Triple DES (3DES) |
X |
T |
A |
|
Encrypt/Decrypt \ Symmetric (modern) \ Triple DES…… |
[T] \ Cryptography \ Modern \ Symmetric \ Triple DES Cipher |
[A] \ Password-Based Ciphers \ PbeWithSHAAnd3_KeyTripleDES_CBC |
|
2) Modern Ciphers |
|
Triple DES (3DES) [analysis] |
X |
T |
|
|
Analysis \ Symmetric Encryption (modern) \ Triple DES…
|
[T] \ Cryptanalysis \ Modern \ Triple DES Brute-Force Analysis |
|
|
7) Modern Cryptanalysis |
|
ADFGX / ADFGVX |
X |
C/T/W |
D |
X |
Encrypt/Decrypt \ Symmetric (classic) \ ADFGVX… |
[C] \ Classic Ciphers \ ADFGVX [T] \ Cryptography \ Classical \ ADFGVX Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ ADFGVX |
[D] \ Algorithms \ Classic \ ADFGVX |
ADFG(V)X |
1) Classic Ciphers |
|
ADFGVX [analysis] |
X |
C/T |
|
|
Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ ADFGVX… |
[C] \ Cryptanalysis \ Specific \ ADFGVX Analyzer [T] \ Cryptanalysis \ Classical \ ADFGVX Heuristic Analysis [T] \ Cryptanalysis \ Classical \ ADFGVX Dictionary Attack |
|
|
6) Classic Cryptanalysis |
|
AES |
X |
C/T/W |
A/D |
|
Encrypt/Decrypt \ Symmetric (modern) \ AES (CBC)… Encrypt/Decrypt \ Symmetric (modern) \ AES (self extracting)… |
[C] \ Modern Ciphers \ Symmetric \ AES [T] \ Cryptography \ Modern \ Symmetric \ AES Encryption with Implicit Conversion [T] \ Cryptography \ Modern \ Symmetric \ AES Cipher (File Input) [T] \ Cryptography \ Modern \ Symmetric \ AES Cipher (Text Input) [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ AES |
[A] \ Block Ciphers \ Rijndael \ AES \ AES128_ECB [A] \ Block Ciphers \ Rijndael \ AES \ AES256_CFB [A] \ Block Ciphers \ Rijndael \ AES \ AES192_ECB [A] \ Block Ciphers \ Rijndael \ AES \ AES256_CBC [A] \ Block Ciphers \ Rijndael \ AES \ AES128_CBC [A] \ Block Ciphers \ Rijndael \ AES \ AES128_CFB [A] \ Block Ciphers \ Rijndael \ AES \ AES192_OFB [A] \ Block Ciphers \ Rijndael \ AES \ AES192_CFB [A] \ Block Ciphers \ Rijndael \ AES \ AES256_OFB [A] \ Block Ciphers \ Rijndael \ AES \ AES128_OFB [A] \ Block Ciphers \ Rijndael \ AES \ AES256_ECB [A] \ Block Ciphers \ Rijndael \ AES \ AES192_CBC [D] \ Algorithms \ Symmetric \ AES |
|
2) Modern Ciphers |
|
AES [analysis] |
X |
T/W |
|
X |
Analysis \ Symmetric Encryption (modern) \ AES (CBC)… |
[T] \ Cryptanalysis \ Modern \ AES Analysis Using Entropy (1) [T] \ Cryptanalysis \ Modern \ AES Known-Plaintext Analysis (1) [T] \ Cryptanalysis \ Modern \ AES Analysis Using Entropy (2) – with Changeable Plaintext [T] \ Cryptanalysis \ Modern \ AES Known-Plaintext Analysis (2) [W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ AES \ Ciphertext-only [W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ AES \ Known plaintext |
|
Distributed AES Analysis |
7) Modern Cryptanalysis |
|
AES [visual] |
X |
C/T |
|
X |
Indiv. Procedures \ Visualization of Algorithms \ AES \ |
[C] \ Modern Ciphers \ Symmetric \ AES Visualization [T] \ Cryptography \ Modern \ Symmetric \ AES Visualization |
|
AES Animation AES (step-by-step) |
10) Learning Aids and Visualizations |
|
ASN.1 |
X |
|
|
|
Indiv. Procedures \ Tools \ Codes \ Decode ASN.1 Code of a Document |
|
|
|
9) Codings |
|
Atbash |
X |
|
|
|
Encrypt/Decrypt \ Symmetric (classic) \ Substitution / Atbash… |
|
|
|
1) Classic Ciphers |
|
Authentication methods in networks [visual] |
X |
|
|
|
Indiv. Procedures \ Protocols \ Network Authentication… |
|
|
|
10) Learning Aids and Visualizations |
|
Autocorrelation |
X |
C |
|
X |
Analysis \ Tools for Analysis \ Autocorrelation |
[C] \ Cryptanalysis \ Generic \ Autocorrelation |
|
Autocorrelation |
6) Classic Cryptanalysis |
|
Base 64 encode/decode |
X |
|
|
|
Indiv. Procedures \ Tools \ Codes \ Base64 Encode/Decode \ Base64 Decode Indiv. Procedures \ Tools \ Codes \ Base64 Encode/Decode \ Base64 Encode |
|
|
|
9) Codings |
|
Byte Addition |
X |
|
|
|
Encrypt/Decrypt \ Symmetric (classic) \ Byte Addition… |
|
|
|
1) Classic Ciphers |
|
Byte Addition [analysis] |
X |
|
|
|
Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Byte Addition |
|
|
|
6) Classic Cryptanalysis |
|
Caesar / Rot-13 |
X |
C/T/W |
D |
|
Encrypt/Decrypt \ Symmetric (classic) \ Caesar / Rot-13… |
[C] \ Classic Ciphers \ Caesar [T] \ Cryptography \ Classical \ Caesar Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Caesar |
[D] \ Algorithms \ Classic \ Caesar |
|
1) Classic Ciphers |
|
Caesar / Rot-13 [analysis] |
X |
T/W/C |
|
X |
Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Caesar |
[T] \ Cryptanalysis \ Classical \ Caesar Brute-Force Analysis [T] \ Cryptanalysis \ Classical \ Caesar Analysis Using Character Frequencies [W] \ Cryptanalysis \ Classic Encryption \ Caesar [C] \ Cryptanalysis \ Specific \ Caesar Analyzer |
|
Caesar / Rot13 |
6) Classic Cryptanalysis |
|
Caesar / Rot-13 [visual] |
X |
|
|
|
Indiv. Procedures \ Visualization of Algorithms \ Caesar… |
|
|
|
10) Learning Aids and Visualizations |
|
Chinese remainder theorem (CRT) [visual] |
X |
|
D |
|
Indiv. Procedures \ Chinese Remainder Theorem Applications \ |
|
[D] \ Visuals \ Chinese Remainder Theorem (CRT) |
|
10) Learning Aids and Visualizations |
|
DES |
X |
T/C/W |
A/D |
|
Encrypt/Decrypt \ Symmetric (modern) \ DES… |
[T] \ Cryptography \ Modern \ Symmetric \ DES Complementation Property [C] \ Modern Ciphers \ Symmetric \ DES [T] \ Cryptography \ Modern \ Symmetric \ DES Cipher [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ DES |
[A] \ Block Ciphers \ DESede \ DESede_CBC [A] \ Password-Based Ciphers \ PbeWithSHA1AndDES_CBC [A] \ Password-Based Ciphers \ PbeWithMD5AndDES_CBC [D] \ Visuals \ Inner States of the Data Encryption Standard (DES) |
|
2) Modern Ciphers |
|
DES [analysis] |
X |
T/W |
|
|
Analysis \ Symmetric Encryption (modern) \ DES… |
[T] \ Cryptanalysis \ Modern \ DES Analysis Using Entropy [T] \ Cryptanalysis \ Modern \ DES Known-Plaintext Analysis [T] \ Cryptanalysis \ Modern \ DES Brute-Force Analysis [W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ DES \ Known plaintext |
|
|
7) Modern Cryptanalysis |
|
DES [visual] |
X |
C/T |
|
|
Indiv. Procedures \ Visualization of Algorithms \ DES… |
[C] \ Modern Ciphers \ Symmetric \ DESVisualization [T] \ Cryptography \ Modern \ Symmetric \ DES Visualization |
|
|
10) Learning Aids and Visualizations |
|
DESL |
X |
|
|
|
Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESL… |
|
|
|
2) Modern Ciphers |
|
DESL [analysis] |
X |
|
|
|
Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESL… |
|
|
|
7) Modern Cryptanalysis |
|
DESX |
X |
|
|
|
Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESX… |
|
|
|
2) Modern Ciphers |
|
DESX [analysis] |
X |
|
|
|
Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESX… |
|
|
|
7) Modern Cryptanalysis |
|
DESXL |
X |
|
|
|
Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESXL… |
|
|
|
2) Modern Ciphers |
|
DESXL [analysis] |
X |
|
|
|
Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESXL… |
|
|
|
7) Modern Cryptanalysis |
|
Key exchange (Diffie-Hellman DH) (Perfect Forward Secrecy) [visual] |
X |
|
|
|
Indiv. Procedures \ Protocols \ Diffie-Hellman Demonstration… |
|
|
|
10) Learning Aids and Visualizations |
|
Signature [visual] |
X |
|
D |
|
Digital Signatures, PKI \ Signature Demonstration (Signature Generation)… Indiv. Procedures \ RSA Cryptosystem \ Signature Demonstration (Signature Generation)… |
|
[D] \ Visuals \ Signature Demonstration |
|
10) Learning Aids and Visualizations |
|
Keys (display / export) |
X |
|
|
|
Digital Signatures, PKI \ Display/Export Keys… |
|
|
|
4) Digital Signatures, PKI |
|
DSA signature |
X |
|
A/D |
|
Digital Signatures, PKI \ Sign Document… \ DSA |
|
[A] \ Signatures \ DSASignature \ RAW/DSA [A] \ Signatures \ DSASignature \ SHAwithDSA [A] \ Signatures \ IQDSASignature \ IQDSA [A] \ Signatures \ IQDSASignature \ RIPEMD160withIQDSA [A] \ Signatures \ IQRDSASignature \ IQRDSA [A] \ Signatures \ IQRDSASignature \ RIPEMD160withIQRDSA [D] \ Algorithms \ Signature \ DSA |
|
4) Digital Signatures, PKI |
|
ECC-AES |
X |
|
|
|
Encrypt/Decrypt \ Hybrid \ ECC-AES… |
|
|
|
2) Modern Ciphers |
|
ECDSA signature |
X |
|
A |
|
Digital Signatures, PKI \ Sign Document… \ ECSP-DSA |
|
[A] \ Signatures \ ECDSASignature \ SHA1/ECDSA [A] \ Signatures \ ECDSASignature \ SHA512/ECDSA [A] \ Signatures \ ECDSASignature \ RawECDSA [A] \ Signatures \ ECDSASignature \ SHA224/ECDSA [A] \ Signatures \ ECDSASignature \ SHA256/ECDSA [A] \ Signatures \ ECDSASignature \ SHA384/ECDSA |
