Triple DES (3DES) X T A Encrypt/Decrypt \ Symmetric (modern) \ Triple DES…… [T] \ Cryptography \ Modern \ Symmetric \ Triple DES Cipher [A] \ Password-Based Ciphers \ PbeWithSHAAnd3_KeyTripleDES_CBC 2) Modern Ciphers Triple DES (3DES) [analysis] X T Analysis \ Symmetric Encryption (modern) \ Triple DES…

[T] \ Cryptanalysis \ Modern \ Triple DES Brute-Force Analysis 7) Modern Cryptanalysis ADFGX / ADFGVX X C/T/W D X Encrypt/Decrypt \ Symmetric (classic) \ ADFGVX… [C] \ Classic Ciphers \ ADFGVX
[T] \ Cryptography \ Classical \ ADFGVX Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ ADFGVX [D] \ Algorithms \ Classic \ ADFGVX ADFG(V)X 1) Classic Ciphers ADFGVX [analysis] X C/T Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ ADFGVX… [C] \ Cryptanalysis \ Specific \ ADFGVX Analyzer
[T] \ Cryptanalysis \ Classical \ ADFGVX Heuristic Analysis
[T] \ Cryptanalysis \ Classical \ ADFGVX Dictionary Attack 6) Classic Cryptanalysis AES X C/T/W A/D Encrypt/Decrypt \ Symmetric (modern) \ AES (CBC)…
Encrypt/Decrypt \ Symmetric (modern) \ AES (self extracting)… [C] \ Modern Ciphers \ Symmetric \ AES
[T] \ Cryptography \ Modern \ Symmetric \ AES Encryption with Implicit Conversion
[T] \ Cryptography \ Modern \ Symmetric \ AES Cipher (File Input)
[T] \ Cryptography \ Modern \ Symmetric \ AES Cipher (Text Input)
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ AES [A] \ Block Ciphers \ Rijndael \ AES \ AES128_ECB
[A] \ Block Ciphers \ Rijndael \ AES \ AES256_CFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES192_ECB
[A] \ Block Ciphers \ Rijndael \ AES \ AES256_CBC
[A] \ Block Ciphers \ Rijndael \ AES \ AES128_CBC
[A] \ Block Ciphers \ Rijndael \ AES \ AES128_CFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES192_OFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES192_CFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES256_OFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES128_OFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES256_ECB
[A] \ Block Ciphers \ Rijndael \ AES \ AES192_CBC
[D] \ Algorithms \ Symmetric \ AES 2) Modern Ciphers AES [analysis] X T/W X Analysis \ Symmetric Encryption (modern) \ AES (CBC)… [T] \ Cryptanalysis \ Modern \ AES Analysis Using Entropy (1)
[T] \ Cryptanalysis \ Modern \ AES Known-Plaintext Analysis (1)
[T] \ Cryptanalysis \ Modern \ AES Analysis Using Entropy (2) – with Changeable Plaintext
[T] \ Cryptanalysis \ Modern \ AES Known-Plaintext Analysis (2)
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ AES \ Ciphertext-only
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ AES \ Known plaintext Distributed AES Analysis 7) Modern Cryptanalysis AES [visual] X C/T X Indiv. Procedures \ Visualization of Algorithms \ AES \ [C] \ Modern Ciphers \ Symmetric \ AES Visualization
[T] \ Cryptography \ Modern \ Symmetric \ AES Visualization AES Animation
AES (step-by-step) 10) Learning Aids and Visualizations ASN.1 X Indiv. Procedures \ Tools \ Codes \ Decode ASN.1 Code of a Document 9) Codings Atbash X Encrypt/Decrypt \ Symmetric (classic) \ Substitution / Atbash… 1) Classic Ciphers Authentication methods in networks [visual] X Indiv. Procedures \ Protocols \ Network Authentication… 10) Learning Aids and Visualizations Autocorrelation X C X Analysis \ Tools for Analysis \ Autocorrelation [C] \ Cryptanalysis \ Generic \ Autocorrelation Autocorrelation 6) Classic Cryptanalysis Base 64 encode/decode X Indiv. Procedures \ Tools \ Codes \ Base64 Encode/Decode \ Base64 Decode
Indiv. Procedures \ Tools \ Codes \ Base64 Encode/Decode \ Base64 Encode 9) Codings Byte Addition X Encrypt/Decrypt \ Symmetric (classic) \ Byte Addition… 1) Classic Ciphers Byte Addition [analysis] X Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Byte Addition 6) Classic Cryptanalysis Caesar / Rot-13 X C/T/W D Encrypt/Decrypt \ Symmetric (classic) \ Caesar / Rot-13… [C] \ Classic Ciphers \ Caesar
