.JPG
- File:Sample 1.jpg
- File:Samplee2.jpg
- File:SANS1368 data path 1.JPG
- File:Scambio di chiavi Diffie-Hellman.pdf
- File:Scambio di chiavi Diffie-Hellman.svg
- File:Schema generique relay.png
- File:SchemeOfSecondApproachOfXXTEADifferentialCryptanalysis.png
- File:SchemeOfXXTEADifferentialCryptanalysisFirstApproach.png
- File:Schlüssel.png
- File:Schlüssel2.png
- File:Scrambled Balloons and Ballooning, Upward and Onward.jpg
- File:SEA round function-01.png
- File:SECOQC Network Architecture.svg
- File:Secp256k1.png
- File:Secret key rate.png
- File:Secret-writing-document-five.pdf
- File:Secret-writing-document-four.pdf
- File:Secret-writing-document-one.pdf
- File:Secret-writing-document-six.pdf
- File:Secret-writing-document-three.pdf
- File:Secret-writing-document-two.pdf
- File:Secure voice on HF radiotelephony.ogg
- File:Securetoken1.jpg
- File:SecurityTokens.CryptoCard.agr.jpg
- File:SemiBlock.jpg
- File:SHA-2 diagram.png
- File:Shabal.PNG
- File:ShannonInformationEPR.png
- File:Shared secret.png
- File:SHARK.png
- File:Shebmulli Smime.jpg
- File:Shema captcha.png
- File:Shema principe relay.png
- File:Shift omac.png
- File:Sicurezza reti Vernam.jpg
- File:Sifra-hr.png
- File:Signal application capture d’écran, numéro de sécurité.png
- File:SIGPOSI card-stencil code.jpg
- File:Simetrikoa Analogia.JPG
- File:Simetrikoa.JPG
- File:Simon block cipher.svg
- File:Simon function-01.png
- File:Simple Encryption Algorithm Diagram.png
- File:Simple symmetric encryption.png
- File:Skey authentication cs.svg
- File:Skey password generation cs.svg
- File:Skey password generation.svg
- File:Skey pwgen.png
- File:Skipjack - G-permutation diagram.png
- File:Skipjack - Stepping Rules.png
- File:Slide8 web3.png
- File:Slideattack.jpg
- File:Sliding with a twist.jpg
- File:SMP in OTR fixed Qb.png
- File:SMP in OTR.png
- File:Software-optimized Encryption Algorithm Diagram.PNG
- File:SpatialAmbiguityDemonstration.png
- File:Special Text No. 165 Elementary Military Cryptography - 1935.pdf
- File:Special Text No. 166 Advanced Military Cryptography - 1943.pdf
- File:Speck block cipher 0 indexing.svg
- File:Speck function-02.png
- File:SquareCardanGrille.png
- File:SSL Certificate Info Box In Firefox.png
- File:Stack overview.png
- File:Start page for Provably Secure Elliptic Curve Key Encapsulation Mechanism.jpg
- File:StartPosition.png
- File:Stop and go 2sides.png
- File:Stop and go shuffle.png
- File:Stop and go shuffle1.png
- File:Stop and go shuffle2.png
- File:Stop and go.png
- File:Storage-Host Proof Storage.png
- File:StorageTek 9310 powderhorn 1.jpg
- File:StorageTek 9310 powderhorn 2.jpg
- File:Struttura certificato x509.PNG
- File:Supersingular.png
- File:Symmetric-key cryptography.svg
- File:SYNERGY OF BUILDING CYBERSECURITY SYSTEMS.pdf
- File:Szyfr cyfrowy1.jpg
- File:Szyfr cyfrowy2.jpg
- File:Szyfr cyfrowy3.jpg
- File:Szyfr cyfrowy4.jpg
- File:Table de chiffrement de la guerre franco-prussienne de 1870, évoquant une série de mots classés par ordre alphabétique, - Archives Nationales - F-90-11676 - (1).jpg