|
4) Digital Signatures, PKI |
|
ECNR signature |
X |
|
A |
|
Digital Signatures, PKI \ Sign Document… \ ECSP-NR |
|
[A] \ Signatures \ SHA1/ECNR |
|
4) Digital Signatures, PKI |
|
EC calculations [visual] |
X |
|
|
|
Indiv. Procedures \ Number Theory – Interactive \ Point Addition on Elliptic Curves… |
|
|
|
10) Learning Aids and Visualizations |
|
Enigma [visual] |
X |
|
|
X |
Indiv. Procedures \ Visualization of Algorithms \ Enigma… |
|
|
Enigma (step-by-step) |
10) Learning Aids and Visualizations |
|
Entropy [analysis] |
X |
|
D |
|
Analysis \ Tools for Analysis \ Entropy |
|
[D] \ Analysis \ Entropy Analysis |
|
6) Classic Cryptanalysis |
|
Signature extraction |
X |
|
|
|
Digital Signatures, PKI \ Extract Signature… |
|
|
|
4) Digital Signatures, PKI |
|
Factorization of a number |
X |
C/T/N/W |
|
|
Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Brute-force Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Brent Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Pollard Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Williams Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Lenstra Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Quadratic Sieve |
[C] \ Cryptanalysis \ Generic \ Quadratic Sieve [T] \ Mathematics \ Factorization with Quadratic Sieve (QS) [C] \ Cryptanalysis \ Generic \ Factorizer [T] \ Mathematics \ Factorization with Trial Division (Brute-Force) [N] \ Crypto tutorials \ World of Primes \ Factorization \ Brute-force [N] \ Crypto tutorials \ World of Primes \ Factorization \ Quadratic Sieve [W] \ Mathematical Functions \ Prime Factorization |
|
|
12) Prime numbers |
|
FIPS PUB-140-1 (test PRNG) |
X |
|
|
|
Analysis \ Analyze Randomness \ FIPS PUB-140-1 Test Battery |
|
|
|
7) Modern Cryptanalysis |
|
Frequency test |
X |
C/T |
D |
X |
Analysis \ Analyze Randomness \ Frequency Test… Analysis \ Tools for Analysis \ Floating Frequency |
[C] \ Cryptanalysis \ Generic \ Frequency Test [T] \ Cryptanalysis \ Classical \ Frequency Analysis |
[D] \ Analysis \ Frequency Analysis |
Graphical Frequency Analysis |
6) Classic Cryptanalysis |
|
Keys (generate / import) |
X |
|
|
|
Digital Signatures, PKI \ Generate/Import Keys… |
|
|
|
4) Digital Signatures, PKI |
|
Primes (generators, tests, factorization, tutorials) |
X |
T/C/N/W |
|
|
Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ Miller-Rabin Test Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ Solovay-Strassen Test Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ FermatTest Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Miller-Rabin Test Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Fermat Test Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Solovay-Strassen test Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ AKS test (deterministic procedure) Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… |
[T] \ Mathematics \ Next Smaller Prime Number [T] \ Mathematics \ Primes Test [C] \ Tools \ Data input/output \ Prime Generator [T] \ Mathematics \ Primes Generator [N] \ Crypto tutorials \ World of Primes [N] \ Crypto tutorials \ World of Primes \ Primality test \ Sieve of Eratosthenes [N] \ Crypto tutorials \ World of Primes \ Primality test \ Miller-Rabin test [N] \ Crypto tutorials \ World of Primes \ Primality test \ Sieve of Atkin [N] \ Crypto tutorials \ World of Primes \ Generation of primes \ Generation of primes [N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number line [N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number grid [N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number of primes [N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Ulam’s spiral [C] \ Cryptanalysis \ Generic \ Prime Test [W] \ Mathematical Functions \ Prime Operations \ Prime Number Generation |
|
|
12) Prime numbers |
|
Hash algorithms [visual] |
X |
|
D |
|
Indiv Procedures \ Hash \ Hash Demonstration… |
|
[D] \ Visuals \ Hash Sensitivity |
|
10) Learning Aids and Visualizations |
|
Hash attack (collisions) |
X |
|
|
|
Analysis \ Hash \ Attack on the Hash Value of the Digital Signature… |
|
|
|
7) Modern Cryptanalysis |
|
Hash value of a file |
X |
|
|
|
Indiv. Procedures \ Hash \ Hash Value of a File… |
|
|
|
3) Hash and MAC Algorithms |
|
Hill cipher |
X |
C/T |
|
X |
Encrypt/Decrypt \ Symmetric (classic) \ Hill… |
[C] \ Classic Ciphers \ Hill Cipher [T] \ Cryptography \ Classical \ Hill Cipher |
|
Hill |
1) Classic Ciphers |
|
Hill cipher [analysis] |
X |
|
|
|
Analysis \ Symmetric encryption (classic) \ Known Plaintext \ Hill… |
|
|
|
6) Classic Cryptanalysis |
|
Histogram |
X |
|
|
|
Analysis \ Tools for Analysis \ Histogram |
|
|
|
6) Classic Cryptanalysis |
|
HMAC |
X |
T/C |
|
|
Indiv. Procedures \ Hash \ Generation of HMACs… |
[T] \ Hash Functions \ HMAC [C] \ Hash functions \ HMAC |
|
|
3) Hash and MAC Algorithms |
|
Homophonic substitution cipher |
X |
T |
|
|
Encrypt/Decrypt \ Symmetric (classic) \ Homophone… |
[T] \ Cryptography \ Classical \ Homophonic Substitution Cipher and Nomenclature – Decryption [T] \ Cryptography \ Classical \ Homophonic Substitution Cipher and Nomenclature – Encryption |
|
|
1) Classic Ciphers |
|
IDEA |
X |
|
A/D |
|
Encrypt/Decrypt \ Symmetric (modern) \ IDEA… |
|
[A] \ Block Ciphers \ IDEA \ IDEA_CFB [A] \ Block Ciphers \ IDEA \ IDEA_ECB [A] \ Block Ciphers \ IDEA \ IDEA_OFB [A] \ Block Ciphers \ IDEA \ IDEA_CBC [D] \ Algorithms \ Symmetric \ IDEA |
|
2) Modern Ciphers |
|
IDEA [attack] |
X |
|
|
|
Analysis \ Symmetric Encryption (modern) \ IDEA… |
|
|
|
7) Modern Cryptanalysis |
|
Inverse congruence generator (ICG) (PRNG) |
X |
|
|
|
Indiv. Procedures \ Tools \ Generate Random Numbers… |
|
|
|
5) Random Number Generators |
|
Key generation from password (PKCS#5) |
X |
|
|
|
Indiv. Procedures \ Hash \ Key Generation from Password (PKCS #5)… |
|
|
|
3) Hash and MAC Algorithms |
|
Length of a number |
X |
|
|
|
Indiv. Procedures \ Tools \ Length of a number… |
|
|
|
10) Learning Aids and Visualizations |
|
Linear congruence generator (LCG) (PRNG) |
X |
|
|
|
Indiv. Procedures \ Tools \ Generate Random Numbers… |
|
|
|
5) Random Number Generators |
|
MARS |
X |
|
A |
|
Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ MARS… |
|
[A] \ Block Ciphers \ MARS |
|
2) Modern Ciphers |
|
MARS [attack] |
X |
|
|
|
Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ MARS… |
|
|
|
7) Modern Cryptanalysis |
|
MD2 |
X |
|
|
|
Indiv. Procedures \ Hash \ MD2 |
|
|
|
3) Hash and MAC Algorithms |
|
MD4 |
X |
|
A |
|
Indiv. Procedures \ Hash \ MD4 |
|
[A] \ Message Authentication Codes \ HMac \ HmacMD4 |
|
3) Hash and MAC Algorithms |
|
MD5 |
X |
T/C |
A/D |
|
Indiv. Procedures \ Hash \ MD5 |
[T] \ Hash Functions \ MD5 Collision Finder [T] \ Hash Functions \ MD5 Salted Hash Comparison [C] \ Hash functions \ MD5 [T] \ Hash Functions \ MD5 |
[A] \ Message Authentication Codes \ HMac \ HmacMD5 [D] \ Algorithms \ Hash \ MD5 [D] \ Algorithms \ MAC \ HMacMD5 |
|
3) Hash and MAC Algorithms |
|
N-gram [analysis] |
X |
|
|
|
Analysis \ Tools for Analysis \ N-Gram… |
|
|
|
6) Classic Cryptanalysis |
|
Nihilist [visual] |
X |
|
|
|
Indiv. Procedures \ Visualization of Algorithms \ Nihilist… |
|
|
|
10) Learning Aids and Visualizations |
|
Number Shark (taxman) |
X |
|
D |
X |
Indiv. Procedures \ Educational Games \ Number Shark |
|
[D] \ Games \ Number Shark |
Taxman |
11) Games |
|
Number theory (also see Primes) |
X |
T/N |
|
X |
Indiv. Procedures \ Number Theory – Interactive \ Indiv. Procedures \ Number Theory – Interactive \ Generic t-adic-NAF Key Generator |
[T] \ Mathematics \ Calculating with Big Numbers [T] \ Mathematics \ Linear Congruential Generator [N] \ Crypto tutorials \ World of Primes \ Number theory \ Number-theoretic functions [N] \ Crypto tutorials \ World of Primes \ Number theory \ Primitive roots [N] \ Crypto tutorials \ World of Primes \ Number theory \ Goldbach’s conjecture |
|
Msieve Factorizer |
10) Learning Aids and Visualizations |
|
Password quality [visual] |
X |
C/T/W |
|
|
Indiv. Procedures \ Tools \ Password Quality Meter… Indiv. Procedures \ Tools \ Password Entropy… |
[C] \ Tools \ Misc \ PasswordStrength [T] \ Tools \ Check Password Strength [W] \ Tools \ Password Strength |
|
|
10) Learning Aids and Visualizations |
|
Periodicity [analysis] |
X |