[T] \ Cryptography \ Classical \ Caesar Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Caesar [D] \ Algorithms \ Classic \ Caesar 1) Classic Ciphers Caesar / Rot-13 [analysis] X T/W/C X Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Caesar [T] \ Cryptanalysis \ Classical \ Caesar Brute-Force Analysis
[T] \ Cryptanalysis \ Classical \ Caesar Analysis Using Character Frequencies
[W] \ Cryptanalysis \ Classic Encryption \ Caesar
[C] \ Cryptanalysis \ Specific \ Caesar Analyzer Caesar / Rot13 6) Classic Cryptanalysis Caesar / Rot-13 [visual] X Indiv. Procedures \ Visualization of Algorithms \ Caesar… 10) Learning Aids and Visualizations Chinese remainder theorem (CRT) [visual] X D Indiv. Procedures \ Chinese Remainder Theorem Applications \ [D] \ Visuals \ Chinese Remainder Theorem (CRT) 10) Learning Aids and Visualizations DES X T/C/W A/D Encrypt/Decrypt \ Symmetric (modern) \ DES… [T] \ Cryptography \ Modern \ Symmetric \ DES Complementation Property
[C] \ Modern Ciphers \ Symmetric \ DES
[T] \ Cryptography \ Modern \ Symmetric \ DES Cipher
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ DES [A] \ Block Ciphers \ DESede \ DESede_CBC
[A] \ Password-Based Ciphers \ PbeWithSHA1AndDES_CBC
[A] \ Password-Based Ciphers \ PbeWithMD5AndDES_CBC
[D] \ Visuals \ Inner States of the Data Encryption Standard (DES) 2) Modern Ciphers DES [analysis] X T/W Analysis \ Symmetric Encryption (modern) \ DES… [T] \ Cryptanalysis \ Modern \ DES Analysis Using Entropy
[T] \ Cryptanalysis \ Modern \ DES Known-Plaintext Analysis
[T] \ Cryptanalysis \ Modern \ DES Brute-Force Analysis
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ DES \ Known plaintext 7) Modern Cryptanalysis DES [visual] X C/T Indiv. Procedures \ Visualization of Algorithms \ DES… [C] \ Modern Ciphers \ Symmetric \ DESVisualization
[T] \ Cryptography \ Modern \ Symmetric \ DES Visualization 10) Learning Aids and Visualizations DESL X Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESL… 2) Modern Ciphers DESL [analysis] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESL… 7) Modern Cryptanalysis DESX X Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESX… 2) Modern Ciphers DESX [analysis] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESX… 7) Modern Cryptanalysis DESXL X Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESXL… 2) Modern Ciphers DESXL [analysis] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESXL… 7) Modern Cryptanalysis Key exchange (Diffie-Hellman DH) (Perfect Forward Secrecy) [visual] X Indiv. Procedures \ Protocols \ Diffie-Hellman Demonstration… 10) Learning Aids and Visualizations Signature [visual] X D Digital Signatures, PKI \ Signature Demonstration (Signature Generation)…
Indiv. Procedures \ RSA Cryptosystem \ Signature Demonstration (Signature Generation)… [D] \ Visuals \ Signature Demonstration 10) Learning Aids and Visualizations Keys (display / export) X Digital Signatures, PKI \ Display/Export Keys… 4) Digital Signatures, PKI DSA signature X A/D Digital Signatures, PKI \ Sign Document… \ DSA [A] \ Signatures \ DSASignature \ RAW/DSA
[A] \ Signatures \ DSASignature \ SHAwithDSA
[A] \ Signatures \ IQDSASignature \ IQDSA
[A] \ Signatures \ IQDSASignature \ RIPEMD160withIQDSA
[A] \ Signatures \ IQRDSASignature \ IQRDSA
[A] \ Signatures \ IQRDSASignature \ RIPEMD160withIQRDSA
[D] \ Algorithms \ Signature \ DSA 4) Digital Signatures, PKI ECC-AES X Encrypt/Decrypt \ Hybrid \ ECC-AES… 2) Modern Ciphers ECDSA signature X A Digital Signatures, PKI \ Sign Document… \ ECSP-DSA [A] \ Signatures \ ECDSASignature \ SHA1/ECDSA
[A] \ Signatures \ ECDSASignature \ SHA512/ECDSA
[A] \ Signatures \ ECDSASignature \ RawECDSA
[A] \ Signatures \ ECDSASignature \ SHA224/ECDSA
[A] \ Signatures \ ECDSASignature \ SHA256/ECDSA
[A] \ Signatures \ ECDSASignature \ SHA384/ECDSA 4) Digital Signatures, PKI ECNR signature X A Digital Signatures, PKI \ Sign Document… \ ECSP-NR [A] \ Signatures \ SHA1/ECNR 4) Digital Signatures, PKI EC calculations [visual] X Indiv. Procedures \ Number Theory – Interactive \ Point Addition on Elliptic Curves… 10) Learning Aids and Visualizations Enigma [visual] X X Indiv. Procedures \ Visualization of Algorithms \ Enigma… Enigma (step-by-step) 10) Learning Aids and Visualizations Entropy [analysis] X D Analysis \ Tools for Analysis \ Entropy [D] \ Analysis \ Entropy Analysis 6) Classic Cryptanalysis Signature extraction X Digital Signatures, PKI \ Extract Signature… 4) Digital Signatures, PKI Factorization of a number X C/T/N/W Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Brute-force
Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Brent
Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Pollard
Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Williams
Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Lenstra
Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Quadratic Sieve [C] \ Cryptanalysis \ Generic \ Quadratic Sieve
[T] \ Mathematics \ Factorization with Quadratic Sieve (QS)
[C] \ Cryptanalysis \ Generic \ Factorizer
[T] \ Mathematics \ Factorization with Trial Division (Brute-Force)
[N] \ Crypto tutorials \ World of Primes \ Factorization \ Brute-force
[N] \ Crypto tutorials \ World of Primes \ Factorization \ Quadratic Sieve
[W] \ Mathematical Functions \ Prime Factorization 12) Prime numbers FIPS PUB-140-1 (test PRNG) X Analysis \ Analyze Randomness \ FIPS PUB-140-1 Test Battery 7) Modern Cryptanalysis Frequency test X C/T D X Analysis \ Analyze Randomness \ Frequency Test…
Analysis \ Tools for Analysis \ Floating Frequency [C] \ Cryptanalysis \ Generic \ Frequency Test
[T] \ Cryptanalysis \ Classical \ Frequency Analysis [D] \ Analysis \ Frequency Analysis Graphical Frequency Analysis 6) Classic Cryptanalysis Keys (generate / import) X Digital Signatures, PKI \ Generate/Import Keys… 4) Digital Signatures, PKI Primes (generators, tests, factorization, tutorials) X T/C/N/W Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ Miller-Rabin Test
Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ Solovay-Strassen Test
Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ FermatTest
Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Miller-Rabin Test
Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Fermat Test
Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Solovay-Strassen test
Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ AKS test (deterministic procedure)
Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test…
Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers…
Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… [T] \ Mathematics \ Next Smaller Prime Number
[T] \ Mathematics \ Primes Test
[C] \ Tools \ Data input/output \ Prime Generator
[T] \ Mathematics \ Primes Generator
[N] \ Crypto tutorials \ World of Primes
[N] \ Crypto tutorials \ World of Primes \ Primality test \ Sieve of Eratosthenes
[N] \ Crypto tutorials \ World of Primes \ Primality test \ Miller-Rabin test
[N] \ Crypto tutorials \ World of Primes \ Primality test \ Sieve of Atkin
[N] \ Crypto tutorials \ World of Primes \ Generation of primes \ Generation of primes
[N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number line
[N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number grid
[N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number of primes
[N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Ulam’s spiral
[C] \ Cryptanalysis \ Generic \ Prime Test
[W] \ Mathematical Functions \ Prime Operations \ Prime Number Generation 12) Prime numbers Hash algorithms [visual] X D Indiv Procedures \ Hash \ Hash Demonstration… [D] \ Visuals \ Hash Sensitivity 10) Learning Aids and Visualizations Hash attack (collisions) X Analysis \ Hash \ Attack on the Hash Value of the Digital Signature… 7) Modern Cryptanalysis Hash value of a file X Indiv. Procedures \ Hash \ Hash Value of a File… 3) Hash and MAC Algorithms Hill cipher X C/T X Encrypt/Decrypt \ Symmetric (classic) \ Hill… [C] \ Classic Ciphers \ Hill Cipher
[T] \ Cryptography \ Classical \ Hill Cipher Hill 1) Classic Ciphers Hill cipher [analysis] X Analysis \ Symmetric encryption (classic) \ Known Plaintext \ Hill… 6) Classic Cryptanalysis Histogram X Analysis \ Tools for Analysis \ Histogram 6) Classic Cryptanalysis HMAC X T/C Indiv. Procedures \ Hash \ Generation of HMACs… [T] \ Hash Functions \ HMAC