- File:Tablesmall.gif
- File:TEA round-01.png
- File:TEK encryption.PNG
- File:TGSplay.gif
- File:Tgtmech.gif
- File:TGTplay.gif
- File:The RadioGatun´ round function and input mapping.png
- File:Thomasbbryan2.PNG
- File:TLS 1.3.png
- File:TM 11-485 Advanced Military Cryptography - 1944.pdf
- File:TM 32-220 Basic Cryptanalytics (U) - 1970.pdf
- File:TM 32-220 Basic Cryptography - 1950.pdf
- File:Todiste77.png
- File:Todiste77b.png
- File:Token example.png
- File:Tokenmini.jpg
- File:Trithemius-Polygraphiae-71.jpg
- File:True random number generator.jpeg
- File:Truncated Differential Characteristic - Backwards.png
- File:Truncated Differential Characteristic - Forwards.png
- File:Truncated Differential Characteristic - Inbound Phase.png
- File:TruncatedDifferentialCharacteristicWhirlpoolBW.png
- File:TruncatedDifferentialCharacteristicWhirlpoolFw.png
- File:TruncatedDifferentialCharacteristicWhirlpoolIn.png
- File:Trusted Third Party.svg
- File:Type 2 GFN-04.png
- File:Type 3 GFN-05.png
- File:Type1 GFN-03.png
- File:Typex-plate.jpg
- File:Ufichamishaji 1.png
- File:UGthV2J - Imgur.png
- File:Unbalanced GFN-01.png
- File:US Navy cryptanalytic bombe 6.jpg
- File:US-UK strip cipher.jpg
- File:USS Liberty second ensign 2.jpg
- File:USS Pueblo (AGER-2) 08.jpg
- File:VEST Structure.PNG
- File:VIA Embedded booth security (3597022469).jpg
- File:VIC blok-1.png
- File:VIC blok-2.png
- File:Vic step10a.png
- File:Vic step10b.png
- File:Vic step11.png
- File:Vic step2.png
- File:Vic step7.png
- File:Vic step8.png
- File:Vic step8a.png
- File:Vic step9.png
- File:VIC szyfr final.png
- File:VIC szyfr start.png
- File:Vigenere-square.png
- File:Vingenere 1.png
- File:Wang Dass.png
- File:WBC 1.jpg
- File:WBC 2.jpg
- File:WBC 3.jpg
- File:WEP Decapsulation.jpg
- File:WEP Encapsulation.jpg
- File:Wikipedia login.jpg
- File:Wikipedia login.PNG
- File:WW1 Berckheim-Telegramm.jpg
- File:XEX mode encryption.svg
- File:Xor Encrypt Xor (XEX) mode encryption.svg
- File:XTS encryption.svg
- File:XTS mode encryption.svg
- File:XXTEAEncryptionAlgorithmScheme.png
- File:Yahalom Protocol.jpg
- File:Yolkin's Cipher.png
- File:Zegarowy.png
- File:Zendia lores.jpg
- File:Zhwiki login 2022.png
- File:Zhwikinews login 2023.png
- File:Zhwikiversity login 2023.png
- File:Zhwikivoyage login 2023.png
- File:ZIHdVaaaa.png
- File:Zipf-code-1 English plain, book-coded, Vigenere coded.svg
- File:Zufall.png
- File:Übersicht Kurs Kryptologie.png
- File:Ślimak.png
- File:Асимметричное шифрование.jpg
- File:Атака на основе подобранного открытого текста.png
- File:Балакин рис1.jpg
- File:Балакин Рис10.jpg
- File:Балакин Рис11.jpg
- File:Балакин рис2.jpg
- File:Балакин Рис3.jpg
- File:Балакин Рис4.jpg
- File:Балакин Рис5.jpg
- File:Балакин Рис6.jpg
- File:Балакин Рис7.jpg
- File:Балакин Рис8.jpg
- File:Балакин Рис9.jpg
- File:Блок завершения Luffa.png
- File:Блок-схема приёмно-передающей системы SIGSALY.gif
- File:Взаимодействие.png
- File:Генератор ММ в поточных шифрах.png
- File:Граф1.jpg
- File:Граф2.jpg