|
|
|
Analysis \ Tools for Analysis \ Periodicity |
|
|
|
6) Classic Cryptanalysis |
|
Playfair cipher |
X |
C/T/W |
D |
|
Encrypt/Decrypt \ Symmetric (classic) \ Playfair… |
[C] \ Classic Ciphers \ Playfair [T] \ Cryptography \ Classical \ Playfair Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Playfair |
[D] \ Algorithms \ Classic \ Playfair |
|
1) Classic Ciphers |
|
Playfair [analysis] |
X |
T/C |
|
|
Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Playfair… |
[T] \ Cryptanalysis \ Classical \ Playfair Analysis [C] \ Cryptanalysis \ Specific \ Playfair Analyzer |
|
|
6) Classic Cryptanalysis |
|
Poker-Test (test PRNG) |
X |
|
|
|
Analysis \ Analyze Randomness \ Poker Test… |
|
|
|
7) Modern Cryptanalysis |
|
Scytale / Rail fence |
X |
|
|
|
Encrypt/Decrypt \ Symmetric (classic) \ Scytale / Rail Fence… |
|
|
|
1) Classic Ciphers |
|
Randomness [visual] |
X |
|
|
|
Analysis \ Analyze Randomness \ 3D Visualization… |
|
|
|
10) Learning Aids and Visualizations |
|
RC2 |
X |
C/T/W |
A |
|
Encrypt/Decrypt \ Symmetric (modern) \ RC2… |
[C] \ Modern Ciphers \ Symmetric \ RC2 [T] \ Cryptography \ Modern \ Symmetric \ RC2 Cipher [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ RC2 |
[A] \ Block Ciphers \ RC2 \ RC2_CBC [A] \ Password-Based Ciphers \ PbeWithSHAAnd40BitRC2_CBC |
|
2) Modern Ciphers |
|
RC2 [attack] |
X |
|
|
|
Analysis \ Symmetric Encryption (modern) \ RC2… |
|
|
|
7) Modern Cryptanalysis |
|
RC4 |
X |
C/T |
D |
|
Encrypt/Decrypt \ Symmetric (modern) \ RC4… |
[C] \ Modern Ciphers \ Symmetric \ RC4 [T] \ Cryptography \ Modern \ Symmetric \ RC4 Cipher |
[D] \ Algorithms \ Symmetric \ ARC4/Spritz [D] \ Visuals \ ARC4 / Spritz |
|
2) Modern Ciphers |
|
RC4 [attack] |
X |
|
|
|
Analysis \ Symmetric Encryption (modern) \ RC4… |
|
|
|
7) Modern Cryptanalysis |
|
RC6 |
X |
|
A/D |
|
Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ RC6… |
|
[A] \ Block Ciphers \ RC6 [D] \ Algorithms \ Symmetric \ RC6 |
|
2) Modern Ciphers |
|
RC6 [attack] |
X |
|
|
|
Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ RC6… |
|
|
|
7) Modern Cryptanalysis |
|
RIPEMD-160 |
X |
|
|
|
Indiv. Procedures \ Hash \ RIPEMD-160 |
|
|
|
3) Hash and MAC Algorithms |
|
RSA |
X |
T/C/W |
A/D |
|
Encrypt/Decrypt \ Asymmetric \ RSA Indiv. Procedures \ RSA Cryptosystem \ |
[T] \ Mathematics \ RSA with Big Numbers (Decryption) [T] \ Mathematics \ RSA with Big Numbers [C] \ Modern Ciphers \ Asymmetric \ RSA [T] \ Cryptography \ Modern \ Asymmetric \ RSA Cipher [T] \ Cryptography \ Modern \ Asymmetric \ RSA Decryption [T] \ Cryptography \ Modern \ Asymmetric \ RSA Encryption [C] \ Modern Ciphers \ Asymmetric \ RSA Key Generator [T] \ Cryptography \ Modern \ Asymmetric \ RSA Key Generator [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Asymmetric Encryption/Decryption \ RSA \ RSA Encryption [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Asymmetric Encryption/Decryption \ RSA \ RSA Decryption |
[A] \ Asymmetric Block Ciphers \ RprimeRSA [A] \ Asymmetric Block Ciphers \ RSA [A] \ Asymmetric Block Ciphers \ RbRSA [D] \ Algorithms \ Asymmetric \ RSA [D] \ Visuals \ Extended RSA Cryptosystem |
|
2) Modern Ciphers |
|
RSA [attack] |
X |
T/W |
|
|
Indiv. Procedures \ RSA Cryptosystem \ Lattice-Based Attacks on RSA… Analysis \ Asymmetric Encryption \ Lattice-Based Attacks on RSA… \ Analysis \ Asymmetric Encryption \ Side-Channel Attack on “Textbook RSA”… |
[T] \ Cryptanalysis \ Modern \ RSA Common Factor Attack [W] \ Cryptanalysis \ Modern Encryption \ Asymmetric Encryption \ RSA |
|
|
7) Moderne Kryptoanalyse |
|
RSA [visual] |
X |
|
|
X |
Indiv. Procedures \ RSA Cryptosystem \ |
|
|
RSA (step-by-step) |
10) Learning Aids and Visualizations |
|
RSA-AES |
X |
|
|
|
Encrypt/Decrypt \ Hybrid \ RSA-AES… |
|
|
|
2) Modern Ciphers |
|
Runs-Test (test PRNG) |
X |
|
|
|
Analysis \ Analyze Randomness \ Runs Test… |
|
|
|
6) Classic Cryptanalysis |
|
Pseudo random number generator (PRNG) of the Secude library |
X |
|
|
|
Indiv. Procedures \ Tools \ Generate Random Numbers… |
|
|
|
5) Random Number Generators |
|
Secure email (S/MIME) [visual] |
X |
|
|
|
Indiv. Procedures \ Protocols \ Secure E-Mail with S/MIME… |
|
|
|
10) Learning Aids and Visualizations |
|
Serial-Test (test PRNG) |
X |
|
|
|
Analysis \ Analyze Randomness \ Serial Test… |
|
|
|
7) Modern Cryptanalysis |
|
Serpent |
X |
|
A |
|
Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ Serpent… |
|
[A] \ Block Ciphers \ Serpent \ Serpent192_CBC [A] \ Block Ciphers \ Serpent \ Serpent192_CFB [A] \ Block Ciphers \ Serpent \ Serpent128_OFB [A] \ Block Ciphers \ Serpent \ Serpent256_ECB [A] \ Block Ciphers \ Serpent \ Serpent256_OFB [A] \ Block Ciphers \ Serpent \ Serpent256_CFB [A] \ Block Ciphers \ Serpent \ Serpent128_ECB [A] \ Block Ciphers \ Serpent \ Serpent192_OFB [A] \ Block Ciphers \ Serpent \ Serpent192_ECB [A] \ Block Ciphers \ Serpent \ Serpent128_CBC [A] \ Block Ciphers \ Serpent \ Serpent128_CFB [A] \ Block Ciphers \ Serpent \ Serpent256_CBC |
|
2) Modern Ciphers |
|
Serpent [attack] |
X |
|
|
|
Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ Serpent… |
|
|
|
7) Modern Cryptanalysis |
|
SHA |
X |
C/T |
A/D |
|
Indiv. Procedures \ Hash \ SHA-1 Indiv. Procedures \ Hash \ SHA-256 Indiv. Procedures \ Hash \ SHA-512 |
[C] \ Hash functions \ SHA [T] \ Hash Functions \ SHA-1 Collision [T] \ Hash Functions \ SHA-1 [T] \ Hash Functions \ SHA-256 |
[A] \ Message Digests \ SHA384 [A] \ Message Digests \ SHA224 [A] \ Message Digests \ SHA1 [A] \ Message Digests \ SHA256 [A] \ Message Digests \ SHA512 [A] \ Pseudo Random Number Generators \ SHA1PRNG [D] \ Algorithms \ Hash \ SHA-256 [D] \ Algorithms \ Random Number Generator \ SHA-1 [D] \ Algorithms \ Hash \ SHA-3 Candidates |
|
3) Hash and MAC Algorithms |
|
Shamir’s secret sharing (MPC) [visual] |
X |
|
|
|
Indiv. Procedures \ Secret Sharing Demonstration (Shamir)… |
|
|
|
10) Learning Aids and Visualizations |
|
Solitaire |
X |
C/T |
|
|
Encrypt/Decrypt \ Symmetric (classic) \ Solitaire… |
[C] \ Classic Ciphers \ Solitaire [T] \ Cryptography \ Classical \ Solitaire Cipher |
|
|
1) Classic Ciphers |
|
Solitaire [analysis] |
X |
T/C |
|
|
Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Solitaire… Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Solitaire… |
[T] \ Cryptanalysis \ Classical \ Solitaire Brute-Force Analysis [C] \ Cryptanalysis \ Specific \ Solitaire Analyzer |
|
|
6) Classic Cryptanalysis |
|
Substitution |
X |
T/C/W |
D |
X |
Encrypt/Decrypt \ Symmetric (classic) \ Substitution / Atbash… |
[T] \ Cryptography \ Classical \ Substitution Cipher Using a Password [C] \ Classic Ciphers \ Substitution [T] \ Cryptography \ Classical \ Substitution Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Substitution |
[D] \ Algorithms \ Classic \ Substitution |
Monoalphabetic Substitution |
1) Classic Ciphers |
|
Substitution [analysis] |
X |
C/T/W |
D |
|
Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Substitution… Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Substitution… |
[C] \ Cryptanalysis \ Specific \ Monoalphabetic Substitution Analyzer [T] \ Cryptanalysis \ Classical \ Monoalphabetic Substitution Analyzer [T] \ Cryptanalysis \ Classical \ Monoalphabetic Substitution Analyzer with Arbitrary Ciphertext Alphabet [W] \ Cryptanalysis \ Classic Encryption \ Monoalphabetic Substitution |
[D] \ Analysis \ Substitution Analysis |
|
6) Classic Cryptanalysis |
|
Transposition (single column transposition) |
X |
C/T/W |
D |
X |
Encrypt/Decrypt \ Symmetric (classic) \ Permutation / Transposition… |
[C] \ Classic Ciphers \ Transposition [T] \ Cryptography \ Classical \ Transposition Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Transposition |
[D] \ Algorithms \ Classic \ Transposition |
Transposition |
1) Classic Ciphers |
|
Transposition [analysis] |
X |
T/C/W |
D |
|
Analysis \ Symmetric Encryption (classic) \ Known Plaintext \ Single Column Transposition… |
[T] \ Cryptanalysis \ Classical \ Transposition Brute-Force Analysis [T] \ Cryptanalysis \ Classical \ Transposition Crib Analysis [T] \ Cryptanalysis \ Classical \ Transposition Genetic Analysis [T] \ Cryptanalysis \ Classical \ Transposition Hill Climbing Analysis [C] \ Cryptanalysis \ Specific \ Transposition Analyzer [W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Brute-force [W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Genetic |