[C] \ Hash functions \ HMAC 3) Hash and MAC Algorithms Homophonic substitution cipher X T Encrypt/Decrypt \ Symmetric (classic) \ Homophone… [T] \ Cryptography \ Classical \ Homophonic Substitution Cipher and Nomenclature – Decryption
[T] \ Cryptography \ Classical \ Homophonic Substitution Cipher and Nomenclature – Encryption 1) Classic Ciphers IDEA X A/D Encrypt/Decrypt \ Symmetric (modern) \ IDEA… [A] \ Block Ciphers \ IDEA \ IDEA_CFB
[A] \ Block Ciphers \ IDEA \ IDEA_ECB
[A] \ Block Ciphers \ IDEA \ IDEA_OFB
[A] \ Block Ciphers \ IDEA \ IDEA_CBC
[D] \ Algorithms \ Symmetric \ IDEA 2) Modern Ciphers IDEA [attack] X Analysis \ Symmetric Encryption (modern) \ IDEA… 7) Modern Cryptanalysis Inverse congruence generator (ICG) (PRNG) X Indiv. Procedures \ Tools \ Generate Random Numbers… 5) Random Number Generators Key generation from password (PKCS#5) X Indiv. Procedures \ Hash \ Key Generation from Password (PKCS #5)… 3) Hash and MAC Algorithms Length of a number X Indiv. Procedures \ Tools \ Length of a number… 10) Learning Aids and Visualizations Linear congruence generator (LCG) (PRNG) X Indiv. Procedures \ Tools \ Generate Random Numbers… 5) Random Number Generators MARS X A Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ MARS… [A] \ Block Ciphers \ MARS 2) Modern Ciphers MARS [attack] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ MARS… 7) Modern Cryptanalysis MD2 X Indiv. Procedures \ Hash \ MD2 3) Hash and MAC Algorithms MD4 X A Indiv. Procedures \ Hash \ MD4 [A] \ Message Authentication Codes \ HMac \ HmacMD4 3) Hash and MAC Algorithms MD5 X T/C A/D Indiv. Procedures \ Hash \ MD5 [T] \ Hash Functions \ MD5 Collision Finder
[T] \ Hash Functions \ MD5 Salted Hash Comparison
[C] \ Hash functions \ MD5
[T] \ Hash Functions \ MD5 [A] \ Message Authentication Codes \ HMac \ HmacMD5
[D] \ Algorithms \ Hash \ MD5
[D] \ Algorithms \ MAC \ HMacMD5 3) Hash and MAC Algorithms N-gram [analysis] X Analysis \ Tools for Analysis \ N-Gram… 6) Classic Cryptanalysis Nihilist [visual] X Indiv. Procedures \ Visualization of Algorithms \ Nihilist… 10) Learning Aids and Visualizations Number Shark (taxman) X D X Indiv. Procedures \ Educational Games \ Number Shark [D] \ Games \ Number Shark Taxman 11) Games Number theory (also see Primes) X T/N X Indiv. Procedures \ Number Theory – Interactive \
Indiv. Procedures \ Number Theory – Interactive \ Generic t-adic-NAF Key Generator [T] \ Mathematics \ Calculating with Big Numbers
[T] \ Mathematics \ Linear Congruential Generator
[N] \ Crypto tutorials \ World of Primes \ Number theory \ Number-theoretic functions
[N] \ Crypto tutorials \ World of Primes \ Number theory \ Primitive roots
[N] \ Crypto tutorials \ World of Primes \ Number theory \ Goldbach’s conjecture Msieve Factorizer 10) Learning Aids and Visualizations Password quality [visual] X C/T/W Indiv. Procedures \ Tools \ Password Quality Meter…
Indiv. Procedures \ Tools \ Password Entropy… [C] \ Tools \ Misc \ PasswordStrength
[T] \ Tools \ Check Password Strength
[W] \ Tools \ Password Strength 10) Learning Aids and Visualizations Periodicity [analysis] X Analysis \ Tools for Analysis \ Periodicity 6) Classic Cryptanalysis Playfair cipher X C/T/W D Encrypt/Decrypt \ Symmetric (classic) \ Playfair… [C] \ Classic Ciphers \ Playfair
[T] \ Cryptography \ Classical \ Playfair Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Playfair [D] \ Algorithms \ Classic \ Playfair 1) Classic Ciphers Playfair [analysis] X T/C Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Playfair… [T] \ Cryptanalysis \ Classical \ Playfair Analysis
[C] \ Cryptanalysis \ Specific \ Playfair Analyzer 6) Classic Cryptanalysis Poker-Test (test PRNG) X Analysis \ Analyze Randomness \ Poker Test… 7) Modern Cryptanalysis Scytale / Rail fence X Encrypt/Decrypt \ Symmetric (classic) \ Scytale / Rail Fence… 1) Classic Ciphers Randomness [visual] X Analysis \ Analyze Randomness \ 3D Visualization… 10) Learning Aids and Visualizations RC2 X C/T/W A Encrypt/Decrypt \ Symmetric (modern) \ RC2… [C] \ Modern Ciphers \ Symmetric \ RC2