- File:Граф3.jpg
- File:Диск.gif
- File:Дискретный логарифм.png
- File:Зшёэгжу.gif
- File:Интерактивная последовательная схема.jpg
- File:Испытание предполагаемого окончания слова.png
- File:Канальное шифрование.gif
- File:Кратная точка на эллиптической кривой.jpg
- File:Криптографическая стойкость.png
- File:Криптотекст Живержа.png
- File:Личностное шифрование. Описание работы.jpg
- File:Матрица, заполняемая Алисой.png
- File:Механизм АК-15.png
- File:Назначение процедуры расширения ключа.jpg
- File:Обобщенная схема формирования хеш-фунции.jpg
- File:Первое попадание.png
- File:Полное расшифрование.png
- File:Пример алгоритма.png
- File:Пример шифра.png
- File:Пространственно-временная диаграмма для бита с отложенным прочтением.jpg
- File:Прямое смешивание.png
- File:Расположение цилиндров.png
- File:Расширения ключа.png
- File:Раундовая функция CAST.png
- File:Результат работы линейного конгруэнтного генератора.png
- File:Результат работы регистра сдвига с обобщенной обратной связью.png
- File:Свертка.jpg
- File:Секретная пара.png
- File:Симметричное шифрование.jpg
- File:Слайд атака.JPG
- File:Следующее попадание.png
- File:Снимок экрана 2019-12-17 в 22.33.41.png
- File:Снимок экрана 2019-12-17 в 23.07.50.png
- File:Стандартная двухполярная конструкция.jpg
- File:Структура сертификата X.509.png
- File:Стуктура f.png
- File:Схема атаки удлинением.jpg
- File:Схема базовой корреляционной атаки (DSK).png
- File:Схема Брема.png
- File:Схема генерации подписи в алгоритме SFLASH.jpg
- File:Схема преобразования ak-15.png
- File:Схема проверки(верификации) подписи в алгоритме SFLASH.jpg
- File:Схема работы П-функции шифра MAGENTA.png
- File:Схема раундовой функции Luffa.png
- File:Схема регистра сдвига с обобщенной обратной связью.png
- File:Схема хеш-функции Luffa.png
- File:Схема шифрования файла в eCryptfs.png
- File:Схема экспериментальной установки.jpg
- File:Схемы безопасного хеширования.jpg
- File:Таблица Гронсфельда.png
- File:Тензорное произведение запутанного состояния и неизвестного(развёрнутый вид).png
- File:Тензорное произведение запутанного состояния и неизвестного.png
- File:Трёхэтапный протокол.png
- File:Упрощенная схема вихря Мерсенна.png
- File:Форматування диска з використанням LUKS.png
- File:Шабло для Rasterschlüssel 44.png
- File:Шаблон для Rasterschlüssel 44 с текстом внутри.png
- File:Шифр Бэкона - цикл.jpg
- File:Шифровальный диск 1865.png
- File:Шифрование.PNG
- File:Шифрование.png
- File:Шифртекст.png
- File:Штурм.png
- File:التعمية واستخراجها عند الكندي ت 260 هـ.svg
- File:ترتيب عملية تشفير برنامج Voldemorts للبيانات.png
Category:Applied mathematics
Category:Banking technology
Category:Categories requiring diffusion (200-item threshold)
Category:Cyberwarfare
Category:Discrete mathematics
Category:Espionage techniques
Category:Formal sciences
Category:Information security
Category:Information technology
Category:Military communications
Category:Puzzles
Category:Secrecy
Category:Secret messages
Category:Secure communication
Category:Uses of Wikidata Infobox