[D] \ Analysis \ Transposition Analysis |
|
6) Classic Cryptanalysis |
|
Twofish |
X |
T |
A |
|
Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ Twofish… |
[T] \ Cryptography \ Modern \ Symmetric \ Twofish Cipher |
[A] \ Block Ciphers \ Twofish |
|
2) Modern Ciphers |
|
Twofish [attack] |
X |
|
|
|
Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ Twofish… |
|
|
|
7) Modern Cryptanalysis |
|
Zip/Unzip |
X |
|
|
|
Indiv. Procedures \ Tools \ Compress \ UnZip Indiv. Procedures \ Tools \ Compress \ Zip |
|
|
|
9) Codings |
|
UU Decode/Encode |
X |
|
|
|
Indiv. Procedures \ Tools \ Codes \ UU Encode/Decode \ UU Decode Indiv. Procedures \ Tools \ Codes \ UU Encode/Decode \ UU Encode |
|
|
|
9) Codings |
|
Signature verification |
X |
|
D |
|
Digital Signatures, PKI \ Verify Signature… |
|
[D] \ Visuals \ Signature Verification |
|
4) Digital Signatures, PKI |
|
Vernam |
X |
C/T |
|
X |
Encrypt/Decrypt \ Symmetric (classic) \ Vernam \ OTP… |
[C] \ Classic Ciphers \ Vernam [T] \ Cryptography \ Classical \ Vernam Cipher |
|
Vernam |
1) Classic Ciphers |
|
Vernam [analysis] |
X |
|
|
|
Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ XOR / Vernam |
|
|
|
6) Classic Cryptanalysis |
|
Vigenère cipher |
X |
C/T/W |
D |
X |
Encrypt/Decrypt \ Symmetric (classic) \ Vigenère… |
[C] \ Classic Ciphers \ Vigenère [T] \ Cryptography \ Classical \ Vigenère Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Vigenère |
[D] \ Algorithms \ Classic \ Autokey-Vigenère [D] \ Algorithms \ Classic \ Vigenère |
Autokey Vigenère |
1) Classic Ciphers |
|
Vigenère [analysis] |
X |
T/W/C |
D |
X |
Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Vigenère Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Vigenère (Analysis according to Schroedel)… |
[T] \ Cryptanalysis \ Classical \ Vigenère Analysis [W] \ Cryptanalysis \ Classic Encryption \ Vigenère [C] \ Cryptanalysis \ Specific \ Vigenère Analyzer |
[D] \ Analysis \ Vigenère Breaker |
Vigenère Analysis |
6) Classic Cryptanalysis |
|
Vigenère [visual] |
X |
|
|
|
Indiv. Procedures \ Visualization of Algorithms \ Vigenère… |
|
|
|
10) Learning Aids and Visualizations |
|
Vitányi [analysis] |
X |
|
|
|
Analysis \ Analyze Randomness \ Vitányi |
|
|
|
7) Modern Cryptanalysis |
|
X^2 (mod N) (PRNG) |
X |
|
|
|
Indiv. Procedures \ Tools \ Generate Random Numbers… |
|
|
|
5) Random Number Generators |
|
XOR |
X |
C/T/W |
D |
X |
Encrypt/Decrypt \ Symmetric (classic) \ XOR… |
[C] \ Classic Ciphers \ XOR [T] \ Cryptography \ Classical \ XOR Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ XOR |
[D] \ Algorithms \ Classic \ XOR |
XOR |
1) Classic Ciphers |
|
ASCII |
|
|
|
X |
|
|
|
ASCII |
9) Codings |
|
ATBASH |
|
|
|
X |
|
|
|
ATBASH |
1) Classic Ciphers |
|
Steganography |
|
C/T |
|
X |
|
[C] \ Steganography \ Image Steganography [T] \ Steganography \ Image Steganography with BPCS [T] \ Steganography \ Image Steganography with LSB [C] \ Steganography \ Text Steganography [T] \ Steganography \ Text Steganography with Capital Letters (binary mode) [T] \ Steganography \ Text Steganography with Capital Letters [T] \ Steganography \ Text Steganography with Letter Marking (binary mode) [T] \ Steganography \ Text Steganography with Letter Marking [T] \ Steganography \ Text Steganography with Zero Width Spaces |
|
Bacon |
8) Steganography |
|
Barcode |
|
|
|
X |
|
|
|
Barcode |
9) Codings |
|
Base64 |
|
|
|
X |
|
|
|
Base64 |
9) Codings |
|
Beaufort cipher |
|
|
|
X |
|
|
|
Beaufort |
1) Classic Ciphers |
|
Bit shift |
|
|
|
X |
|
|
|
Bit Shift |
14) Tools |
|
Corona / COVID |
|
|
|
X |
|
|
|
Corona Tracing |
10) Learning Aids and Visualizations |
|
Gronsfeld cipher |
|
|
|
X |
|
|
|
Gronsfeld |
1) Classic Ciphers |
|
Huffman |
|
C/T |
D |
X |
|
[C] \ Tools \ Codes \ Huffman [T] \ Tools \ Huffman’s Algorithm (ASCII) [T] \ Tools \ Huffman’s Algorithm (BMG, JPG) [T] \ Tools \ Huffman’s Algorithm (UTF-8) |
[D] \ Visuals \ Huffman Coding |
Huffman
|
9) Codings |
|
Kamasutra cipher |
|
|
|
X |
|
|
|
Kamasutra |
1) Classic Ciphers |
|
Morse code |
|
C/T/W |
|
X |
|
[C] \ Tools \ Codes \ Morse Code [T] \ Codes \ Morse Code [W] \ Codes \ Morse Code |
|
Morse Code |
9) Codings |
|
Multiplicative cipher |
|
|
|
X |
|
|
|
Multiplicative |
1) Classic Ciphers |
|
N-gram analysis |
|
|
|
X |
|
|
|
Tabular N-gram Analysis |
6) Classic Cryptanalysis |
|
Cipher identifier |
|
|
|
X |
|
|
|
NCID |
6) Classic Cryptanalysis |
|
Tools |
|
C |
|
X |
|
[C] \ Cryptanalysis \ Generic \ Contains [C] \ Tools \ Misc \ Number Operation [C] \ Tools \ Misc \ Progress |
|
Numberconverter Password Check Password Generator Password Meter |
14) Tools |
|
OpenSSL |
|
|
|
X |
|
|
|
OpenSSL |
10) Learning Aids and Visualizations |
|
Porta |
|
|
|
X |
|
|
|
Porta |
1) Classic Ciphers |
|
Railfence |
|
|
|
X |
|
|
|
Railfence |
1) Classic Ciphers |
|
Redefence |
|
|
|
X |
|
|
|
Redefence |
1) Classic Ciphers |
|
Rotation cipher |
|
|
|
X |
|
|
|
Rotation |
1) Classic Ciphers |
|
Scytale |
|
C/T/W |
|
X |
|
[C] \ Classic Ciphers \ Scytale [T] \ Cryptography \ Classical \ Scytale Cipher [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Scytale |
|
Scytale |
1) Classic Ciphers |
|
Trithemius |
|
|
|
X |
|
|
|
Trithemius |
1) Classic Ciphers |
|
Alphabet |
|
C |
|
|
|
[C] \ Tools \ Data flow \ Alphabet Permutator |
|
|
6) Classic Cryptanalysis |
|
Camellia |
|
C/T |
A |
|
|
[C] \ Modern Ciphers \ Symmetric \ Camellia [T] \ Cryptography \ Modern \ Symmetric \ Camellia Cipher |
[A] \ Block Ciphers \ Camellia \ Camellia256_CBC [A] \ Block Ciphers \ Camellia \ Camellia192_CBC [A] \ Block Ciphers \ Camellia \ Camellia128_CBC |
|
2) Modern Ciphers |
|
Data input/output |
|
C/T |
|
|
|
[C] \ Tools \ Data input/output \ Clipboard Input [C] \ Tools \ Data input/output \ Clipboard Output [C] \ Tools \ Data flow \ Clock [C] \ Tools \ Data input/output \ IP Frame Generator [C] \ Tools \ Data input/output \ Audio Input [C] \ Tools \ Data input/output \ Audio Output [C] \ Tools \ Boolean \ Boolean Input [T] \ Tools \ Take a Picture Using the Webcam [C] \ Tools \ Boolean \ Boolean Output [T] \ Tools \ Random Decimal Number [C] \ Tools \ Misc \ ImageProcessor [C] \ Tools \ Data input/output \ Network Receiver [C] \ Tools \ Data input/output \ Network Sender [C] \ Tools \ Data input/output \ Number Input [C] \ Tools \ Data input/output \ Camera [C] \ Tools \ Data input/output \ Text Input [C] \ Tools \ Data flow \ CSVReader [C] \ Tools \ Data input/output \ Dictionary [C] \ Tools \ Data input/output \ File Input |
|
|
14) Tools |
|
Data flow |
|
C/T |
|
|
|
[C] \ Tools \ Data flow \ Concatenate [C] \ Tools \ Boolean \ Boolean Function Parser [C] \ Tools \ Data flow \ Array Indexer [C] \ Tools \ Boolean \ Boolean Binary Operator [C] \ Tools \ Boolean \ Boolean If-Else Operator [C] \ Tools \ Boolean \ Boolean Not Operator [C] \ Tools \ Misc \ Comparators [C] \ Tools \ Misc \ Converter [C] \ Tools \ Codes \ String Decoder [C] \ Tools \ Codes \ String Encoder [C] \ Tools \ Misc \ Length [C] \ Tools \ Data flow \ Variable Load [C] \ Tools \ Data flow \ Variable Store [C] \ Tools \ Misc \ Stream Comparator [T] \ Tools \ Split a Text [C] \ Tools \ Data input/output \ File Output [C] \ Tools \ Data flow \ Gate [T] \ Tools \ Loop [C] \ Tools \ Misc \ Inc Dec [C] \ Tools \ Data input/output \ Picture Output [C] \ Tools \ Data flow \ Splitter [C] \ Tools \ Misc \ String Operations [C] \ Tools \ Data input/output \ Text Output |
|
|
14) Tools |
|
Cyclic redundancy check (CRC) |
|
T/C |
|
|
|
[T] \ Hash Functions \ CRC Null Problems [C] \ Hash functions \ CRC [T] \ Hash Functions \ CRC |
|
|
3) Hash and MAC Algorithms |
|
Scytale [analysis] |
|
T/W |
|
|
|
[T] \ Cryptanalysis \ Classical \ Scytale Brute-Force Analysis [W] \ Cryptanalysis \ Classic Encryption \ Scytale |
|
|
6) Classic Cryptanalysis |
|
Achterbahn |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ Achterbahn [T] \ Cryptography \ Modern \ Symmetric \ Achterbahn Cipher |
|
|
2) Modern Ciphers |
|
Alphabets |
|
C |
|
|
|
[C] \ Tools \ Data input/output \ Alphabets |
|
|
6) Classic Cryptanalysis |
|
Berlekamp-Massey algorithm |
|
C/T |
|
|
|
[C] \ Cryptanalysis \ Generic \ Berlekamp-Massey Algorithm [T] \ Mathematics \ Berlekamp-Massey |
|
|
7) Modern Cryptanalysis |
|
Cube [attack] |
|
C |
|
|
|