[T] \ Cryptography \ Modern \ Symmetric \ RC2 Cipher
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ RC2 [A] \ Block Ciphers \ RC2 \ RC2_CBC
[A] \ Password-Based Ciphers \ PbeWithSHAAnd40BitRC2_CBC 2) Modern Ciphers RC2 [attack] X Analysis \ Symmetric Encryption (modern) \ RC2… 7) Modern Cryptanalysis RC4 X C/T D Encrypt/Decrypt \ Symmetric (modern) \ RC4… [C] \ Modern Ciphers \ Symmetric \ RC4
[T] \ Cryptography \ Modern \ Symmetric \ RC4 Cipher [D] \ Algorithms \ Symmetric \ ARC4/Spritz
[D] \ Visuals \ ARC4 / Spritz 2) Modern Ciphers RC4 [attack] X Analysis \ Symmetric Encryption (modern) \ RC4… 7) Modern Cryptanalysis RC6 X A/D Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ RC6… [A] \ Block Ciphers \ RC6
[D] \ Algorithms \ Symmetric \ RC6 2) Modern Ciphers RC6 [attack] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ RC6… 7) Modern Cryptanalysis RIPEMD-160 X Indiv. Procedures \ Hash \ RIPEMD-160 3) Hash and MAC Algorithms RSA X T/C/W A/D Encrypt/Decrypt \ Asymmetric \ RSA
Indiv. Procedures \ RSA Cryptosystem \ [T] \ Mathematics \ RSA with Big Numbers (Decryption)
[T] \ Mathematics \ RSA with Big Numbers
[C] \ Modern Ciphers \ Asymmetric \ RSA
[T] \ Cryptography \ Modern \ Asymmetric \ RSA Cipher
[T] \ Cryptography \ Modern \ Asymmetric \ RSA Decryption
[T] \ Cryptography \ Modern \ Asymmetric \ RSA Encryption
[C] \ Modern Ciphers \ Asymmetric \ RSA Key Generator
[T] \ Cryptography \ Modern \ Asymmetric \ RSA Key Generator
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Asymmetric Encryption/Decryption \ RSA \ RSA Encryption
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Asymmetric Encryption/Decryption \ RSA \ RSA Decryption [A] \ Asymmetric Block Ciphers \ RprimeRSA
[A] \ Asymmetric Block Ciphers \ RSA
[A] \ Asymmetric Block Ciphers \ RbRSA
[D] \ Algorithms \ Asymmetric \ RSA
[D] \ Visuals \ Extended RSA Cryptosystem 2) Modern Ciphers RSA [attack] X T/W Indiv. Procedures \ RSA Cryptosystem \ Lattice-Based Attacks on RSA…
Analysis \ Asymmetric Encryption \ Lattice-Based Attacks on RSA… \
Analysis \ Asymmetric Encryption \ Side-Channel Attack on “Textbook RSA”… [T] \ Cryptanalysis \ Modern \ RSA Common Factor Attack
[W] \ Cryptanalysis \ Modern Encryption \ Asymmetric Encryption \ RSA 7) Moderne Kryptoanalyse RSA [visual] X X Indiv. Procedures \ RSA Cryptosystem \ RSA (step-by-step) 10) Learning Aids and Visualizations RSA-AES X Encrypt/Decrypt \ Hybrid \ RSA-AES… 2) Modern Ciphers Runs-Test (test PRNG) X Analysis \ Analyze Randomness \ Runs Test… 6) Classic Cryptanalysis Pseudo random number generator (PRNG) of the Secude library X Indiv. Procedures \ Tools \ Generate Random Numbers… 5) Random Number Generators Secure email (S/MIME) [visual] X Indiv. Procedures \ Protocols \ Secure E-Mail with S/MIME… 10) Learning Aids and Visualizations Serial-Test (test PRNG) X Analysis \ Analyze Randomness \ Serial Test… 7) Modern Cryptanalysis Serpent X A Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ Serpent… [A] \ Block Ciphers \ Serpent \ Serpent192_CBC
[A] \ Block Ciphers \ Serpent \ Serpent192_CFB
[A] \ Block Ciphers \ Serpent \ Serpent128_OFB
[A] \ Block Ciphers \ Serpent \ Serpent256_ECB
[A] \ Block Ciphers \ Serpent \ Serpent256_OFB
[A] \ Block Ciphers \ Serpent \ Serpent256_CFB
[A] \ Block Ciphers \ Serpent \ Serpent128_ECB
[A] \ Block Ciphers \ Serpent \ Serpent192_OFB
[A] \ Block Ciphers \ Serpent \ Serpent192_ECB
[A] \ Block Ciphers \ Serpent \ Serpent128_CBC
[A] \ Block Ciphers \ Serpent \ Serpent128_CFB
[A] \ Block Ciphers \ Serpent \ Serpent256_CBC 2) Modern Ciphers Serpent [attack] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ Serpent… 7) Modern Cryptanalysis SHA X C/T A/D Indiv. Procedures \ Hash \ SHA-1
Indiv. Procedures \ Hash \ SHA-256
Indiv. Procedures \ Hash \ SHA-512 [C] \ Hash functions \ SHA
[T] \ Hash Functions \ SHA-1 Collision
[T] \ Hash Functions \ SHA-1
[T] \ Hash Functions \ SHA-256 [A] \ Message Digests \ SHA384