[C] \ Cryptanalysis \ Specific \ Cube Attack |
|
|
7) Modern Cryptanalysis |
|
Trivium [attack] |
|
T |
|
|
|
[T] \ Cryptanalysis \ Modern \ Cube Attack on Trivium |
|
|
7) Modern Cryptanalysis |
|
Enigma |
|
C/T/W |
|
|
|
[C] \ Classic Ciphers \ Enigma [T] \ Cryptography \ Classical \ Enigma Cipher Machine [W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Enigma |
|
|
1) Classic Ciphers |
|
Enigma [attack] |
|
T/W/C |
|
|
|
[T] \ Cryptanalysis \ Classical \ Enigma Gillogly Attack [T] \ Cryptanalysis \ Classical \ Enigma Hillclimbing Attack [T] \ Cryptanalysis \ Classical \ Enigma Simulated Annealing Attack [T] \ Cryptanalysis \ Classical \ Enigma Turing Bombe Attack [T] \ Cryptanalysis \ Classical \ Enigma Turing Bombe Attack (with Turnover) [W] \ Cryptanalysis \ Classic Encryption \ Enigma [C] \ Cryptanalysis \ Specific \ Enigma Analyzer |
|
|
6) Classic Cryptanalysis |
|
Fialka |
|
C/T |
|
|
|
[C] \ Classic Ciphers \ Fialka [T] \ Cryptography \ Classical \ Fialka ED Check [T] \ Cryptography \ Classical \ Fialka ED Mixed Mode Check [T] \ Cryptography \ Classical \ Fialka ED NumLock10 Check [T] \ Cryptography \ Classical \ Fialka Key Output [T] \ Cryptography \ Classical \ Fialka M-125-3 PROTON II [T] \ Cryptography \ Classical \ Fialka M-125 PROTON I |
|
|
6) Classic Cryptanalysis |
|
Friedman test |
|
T/C |
D |
|
|
[T] \ Cryptanalysis \ Classical \ Friedman Test for Classical Ciphers [C] \ Cryptanalysis \ Generic \ Friedman Test |
[D] \ Analysis \ Friedman Test |
|
6) Classic Cryptanalysis |
|
HIGHT |
|
C |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ HIGHT |
|
|
2) Modern Ciphers |
|
WEP [attack] |
|
T/C |
|
|
|
[T] \ Protocols \ WEP Attack [C] \ Protocols \ Attacks on the WEP Protocol |
|
|
7) Modern Cryptanalysis |
|
Kasiski test |
|
C |
|
|
|
[C] \ Cryptanalysis \ Generic \ Kasiski’s Test |
|
|
6) Classic Cryptanalysis |
|
Pseudo random number generator (PRNG) |
|
C/T/W |
|
|
|
[C] \ Tools \ Random Number \ LFSR [C] \ Tools \ Random Number \ NLFSR [C] \ Tools \ Random Number \ Random Number Generator [T] \ Tools \ Random Number Generators [W] \ Tools \ Random numbers |
|
|
5) Random Number Generators |
|
LFSR |
|
T |
D |
|
|
[T] \ Mathematics \ Linear Feedback Shift Register (LFSR) |
[D] \ Algorithms \ Symmetric \ LFSR |
|
1) Klassische Chiffren |
|
M-138 |
|
C/T |
|
|
|
[C] \ Classic Ciphers \ M-138 [T] \ Cryptography \ Classical \ M-138 |
|
|
1) Classic Ciphers |
|
M-138 [attack] |
|
C/T |
|
|
|
[C] \ Cryptanalysis \ Specific \ M-138 Analyzer [T] \ Cryptanalysis \ Classical \ M-138 Ciphertext-Only Attack [T] \ Cryptanalysis \ Classical \ M-138 Known-Plaintext Attack [T] \ Cryptanalysis \ Classical \ M-138 Partially-Known Plaintext Attack |
|
|
6) Classic Cryptanalysis |
|
Visual codes (QR, EAN8, WAN13, Code39, Code128, PDF417) |
|
T/C/W |
|
|
|
[T] \ Codes \ RSA Signed QR Code [T] \ Codes \ QR Code Encryption [C] \ Tools \ Codes \ Visual Decoder [T] \ Codes \ QR Code File Decoding [T] \ Codes \ Detection of Optical Codes [C] \ Tools \ Codes \ Visual Encoder [T] \ Codes \ QR Code Creation [W] \ Codes \ Create visual code [W] \ Codes \ Decode visual code |
|
|
3) Hash and MAC Algorithms |
|
PKCS#5 AES |
|
T |
|
|
|
[T] \ Cryptography \ Modern \ Symmetric \ AES with PKCS#5 [T] \ Cryptography \ Modern \ Symmetric \ AES (CBC) with PKCS#5 and IV [T] \ Cryptography \ Modern \ Symmetric \ AES (ECB) with PKCS#5 |
|
|
2) Modern Ciphers |
|
MD5 [analysis] |
|
W |
|
|
|
[W] \ Cryptanalysis \ Modern Encryption \ Hash Functions \ MD5 |
|
|
3) Hash and MAC Algorithms |
|
NLFSR |
|
T |
|
|
|
[T] \ Mathematics \ Non-Linear Feedback Shift Register (NLFSR) |
|
|
2) Modern Ciphers |
|
Dictionary [attack] |
|
T |
|
|
|
[T] \ Hash Functions \ Dictionary Attack on a Password Hash Value |
|
|
7) Modern Cryptanalysis |
|
Avalanche effect |
|
C/T |
|
|
|
[C] \ Tools \ Misc \ Avalanche Visualization [T] \ Cryptanalysis \ Modern \ Avalanche (AES) [T] \ Cryptanalysis \ Modern \ Avalanche (Classic Ciphers) [T] \ Cryptanalysis \ Modern \ Avalanche (Compare Classic Ciphers) [T] \ Cryptanalysis \ Modern \ Avalanche (DES) [T] \ Cryptanalysis \ Modern \ Avalanche (Hash Functions) [T] \ Cryptanalysis \ Modern \ Avalanche (Modern Ciphers) |
|
|
10) Learning Aids and Visualizations |
|
BB84 |
|
C |
|
|
|
[C] \ Protocols \ BB84 Error Detector [C] \ Protocols \ BB84 Key Generator [C] \ Protocols \ BB84 Photonbase Generator [C] \ Protocols \ BB84 Photon Decoder [C] \ Protocols \ BB84 Photon Encoder |
|
|
13) Protocols |
|
Key exchange (BB84) |
|
T |
|
|
|
[T] \ Protocols \ BB84 Key Exchange with Eavesdropping Attack [T] \ Protocols \ BB84 Key Exchange |
|
|
13) Protocols |
|
BB84 [attack] |
|
C |
|
|
|
[C] \ Protocols \ BB84 Man in the Middle |
|
|
13) Protocols |
|
BLAKE |
|
C/T |
|
|
|
[C] \ Hash functions \ BLAKE [T] \ Hash Functions \ BLAKE [T] \ Hash Functions \ Password Storage Using Salted BLAKE-256 [T] \ Hash Functions \ Password Verification Using Salted BLAKE-256 |
|
|
3) Hash and MAC Algorithms |
|
Blind signature |
|
C |
|
|
|
[C] \ Modern Ciphers \ Asymmetric \ Blind Signature Generator [C] \ Modern Ciphers \ Asymmetric \ Blind Signature Verifier |
|
|
2) Modern Ciphers |
|
Paillier |
|
T/C |
|
|
|
[T] \ Cryptography \ Modern \ Asymmetric \ Blind Signature with Paillier [T] \ Cryptography \ Modern \ Asymmetric \ Blind Signature with RSA [T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Voting) [T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher with Blinding [T] \ Cryptography \ Modern \ Asymmetric \ Paillier Key Generator [C] \ Modern Ciphers \ Asymmetric \ Paillier Key Generator |
|
|
4) Digital Signatures, PKI |
|
Blowfish |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ Blowfish [T] \ Cryptography \ Modern \ Symmetric \ Blowfish Cipher |
|
|
2) Modern Ciphers |
|
Threefish |
|
T |
|
|
|
[T] \ Cryptography \ Modern \ Symmetric \ Threefish Cipher |
|
|
2) Modern Ciphers |
|
Boolean functions |
|
T |
|
|
|
[T] \ Mathematics \ Booleans |
|
|
14) Tools |
|
ISAP bit commitment scheme |
|
T/C |
|
|
|
[T] \ Mathematics \ ISAP Bit Commitment Scheme [C] \ Protocols \ ISAP Bit Commitment Scheme |
|
|
7) Modern Cryptanalysis |
|
ISBN |
|
T |
|
|
|
[T] \ Codes \ ISBN-10 Check [T] \ Codes \ ISBN-13 Check |
|
|
9) Codings |
|
Paillier (homomorphic encryption) |
|
T/C |
|
|
|
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Number Input) [T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher with Addition [C] \ Modern Ciphers \ Asymmetric \ Paillier [T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Text Input) |
|
|
2) Modern Ciphers |
|
Coin flipping protocol |
|
T/C |
|
|
|
[T] \ Protocols \ Coin Flipping Protocol [C] \ Protocols \ Coin Flipping |
|
|
13) Protocols |
|
Key exchange (Diffie-Hellman DH) |
|
T |
D |
|
|
[T] \ Protocols \ Diffie-Hellman Key-Exchange [T] \ Protocols \ Diffie-Hellman Key-Exchange over Network |
[D] \ Visuals \ Diffie-Hellman Key Exchange (EC) |
|
13) Protocols |
|
Dining cryptographers protocol |
|
T |
|
|
|
[T] \ Protocols \ Dining Cryptographers Protocol |
|
|
10) Learning Aids and Visualizations |
|
Yao’s millionaire problem (protocol) (MPC) |
|
T/C |
|
|
|
[T] \ Protocols \ Yao’s Millionaire Problem Protocol [C] \ Protocols \ Yao 1 [C] \ Protocols \ Yao 2 [C] \ Protocols \ Yao 3 |
|
|
13) Protocols |
|
Zero knowledge protocol |
|
T/C |
D |
|
|
[T] \ Protocols \ Zero Knowledge Protocol [C] \ Protocols \ Zero Knowledge Prover [C] \ Protocols \ Zero Knowledge Verifier |
[D] \ Visuals \ Zero-Knowledge: Magic Door [D] \ Visuals \ Zero-Knowledge: Fiat Shamir [D] \ Visuals \ Zero-Knowledge: Feige Fiat Shamir [D] \ Visuals \ Zero-Knowledge: Graph Isomorphism |
|
10) Learning Aids and Visualizations |
|
ChaCha |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ ChaCha [T] \ Cryptography \ Modern \ Symmetric \ ChaCha Cipher [T] \ Cryptography \ Modern \ Symmetric \ ChaCha Cipher (Presentation) |
|
|
2) Modern Ciphers |
|
Encoding |
|
T/W |
|
|
|
[T] \ Tools \ Text Encoding (e.g. Base64) [W] \ Codes \ Encoding |
|
|
14) Tools |
|
Cost function |
|
C/T |
|
|
|
[C] \ Cryptanalysis \ Generic \ Cost Function [T] \ Cryptanalysis \ Classical \ Cost Functions |
|
|
7) Modern Cryptanalysis |
|
SDES [analysis] |
|
T/W |
|
|
|
[T] \ Cryptanalysis \ Modern \ SDES Brute-Force Analysis [T] \ Cryptanalysis \ Modern \ SDES Analysis Using Entropy [T] \ Cryptanalysis \ Modern \ SDES Known-Plaintext Analysis [W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ SDES \ Ciphertext-only [W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ SDES \ Known plaintext |
|
|
7) Modern Cryptanalysis |
|
Cramer-Shoup |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Asymmetric \ Cramer-Shoup [T] \ Cryptography \ Modern \ Asymmetric \ Cramer-Shoup with AES [C] \ Modern Ciphers \ Asymmetric \ Cramer-Shoup Key Generator |
|
|
2) Modern Ciphers |
|
CBC [attack] |
|
T |
|
|
|
[T] \ Cryptanalysis \ Modern \ CBC Attack |
|
|
2) Modern Ciphers |
|
Padding oracle attack (POA) |
|
T/C |
|
|
|
[T] \ Cryptanalysis \ Modern \ Padding Oracle Attack on AES [T] \ Cryptanalysis \ Modern \ Padding Oracle Attack on DES [C] \ Cryptanalysis \ Specific \ Padding Oracle [C] \ Cryptanalysis \ Specific \ Padding Oracle Attack |
|
|
2) Modern Ciphers |
|
Secure Chat – Applied Cryptography |
|
T |
|
|
|
[T] \ Tools \ Simple Video and Audio Chat Using AES Encryption [T] \ Tools \ Diffie-Hellman AES Video Audio Chat [T] \ Tools \ Simple AES Chat |
|
|
3) Hash and MAC Algorithms |
|
Block mode |
|
T |
|
|
|
[T] \ Cryptography \ Modern \ Symmetric \ Block Modes of Symmetric Ciphers |
|
|
2) Modern Ciphers |
|
SDES |
|
C/T/W |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ SDES [T] \ Cryptography \ Modern \ Symmetric \ SDES Cipher [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ SDES |
|
|
2) Modern Ciphers |
|
Differential cryptanalysis (DCA) |
|
C/T |
|
|
|
[C] \ Cryptanalysis \ Specific \ DCA KeyRecovery [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 1 (Automatic Mode) [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 2 (Automatic Mode) [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 3 (Automatic Mode) [C] \ Cryptanalysis \ Specific \ DCA Oracle [C] \ Cryptanalysis \ Specific \ DCA PathFinder [C] \ Cryptanalysis \ Specific \ DCA PathVisualizer [C] \ Cryptanalysis \ Specific \ DCA ToyCipher |
|
|
7) Modern Cryptanalysis |
|
Differential cryptanalysis (DCA) [visual] |
|
T |
|
|
|
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 1 (Tutorial Mode) [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 2 (Tutorial Mode) [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 3 (Tutorial Mode) |
|
|
10) Learning Aids and Visualizations |
|
Decimalization |
|
C/T |
|
|
|
[C] \ Tools \ Misc \ Decimalization [T] \ Mathematics \ Decimalization |
|
|
10) Learning Aids and Visualizations |
|
DECODE database |
|
C |
|
|
|
[C] \ DECRYPT Project \ DECRYPTClustererCaption [C] \ DECRYPT Project \ DECRYPT Decipherer [C] \ DECRYPT Project \ DECRYPT Downloader [C] \ DECRYPT Project \ DecodeParserTesterCaption [C] \ DECRYPT Project \ DECRYPTSymbolHeatmapCaption [C] \ DECRYPT Project \ DECRYPTSyntaxAnalyzer [C] \ DECRYPT Project \ DECRYPT Viewer |
|
|
14) Tools |
|
DGK (homomorphic encryption) |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Asymmetric \ DGK [T] \ Cryptography \ Modern \ Asymmetric \ DGK Cipher (Text Input) [C] \ Modern Ciphers \ Asymmetric \ DGK Key Generator |
|
|
2) Modern Ciphers |
|
FEAL |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ FEAL [T] \ Cryptography \ Modern \ Symmetric \ FEAL Cipher |
|
|
2) Modern Ciphers |
|
Format preserving encryption (FPE) (FF1, FF2, FF3 and DFF) |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ Format Preserving Encryption (FPE) [T] \ Cryptography \ Modern \ Symmetric \ Format Preserving Encryption (XML) [T] \ Cryptography \ Modern \ Symmetric \ Format Preserving Encryption |
|
|
2) Modern Ciphers |
|
Grain |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ Grain v1 [T] \ Cryptography \ Modern \ Symmetric \ Grain v1 Cipher |
|
|
2) Modern Ciphers |
|
Grøstl |
|
C/T |
|
|
|
[C] \ Hash functions \ Grøstl [T] \ Hash Functions \ Grøstl [T] \ Hash Functions \ Password Storage Using Salted Grøstl-256 [T] \ Hash Functions \ Password Verification Using Salted Grøstl-256 |
|
|
3) Hash and MAC Algorithms |
|
HC128 |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ HC128 [T] \ Cryptography \ Modern \ Symmetric \ HC128 Cipher |
|
|
2) Modern Ciphers |
|
Key derivation function (KDF) |
|
C/T |
|
|
|
[C] \ Hash functions \ HKDF SHA-256 [T] \ Hash Functions \ KDF Performance Comparison (without Presentation) [T] \ Hash Functions \ KDF Performance Comparison (with Presentation) [C] \ Hash functions \ KKDF SHA-256 [C] \ Hash functions \ KKDF SHAKE256 |
|
|
3) Hash and MAC Algorithms |
|
Homophonic substitution [analysis] |
|
C/T |
|
|
|
[C] \ Cryptanalysis \ Specific \ Homophonic Substitution Analyzer [T] \ Cryptanalysis \ Classical \ Homophonic Substitution Analysis |
|
|
6) Classic Cryptanalysis |
|
Zodiac-408 [analysis] |
|
T |
|
|
|
[T] \ Cryptanalysis \ Classical \ Zodiac-408 Analysis |
|
|
6) Classic Cryptanalysis |
|
ImageHash |
|
C/T |
|
|
|
[C] \ Hash functions \ ImageHash [T] \ Hash Functions \ ImageHash [T] \ Hash Functions \ ImageHash – Smooth Comparison |
|
|
3) Hash and MAC Algorithms |
|
Keccak (hash, cipher, PRNG) |
|
C/T |
|
|
|
[C] \ Hash functions \ Keccak [T] \ Cryptography \ Modern \ Symmetric \ Keccak Cipher [T] \ Hash Functions \ Keccak Hash (SHA-3) [T] \ Tools \ Keccak Pseudorandom Number Generator (PRNG) |
|
|
5) Random Number Generators |
|
LAMBDA1 |
|
C/T |
|
|
|
[C] \ Classic Ciphers \ LAMBDA1 [T] \ Cryptography \ Modern \ Symmetric \ LAMBDA1 Block Cipher |
|
|
1) Classic Ciphers |
|
M209 |
|
C/T |
|
|
|
[C] \ Classic Ciphers \ M209 [T] \ Cryptography \ Classical \ M209 Cipher Machine [T] \ Cryptography \ Classical \ M209 Key Setup |
|
|
1) Classic Ciphers |
|
MD5 attack (collisions) |
|
C |
|
|
|
[C] \ Hash functions \ MD5 Collider |
|
|
7) Modern Cryptanalysis |
|
Mickey 2 |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ Mickey 2 [T] \ Cryptography \ Modern \ Symmetric \ Mickey 2 Cipher |
|
|
2) Modern Ciphers |
|
Heartbleed [analysis] |
|
T/W |
|
|
|
[T] \ Protocols \ Heartbleed Test [W] \ Tools \ Heartbleed analysis |
|
|
13) Protocols |
|
HTTP protocol |
|
T |
|
|
|
[T] \ Protocols \ HTTP Request |
|
|
13) Protocols |
|
Simple webserver |
|
T |
|
|
|
[T] \ Protocols \ Simple Webserver |
|
|
13) Protocols |
|
Simple multi-client communication – Applied Cryptography |
|
T |
|
|
|
[T] \ Protocols \ Simple Multi Client Communication |
|
|
13) Protocols |
|
Discrete logarithm |
|
T |
|
|
|
[T] \ Mathematics \ Discrete Logarithm |
|
|
7) Modern Cryptanalysis |
|
Oblivious transfer protocol (MPC) |
|
C/T |
|
|
|
[C] \ Protocols \ Oblivious Transfer 1 [T] \ Protocols \ Oblivious Transfer Protocol (1 out of n) [C] \ Protocols \ Oblivious Transfer 2 |
|
|
10) Learning Aids and Visualizations |
|
Purple |
|
C/T |
|
|
|
[C] \ Classic Ciphers \ Purple [T] \ Cryptography \ Classical \ PURPLE Cipher Machine |
|
|
1) Classic Ciphers |
|
Rabbit |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ Rabbit [T] \ Cryptography \ Modern \ Symmetric \ Rabbit Cipher |
|
|
2) Modern Ciphers |
|
PRESENT |
|
T/C |
|
|
|
[T] \ Cryptography \ Modern \ Symmetric \ PRESENT Cipher [C] \ Modern Ciphers \ Symmetric \ PRESENT |
|
|
2) Modern Ciphers |
|
Salsa20 |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ Salsa20 [T] \ Cryptography \ Modern \ Symmetric \ Salsa20 Cipher |
|
|
2) Modern Ciphers |
|
SAT solver |
|
C/T |
|
|
|
[C] \ Cryptanalysis \ Generic \ SAT Solver [T] \ Mathematics \ SAT Solver (File Input) [T] \ Mathematics \ SAT Solver (Text Input) |
|
|
14) Tools |
|
Sosemanuk |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ Sosemanuk [T] \ Cryptography \ Modern \ Symmetric \ Sosemanuk Cipher |
|
|
2) Modern Ciphers |
|
Spanish strip cipher (SSC) |
|
C/T |
|
|
|
[C] \ Classic Ciphers \ Spanish Strip Cipher [T] \ Cryptography \ Classical \ Spanish Strip Cipher |
|
|
1) Classic Ciphers |
|
Speck cipher |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ Speck [T] \ Cryptography \ Modern \ Symmetric \ Speck Cipher |
|
|
2) Modern Ciphers |
|
Lorenz SZ42 |
|
C |
|
|
|
[C] \ Classic Ciphers \ Lorenz SZ42 |
|
|
1) Classic Ciphers |
|
T-310 |
|
C/T |
|
|
|
[C] \ Classic Ciphers \ T-310 [T] \ Cryptography \ Classical \ T-310/50 Cipher Machine [T] \ Cryptography \ Classical \ T-310/51 Cipher Machine |
|
|
1) Classic Ciphers |
|
Transcriptor [analysis] |
|
C/T |
|
|
|
[C] \ Cryptanalysis \ Generic \ Transcriptor [T] \ Cryptanalysis \ Classical \ Transcriptor – Manual Mode [T] \ Cryptanalysis \ Classical \ Transcriptor – Semi-automatic Mode |