[A] \ Message Digests \ SHA224
[A] \ Message Digests \ SHA1
[A] \ Message Digests \ SHA256
[A] \ Message Digests \ SHA512
[A] \ Pseudo Random Number Generators \ SHA1PRNG
[D] \ Algorithms \ Hash \ SHA-256
[D] \ Algorithms \ Random Number Generator \ SHA-1
[D] \ Algorithms \ Hash \ SHA-3 Candidates 3) Hash and MAC Algorithms Shamir’s secret sharing (MPC) [visual] X Indiv. Procedures \ Secret Sharing Demonstration (Shamir)… 10) Learning Aids and Visualizations Solitaire X C/T Encrypt/Decrypt \ Symmetric (classic) \ Solitaire… [C] \ Classic Ciphers \ Solitaire
[T] \ Cryptography \ Classical \ Solitaire Cipher 1) Classic Ciphers Solitaire [analysis] X T/C Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Solitaire…
Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Solitaire… [T] \ Cryptanalysis \ Classical \ Solitaire Brute-Force Analysis
[C] \ Cryptanalysis \ Specific \ Solitaire Analyzer 6) Classic Cryptanalysis Substitution X T/C/W D X Encrypt/Decrypt \ Symmetric (classic) \ Substitution / Atbash… [T] \ Cryptography \ Classical \ Substitution Cipher Using a Password
[C] \ Classic Ciphers \ Substitution
[T] \ Cryptography \ Classical \ Substitution Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Substitution [D] \ Algorithms \ Classic \ Substitution Monoalphabetic Substitution 1) Classic Ciphers Substitution [analysis] X C/T/W D Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Substitution…
Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Substitution… [C] \ Cryptanalysis \ Specific \ Monoalphabetic Substitution Analyzer
[T] \ Cryptanalysis \ Classical \ Monoalphabetic Substitution Analyzer
[T] \ Cryptanalysis \ Classical \ Monoalphabetic Substitution Analyzer with Arbitrary Ciphertext Alphabet
[W] \ Cryptanalysis \ Classic Encryption \ Monoalphabetic Substitution [D] \ Analysis \ Substitution Analysis 6) Classic Cryptanalysis Transposition (single column transposition) X C/T/W D X Encrypt/Decrypt \ Symmetric (classic) \ Permutation / Transposition… [C] \ Classic Ciphers \ Transposition
[T] \ Cryptography \ Classical \ Transposition Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Transposition [D] \ Algorithms \ Classic \ Transposition Transposition 1) Classic Ciphers Transposition [analysis] X T/C/W D Analysis \ Symmetric Encryption (classic) \ Known Plaintext \ Single Column Transposition… [T] \ Cryptanalysis \ Classical \ Transposition Brute-Force Analysis
[T] \ Cryptanalysis \ Classical \ Transposition Crib Analysis
[T] \ Cryptanalysis \ Classical \ Transposition Genetic Analysis
[T] \ Cryptanalysis \ Classical \ Transposition Hill Climbing Analysis
[C] \ Cryptanalysis \ Specific \ Transposition Analyzer
[W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Brute-force
[W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Genetic [D] \ Analysis \ Transposition Analysis 6) Classic Cryptanalysis Twofish X T A Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ Twofish… [T] \ Cryptography \ Modern \ Symmetric \ Twofish Cipher [A] \ Block Ciphers \ Twofish 2) Modern Ciphers Twofish [attack] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ Twofish… 7) Modern Cryptanalysis Zip/Unzip X Indiv. Procedures \ Tools \ Compress \ UnZip
Indiv. Procedures \ Tools \ Compress \ Zip 9) Codings UU Decode/Encode X Indiv. Procedures \ Tools \ Codes \ UU Encode/Decode \ UU Decode
Indiv. Procedures \ Tools \ Codes \ UU Encode/Decode \ UU Encode 9) Codings Signature verification X D Digital Signatures, PKI \ Verify Signature… [D] \ Visuals \ Signature Verification 4) Digital Signatures, PKI Vernam X C/T X Encrypt/Decrypt \ Symmetric (classic) \ Vernam \ OTP… [C] \ Classic Ciphers \ Vernam
[T] \ Cryptography \ Classical \ Vernam Cipher Vernam 1) Classic Ciphers Vernam [analysis] X Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ XOR / Vernam 6) Classic Cryptanalysis Vigenère cipher X C/T/W D X Encrypt/Decrypt \ Symmetric (classic) \ Vigenère… [C] \ Classic Ciphers \ Vigenère
[T] \ Cryptography \ Classical \ Vigenère Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Vigenère [D] \ Algorithms \ Classic \ Autokey-Vigenère
[D] \ Algorithms \ Classic \ Vigenère Autokey
Vigenère 1) Classic Ciphers Vigenère [analysis] X T/W/C D X Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Vigenère
Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Vigenère (Analysis according to Schroedel)… [T] \ Cryptanalysis \ Classical \ Vigenère Analysis
[W] \ Cryptanalysis \ Classic Encryption \ Vigenère
[C] \ Cryptanalysis \ Specific \ Vigenère Analyzer [D] \ Analysis \ Vigenère Breaker Vigenère Analysis 6) Classic Cryptanalysis Vigenère [visual] X Indiv. Procedures \ Visualization of Algorithms \ Vigenère… 10) Learning Aids and Visualizations Vitányi [analysis] X Analysis \ Analyze Randomness \ Vitányi 7) Modern Cryptanalysis X^2 (mod N) (PRNG) X Indiv. Procedures \ Tools \ Generate Random Numbers… 5) Random Number Generators XOR X C/T/W D X Encrypt/Decrypt \ Symmetric (classic) \ XOR… [C] \ Classic Ciphers \ XOR
[T] \ Cryptography \ Classical \ XOR Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ XOR [D] \ Algorithms \ Classic \ XOR XOR 1) Classic Ciphers ASCII X ASCII 9) Codings ATBASH X ATBASH 1) Classic Ciphers Steganography C/T X [C] \ Steganography \ Image Steganography
[T] \ Steganography \ Image Steganography with BPCS
[T] \ Steganography \ Image Steganography with LSB
[C] \ Steganography \ Text Steganography
[T] \ Steganography \ Text Steganography with Capital Letters (binary mode)
[T] \ Steganography \ Text Steganography with Capital Letters
[T] \ Steganography \ Text Steganography with Letter Marking (binary mode)
[T] \ Steganography \ Text Steganography with Letter Marking
[T] \ Steganography \ Text Steganography with Zero Width Spaces Bacon 8) Steganography Barcode X Barcode 9) Codings Base64 X Base64 9) Codings Beaufort cipher X Beaufort 1) Classic Ciphers Bit shift X Bit Shift 14) Tools Corona / COVID X Corona Tracing 10) Learning Aids and Visualizations Gronsfeld cipher X Gronsfeld 1) Classic Ciphers Huffman C/T D X [C] \ Tools \ Codes \ Huffman
[T] \ Tools \ Huffman’s Algorithm (ASCII)
[T] \ Tools \ Huffman’s Algorithm (BMG, JPG)
[T] \ Tools \ Huffman’s Algorithm (UTF-8) [D] \ Visuals \ Huffman Coding Huffman

9) Codings Kamasutra cipher X Kamasutra 1) Classic Ciphers Morse code C/T/W X [C] \ Tools \ Codes \ Morse Code
[T] \ Codes \ Morse Code
[W] \ Codes \ Morse Code Morse Code 9) Codings Multiplicative cipher X Multiplicative 1) Classic Ciphers N-gram analysis X Tabular N-gram Analysis 6) Classic Cryptanalysis Cipher identifier X NCID 6) Classic Cryptanalysis Tools C X [C] \ Cryptanalysis \ Generic \ Contains
[C] \ Tools \ Misc \ Number Operation
[C] \ Tools \ Misc \ Progress Numberconverter
Password Check
Password Generator
Password Meter 14) Tools OpenSSL X OpenSSL 10) Learning Aids and Visualizations Porta X Porta 1) Classic Ciphers Railfence X Railfence 1) Classic Ciphers Redefence X Redefence 1) Classic Ciphers Rotation cipher X Rotation 1) Classic Ciphers Scytale C/T/W X [C] \ Classic Ciphers \ Scytale
[T] \ Cryptography \ Classical \ Scytale Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Scytale Scytale 1) Classic Ciphers Trithemius X Trithemius 1) Classic Ciphers Alphabet C [C] \ Tools \ Data flow \ Alphabet Permutator 6) Classic Cryptanalysis Camellia C/T A [C] \ Modern Ciphers \ Symmetric \ Camellia
[T] \ Cryptography \ Modern \ Symmetric \ Camellia Cipher [A] \ Block Ciphers \ Camellia \ Camellia256_CBC
[A] \ Block Ciphers \ Camellia \ Camellia192_CBC
[A] \ Block Ciphers \ Camellia \ Camellia128_CBC 2) Modern Ciphers Data input/output C/T [C] \ Tools \ Data input/output \ Clipboard Input
[C] \ Tools \ Data input/output \ Clipboard Output
[C] \ Tools \ Data flow \ Clock
[C] \ Tools \ Data input/output \ IP Frame Generator
[C] \ Tools \ Data input/output \ Audio Input
[C] \ Tools \ Data input/output \ Audio Output
[C] \ Tools \ Boolean \ Boolean Input
[T] \ Tools \ Take a Picture Using the Webcam
[C] \ Tools \ Boolean \ Boolean Output
[T] \ Tools \ Random Decimal Number
[C] \ Tools \ Misc \ ImageProcessor