|
|
6) Classic Cryptanalysis |
|
VIC cipher |
|
C/T |
|
|
|
[C] \ Classic Ciphers \ VIC Cipher [T] \ Cryptography \ Classical \ VIC Cipher |
|
|
1) Classic Ciphers |
|
Visual cryptography |
|
C/T |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ Visual Cryptography [T] \ Cryptography \ Modern \ Symmetric \ Visual Cryptography |
|
|
2) Modern Ciphers |
|
VCard |
|
T |
|
|
|
[T] \ Codes \ vCard |
|
|
9) Codings |
|
Watermark creator |
|
C/T |
|
|
|
[C] \ Steganography \ Watermark Creator [T] \ Steganography \ Watermark Creator – Invisible Watermark [T] \ Steganography \ Watermark Creator – Robustness [T] \ Steganography \ Watermark Creator – Visible Watermark |
|
|
8) Steganography |
|
Navajo code |
|
T |
|
|
|
[T] \ Cryptography \ Classical \ Navajo Code |
|
|
1) Classic Ciphers |
|
TEA |
|
C/T/W |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ TEA [T] \ Cryptography \ Modern \ Symmetric \ TEA Cipher [W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ TEA |
|
|
2) Modern Ciphers |
|
Trivium |
|
C |
|
|
|
[C] \ Modern Ciphers \ Symmetric \ Trivium |
|
|
2) Modern Ciphers |
|
Kryptos K1 [analysis] |
|
T |
|
|
|
[T] \ Cryptanalysis \ Classical \ Kryptos K1 Analysis |
|
|
6) Classic Cryptanalysis |
|
Kryptos K2 [analysis] |
|
T |
|
|
|
[T] \ Cryptanalysis \ Classical \ Kryptos K2 Analysis |
|
|
6) Classic Cryptanalysis |
|
WEP |
|
C |
|
|
|
[C] \ Protocols \ WEP protocol |
|
|
2) Modern Ciphers |
|
One-time pad (OTP) |
|
T |
|
|
|
[T] \ Cryptography \ Classical \ One-Time Pad Demo [T] \ Cryptography \ Classical \ One-Time Pad Misusage |
|
|
1) Classic Ciphers |
|
Word pattern [analysis] |
|
T/C |
|
|
|
[T] \ Cryptanalysis \ Classical \ Wordpattern Analysis [T] \ Cryptanalysis \ Classical \ Wordpattern Analysis with Self-Defined Dictionary [C] \ Cryptanalysis \ Generic \ Word Patterns |
|
|
6) Classic Cryptanalysis |
|
Hamming distance |
|
C/T |
|
|
|
[C] \ Tools \ Misc \ HammingDistance [T] \ Mathematics \ Hamming Distance |
|
|
9) Codings |
|
IDP [analysis] |
|
C |
|
|
|
[C] \ Cryptanalysis \ Specific \ IDP Analyzer |
|
|
7) Modern Cryptanalysis |
|
Transposition (double column transposition) [attack] |
|
T |
|
|
|
[T] \ Cryptanalysis \ Classical \ Dictionary Attack on the Double Columnar Transposition Cipher |
|
|
7) Modern Cryptanalysis |
|
Key searcher |
|
C |
|
|
|
[C] \ Cryptanalysis \ Specific \ KeySearcher |
|
|
7) Modern Cryptanalysis |
|
Lattice [visual] |
|
N |
|
|
|
[N] \ Crypto tutorials \ Lattice-based Cryptography [N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptography \ GGH [N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptography \ LWE [N] \ Crypto tutorials \ Lattice-based Cryptography \ Shortest Vector Problem (SVP) \ Gauss algorithm [N] \ Crypto tutorials \ Lattice-based Cryptography \ Shortest Vector Problem (SVP) \ LLL algorithm [N] \ Crypto tutorials \ Lattice-based Cryptography \ Closest Vector Problem (CVP) \ Find closest vector |
|
|
15) Post-quantum cryptography (PQC) |
|
Lattice [attack] |
|
N |
|
|
|
[N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptanalysis \ Merkle-Hellman Knapsack [N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptanalysis \ RSA (Coppersmith’s attack) |
|
|
15) Post-quantum cryptography (PQC) |
|
Nihilist cipher |
|
C/T |
|
|
|
[C] \ Classic Ciphers \ Nihilist [T] \ Cryptography \ Classical \ Nihilist Cipher |
|
|
1) Classic Ciphers |
|
PKCS#1 [attack] |
|
N |
|
|
|
[N] \ Crypto tutorials \ Attacks on PKCS#1 [N] \ Crypto tutorials \ Attacks on PKCS#1 \ Attacks on PKCS#1 \ Bleichenbacher attack [N] \ Crypto tutorials \ Attacks on PKCS#1 \ Attacks on PKCS#1 \ Attack with shorter keys (Kuehn) |
|
|
10) Learning Aids and Visualizations |
|
PKCS#5 |
|
C |
|
|
|
[C] \ Hash functions \ PKCS#5 |
|
|
3) Hash and MAC Algorithms |
|
Powering [visual] |
|
N |
|
|
|
[N] \ Crypto tutorials \ World of Primes \ Number theory \ Powering (iterating exponent) [N] \ Crypto tutorials \ World of Primes \ Number theory \ Powering (iterating base)(RSA) |
|
|
12) Prime numbers |
|
RIPEMD |
|
C/T |
A |
|
|
[C] \ Hash functions \ RIPEMD160 [T] \ Hash Functions \ RIPEMD160 |
[A] \ Message Digests \ RIPEMD320 [A] \ Message Digests \ RIPEMD128 [A] \ Message Digests \ RIPEMD160 [A] \ Message Digests \ RIPEMD256 |
|
3) Hash and MAC Algorithms |
|
Password hash (SHA-1) |
|
T |
|
|
|
[T] \ Hash Functions \ Password Store Using Salted SHA-1 [T] \ Hash Functions \ Password Verification Using Salted SHA-1 |
|
|
3) Hash and MAC Algorithms |
|
PBKDF-1 (PKCS#5 2.0) |
|
T |
|
|
|
[T] \ Hash Functions \ PBKDF-1 (PKCS#5 2.0) |
|
|
3) Hash and MAC Algorithms |
|
Virtual smartcard |
|
C/T |
|
|
|
[C] \ Protocols \ Smartcard [T] \ Protocols \ Communication with a SmartCard [C] \ Protocols \ Smartcard Interpreter |
|
|
10) Learning Aids and Visualizations |
|
Levenshtein distance |
|
T |
|
|
|
[T] \ Mathematics \ Levenshtein Distance |
|
|
14) Tools |
|
Tiger |
|
C/T |
A |
|
|
[C] \ Hash functions \ Tiger [T] \ Hash Functions \ Tiger |
[A] \ Message Digests \ Tiger |
|
3) Hash and MAC Algorithms |
|
Transposition (double column transposition) |
|
T |
|
|
|
[T] \ Cryptography \ Classical \ Double Columnar Transposition Cipher |
|
|
1) Classic Ciphers |
|
Whirlpool |
|
C/T |
|
|
|
[C] \ Hash functions \ Whirlpool [T] \ Hash Functions \ Whirlpool |
|
|
3) Hash and MAC Algorithms |
|
Crib [analysis] |
|
W |
|
|
|
[W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Crib |
|
|
6) Classic Cryptanalysis |
|
Encryption with AES and password |
|
W |
|
|
|
[W] \ Tools \ Encrypt with password |
|
|
13) Protocols |
|
ElGamal |
|
|
A/D |
|
|
|
[A] \ Asymmetric Block Ciphers \ ElGamal [D] \ Algorithms \ Asymmetric \ ElGamal |
|
2) Modern Ciphers |
|
McEliece signature |
|
|
A |
|
|
|
[A] \ Asymmetric Block Ciphers \ McEliecePKCS |
|
15) Post-quantum cryptography (PQC) |
|
Niederreiter |
|
|
A |
|
|
|
[A] \ Asymmetric Block Ciphers \ Niederreiter [A] \ Signatures \ NiederreiterCFS |
|
15) Post-quantum cryptography (PQC) |
|
RC5 |
|
|
A |
|
|
|
[A] \ Block Ciphers \ RC5 |
|
2) Modern Ciphers |
|
Shacal |
|
|
A |
|
|
|
[A] \ Block Ciphers \ Shacal [A] \ Block Ciphers \ Shacal2 |
|
2) Modern Ciphers |
|
SAFER++ |
|
|
A |
|
|
|
[A] \ Block Ciphers \ SAFER++ [A] \ Message Authentication Codes \ CBCMac \ CBCmacSAFER++ |
|
2) Modern Ciphers |
|
SAFER+ |
|
|
A |
|
|
|
[A] \ Block Ciphers \ SAFER+ [A] \ Message Authentication Codes \ CBCMac \ CBCmacSAFER+ |
|
2) Modern Ciphers |
|
Misty |
|
|
A |
|
|
|
[A] \ Block Ciphers \ Misty1 |
|
2) Modern Ciphers |
|
ECIES |
|
|
A |
|
|
|
[A] \ Hybrid Ciphers \ ECIES |
|
2) Modern Ciphers |
|
McEliece |
|
|
A/D |
|
|
|
[A] \ Hybrid Ciphers \ McElieceFujisakiCipher [A] \ Hybrid Ciphers \ McElieceKobaraImaiCipher [D] \ Visuals \ McEliece Cryptosystem |
|
15) Post-quantum cryptography (PQC) |
|
AES MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ CMac \ CmacAES128 [A] \ Message Authentication Codes \ CMac \ CmacAES192 [A] \ Message Authentication Codes \ CMac \ CmacAES256 [A] \ Message Authentication Codes \ CBCMac \ CBCmacAES256 [A] \ Message Authentication Codes \ CBCMac \ CBCmacAES192 [A] \ Message Authentication Codes \ CBCMac \ CBCmacAES128 |
|
3) Hash and MAC Algorithms |
|
DES MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ CMac \ CmacDESede [A] \ Message Authentication Codes \ CBCMac \ CBCmacDESede |
|
3) Hash and MAC Algorithms |
|
Tiger MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ HMac \ HmacTiger |
|
3) Hash and MAC Algorithms |
|
FORK MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ HMac \ HmacFORK256 |
|
3) Hash and MAC Algorithms |
|
SHA MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ HMac \ HmacSHA512 [A] \ Message Authentication Codes \ HMac \ HmacSHA1 [A] \ Message Authentication Codes \ HMac \ HmacSHA224 [A] \ Message Authentication Codes \ HMac \ HmacSHA256 [A] \ Message Authentication Codes \ HMac \ HmacSHA384 |
|
3) Hash and MAC Algorithms |
|
RIPEMD MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ HMac \ HmacRIPEMD256 [A] \ Message Authentication Codes \ HMac \ HmacRIPEMD128 [A] \ Message Authentication Codes \ HMac \ HmacRIPEMD160 [A] \ Message Authentication Codes \ HMac \ HmacRIPEMD320 |
|
3) Hash and MAC Algorithms |
|
DHA MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ HMac \ HmacDHA256 |
|
3) Hash and MAC Algorithms |
|
Serpent MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ CBCMac \ CBCmacSerpent |
|
3) Hash and MAC Algorithms |
|
RC5 MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ CBCMac \ CBCmacRC5 |
|
3) Hash and MAC Algorithms |
|
RC6 MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ CBCMac \ CBCmacRC6 |
|
3) Hash and MAC Algorithms |
|
RC2 MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ CBCMac \ CBCmacRC2 |
|
3) Hash and MAC Algorithms |
|
IDEA MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ CBCMac \ CBCmacIDEA |
|
3) Hash and MAC Algorithms |
|
Misty MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ CBCMac \ CBCmacMisty1 |
|
3) Hash and MAC Algorithms |
|
MARS MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ CBCMac \ CBCmacMARS |
|
3) Hash and MAC Algorithms |
|
Camellia MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ CBCMac \ CBCmacCamellia |
|
3) Hash and MAC Algorithms |
|
Twofish MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ CBCMac \ CBCmacTwofish |
|
3) Hash and MAC Algorithms |
|
Shacal MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ CBCMac \ CBCmacShacal [A] \ Message Authentication Codes \ CBCMac \ CBCmacShacal2 |
|
3) Hash and MAC Algorithms |
|
TwoTrack MAC |
|
|
A |
|
|
|
[A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac160 [A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac64 [A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac32 [A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac96 [A] \ Message Authentication Codes \ TwoTrackMac \ TTmac128 |
|
3) Hash and MAC Algorithms |
|
DHA |
|
|
A |
|
|
|
[A] \ Message Digests \ DHA256 |
|
3) Hash and MAC Algorithms |
|
VSH |
|
|
A |
|
|
|
[A] \ Message Digests \ VSH |
|
3) Hash and MAC Algorithms |
|
MD |
|
|
A |
|
|
|
[A] \ Message Digests \ MD5 [A] \ Message Digests \ MD4 |
|
3) Hash and MAC Algorithms |
|
FORK |
|
|
A |
|
|
|
[A] \ Message Digests \ FORK256 |
|
3) Hash and MAC Algorithms |
|
PBES2 |
|
|
A |
|
|
|
[A] \ Password-Based Ciphers \ PBES2 |
|
2) Modern Ciphers |
|
Blum Blum Shub (BBS) – PRNG |
|
|
A |
|
|
|
[A] \ Pseudo Random Number Generators \ BBSRandom |
|
5) Random Number Generators |
|
EC PRNG |
|
|
A |
|
|
|
[A] \ Pseudo Random Number Generators \ ECPRNG |
|
5) Random Number Generators |
|
RSA signature |
|
|
A |
|
|
|
[A] \ Signatures \ RprimeRSA [A] \ Signatures \ RSASignaturePKCS1v15 \ RIPEMD160/RSA [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA384withRSA [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA1/RSA/RAW [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA512withRSA [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA384/RSA/RAW [A] \ Signatures \ RSASignaturePKCS1v15 \ MD5withRSA [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA224/RSA [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA256withRSA [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA1/RSA [A] \ Signatures \ RSASignaturePKCS1v15 \ MD5/RSA/RAW [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA512/RSA/RAW [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA224/RSA/RAW [A] \ Signatures \ RSASignaturePKCS1v15 \ RIPEMD160/RSA/RAW [A] \ Signatures \ RSASignaturePKCS1v15 \ SHA256/RSA/RAW [A] \ Signatures \ RbRSA [A] \ Signatures \ SSL_MD5andSHA1withRSA |
|
4) Digital Signatures, PKI |
|
GQ signature |
|
|
A |
|
|
|
[A] \ Signatures \ IQGQSignature \ IQGQ [A] \ Signatures \ IQGQSignature \ RIPEMD160withIQGQ |
|
4) Digital Signatures, PKI |
|
Winternitz signature |
|
|
A/D |
|
|
|
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_1 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_3 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_4 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_1 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_2 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_3 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_3 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_4 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_2 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_1 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_1 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_4 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_2 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_4 [A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_3 [D] \ Visuals \ Winternitz OT-Signature (WOTS / WOTS+) |
|
4) Digital Signatures, PKI |
|
CMSS signature |
|
|
A |
|
|
|
[A] \ Signatures \ CMSSSignature \ CMSS |
|
4) Digital Signatures, PKI |
|
GMSS signature |
|
|
A |
|
|
|
[A] \ Signatures \ GMSSSignature \ GMSSwithSHA512 [A] \ Signatures \ GMSSSignature \ GMSSwithSHA1 [A] \ Signatures \ GMSSSignature \ GMSSwithSHA224 [A] \ Signatures \ GMSSSignature \ GMSSwithSHA256 [A] \ Signatures \ GMSSSignature \ GMSSwithSHA384 |
|
4) Digital Signatures, PKI |
|
Merkle signature |
|
|
A/D |
|
|
|
[A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA512 [A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA384 [A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA1 [A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA256 [D] \ Visuals \ Merkle Signatures (XMSS^MT) |
|
15) Post-quantum cryptography (PQC) |
|
Bifid |
|
|
D |
|
|
|
[D] \ Algorithms \ Classic \ Bifid |
|
1) Classic Ciphers |
|
Double box |
|
|
D |
|
|
|
[D] \ Algorithms \ Classic \ Double Box |
|
1) Classic Ciphers |
|
Dragon |
|
|
D |
|
|
|
[D] \ Algorithms \ Symmetric \ Dragon |
|
2) Modern Ciphers |
|
Fleissner Grille [analysis] |
|
|
D |
|
|
|
[D] \ Analysis \ Fleissner-Grille Analysis |
|
6) Classic Cryptanalysis |
|
Viterbi [analysis] |
|
|
D |
|
|
|
[D] \ Analysis \ Viterbi Analysis |
|
6) Classic Cryptanalysis |
|
Divider game |
|
|
D |
|
|
|
[D] \ Games \ Divider Game |
|
11) Games |
|
Zudo-Ku |
|
|
D |
|
|
|
[D] \ Games \ Zudo-Ku |
|
11) Games |
|
Key exchange (multipartite) |
|
|
D |
|
|
|
[D] \ Visuals \ Multipartite Key Exchange (BD II) |
|
10) Learning Aids and Visualizations |
|
Ant Colony Optimization (ACO) |
|
|
D |
|
|
|
[D] \ Visuals \ Ant Colony Optimization (ACO) |
|
10) Learning Aids and Visualizations |
|
Android Unlock Pattern (AUP) |
|
|
D |
|
|
|
[D] \ Visuals \ Android Unlock Pattern (AUP) |
|
10) Learning Aids and Visualizations |
|
Shanks Babystep-Giantstep |
|
|
D |
|
|
|
[D] \ Visuals \ Shanks Babystep-Giantstep |
|
10) Learning Aids and Visualizations |
|
Certificate verification |
|
|
D |
|
|
|
[D] \ Visuals \ Certificate Verification |
|
10) Learning Aids and Visualizations |
|
EC calculations |
|
|
D |
|
|
|
[D] \ Visuals \ Elliptic Curve Calculations |
|
10) Learning Aids and Visualizations |
|
Reciprocal subtraction |
|
|
D |
|
|
|
[D] \ Visuals \ Extended Euclidean / Reciprocal Subtraction |
|
10) Learning Aids and Visualizations |
|
Homomorphic Encryption (HE) (with RSA, Paillier, Gentry & Hallevi) |
|
|
D |
|
|
|
[D] \ Visuals \ Homomorphic Encryption (HE) |
|
10) Learning Aids and Visualizations |
|
Public-Key Infrastructure |
|
|
D |
|
|
|
[D] \ Visuals \ Public-Key Infrastructure |
|
4) Digital Signatures, PKI |
|
Kleptography (4 methods generating a prime, SETUP attack) |
|
|
D |
|
|
|
[D] \ Visuals \ Kleptography |
|
10) Learning Aids and Visualizations |
|
Knapsack |
|
|
D |
|
|
|
[D] \ Visuals \ Merkle-Hellman Knapsack Cryptosystem |
|
10) Learning Aids and Visualizations |
|
Multivariate cryptography |
|
|
D |
|
|
|
[D] \ Visuals \ Multivariate Cryptography |
|
15) Post-quantum cryptography (PQC) |
|
Redactable signature schemes (RSS) |
|
|
D |
|
|
|
[D] \ Visuals \ Redactable Signature Schemes (RSS) |
|
10) Learning Aids and Visualizations |
|
Shamir’s secret sharing (MPC) |
|
|
D |
|
|
|
[D] \ Visuals \ Shamir’s Secret Sharing |
|
13) Protocols |
|
Square and multiply |
|
|
D |
|
|
|
[D] \ Visuals \ Simple Power Analysis / Square and Multiply |
|
10) Learning Aids and Visualizations |
|
SPHINCS signature |
|
|
D |
|
|
|
[D] \ Visuals \ SPHINCS Signature
|
|
15) Post-quantum cryptography (PQC) |
|
SPHINCS+ signature |
|
|
D |
|
|
|
[D] \ Visuals \ SPHINCS+ Signature |
|
15) Post-quantum cryptography (PQC) |
|
TLS handshake |
|
|
D |
|
|
|
[D] \ Visuals \ SSL/TLS Handshake |
|
10) Learning Aids and Visualizations |
|
Verifiable secret sharing (VSS) |
|
|
D |
|
|
|
[D] \ Visuals \ Verifiable Secret Sharing |
|
10) Learning Aids and Visualizations |
|