[C] \ Tools \ Data input/output \ Network Receiver
[C] \ Tools \ Data input/output \ Network Sender
[C] \ Tools \ Data input/output \ Number Input
[C] \ Tools \ Data input/output \ Camera
[C] \ Tools \ Data input/output \ Text Input
[C] \ Tools \ Data flow \ CSVReader
[C] \ Tools \ Data input/output \ Dictionary
[C] \ Tools \ Data input/output \ File Input 14) Tools Data flow C/T [C] \ Tools \ Data flow \ Concatenate
[C] \ Tools \ Boolean \ Boolean Function Parser
[C] \ Tools \ Data flow \ Array Indexer
[C] \ Tools \ Boolean \ Boolean Binary Operator
[C] \ Tools \ Boolean \ Boolean If-Else Operator
[C] \ Tools \ Boolean \ Boolean Not Operator
[C] \ Tools \ Misc \ Comparators
[C] \ Tools \ Misc \ Converter
[C] \ Tools \ Codes \ String Decoder
[C] \ Tools \ Codes \ String Encoder
[C] \ Tools \ Misc \ Length
[C] \ Tools \ Data flow \ Variable Load
[C] \ Tools \ Data flow \ Variable Store
[C] \ Tools \ Misc \ Stream Comparator
[T] \ Tools \ Split a Text
[C] \ Tools \ Data input/output \ File Output
[C] \ Tools \ Data flow \ Gate
[T] \ Tools \ Loop
[C] \ Tools \ Misc \ Inc Dec
[C] \ Tools \ Data input/output \ Picture Output
[C] \ Tools \ Data flow \ Splitter
[C] \ Tools \ Misc \ String Operations
[C] \ Tools \ Data input/output \ Text Output 14) Tools Cyclic redundancy check (CRC) T/C [T] \ Hash Functions \ CRC Null Problems
[C] \ Hash functions \ CRC
[T] \ Hash Functions \ CRC 3) Hash and MAC Algorithms Scytale [analysis] T/W [T] \ Cryptanalysis \ Classical \ Scytale Brute-Force Analysis
[W] \ Cryptanalysis \ Classic Encryption \ Scytale 6) Classic Cryptanalysis Achterbahn C/T [C] \ Modern Ciphers \ Symmetric \ Achterbahn
[T] \ Cryptography \ Modern \ Symmetric \ Achterbahn Cipher 2) Modern Ciphers Alphabets C [C] \ Tools \ Data input/output \ Alphabets 6) Classic Cryptanalysis Berlekamp-Massey algorithm C/T [C] \ Cryptanalysis \ Generic \ Berlekamp-Massey Algorithm
[T] \ Mathematics \ Berlekamp-Massey 7) Modern Cryptanalysis Cube [attack] C [C] \ Cryptanalysis \ Specific \ Cube Attack 7) Modern Cryptanalysis Trivium [attack] T [T] \ Cryptanalysis \ Modern \ Cube Attack on Trivium 7) Modern Cryptanalysis Enigma C/T/W [C] \ Classic Ciphers \ Enigma
[T] \ Cryptography \ Classical \ Enigma Cipher Machine
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Enigma 1) Classic Ciphers Enigma [attack] T/W/C [T] \ Cryptanalysis \ Classical \ Enigma Gillogly Attack
[T] \ Cryptanalysis \ Classical \ Enigma Hillclimbing Attack
[T] \ Cryptanalysis \ Classical \ Enigma Simulated Annealing Attack
[T] \ Cryptanalysis \ Classical \ Enigma Turing Bombe Attack
[T] \ Cryptanalysis \ Classical \ Enigma Turing Bombe Attack (with Turnover)
[W] \ Cryptanalysis \ Classic Encryption \ Enigma
[C] \ Cryptanalysis \ Specific \ Enigma Analyzer 6) Classic Cryptanalysis Fialka C/T [C] \ Classic Ciphers \ Fialka
[T] \ Cryptography \ Classical \ Fialka ED Check
[T] \ Cryptography \ Classical \ Fialka ED Mixed Mode Check
[T] \ Cryptography \ Classical \ Fialka ED NumLock10 Check
[T] \ Cryptography \ Classical \ Fialka Key Output
[T] \ Cryptography \ Classical \ Fialka M-125-3 PROTON II
[T] \ Cryptography \ Classical \ Fialka M-125 PROTON I 6) Classic Cryptanalysis Friedman test T/C D [T] \ Cryptanalysis \ Classical \ Friedman Test for Classical Ciphers
[C] \ Cryptanalysis \ Generic \ Friedman Test [D] \ Analysis \ Friedman Test 6) Classic Cryptanalysis HIGHT C [C] \ Modern Ciphers \ Symmetric \ HIGHT 2) Modern Ciphers WEP [attack] T/C [T] \ Protocols \ WEP Attack
[C] \ Protocols \ Attacks on the WEP Protocol 7) Modern Cryptanalysis Kasiski test C [C] \ Cryptanalysis \ Generic \ Kasiski’s Test 6) Classic Cryptanalysis Pseudo random number generator (PRNG) C/T/W [C] \ Tools \ Random Number \ LFSR
[C] \ Tools \ Random Number \ NLFSR
[C] \ Tools \ Random Number \ Random Number Generator
[T] \ Tools \ Random Number Generators
[W] \ Tools \ Random numbers 5) Random Number Generators LFSR T D [T] \ Mathematics \ Linear Feedback Shift Register (LFSR) [D] \ Algorithms \ Symmetric \ LFSR 1) Klassische Chiffren M-138 C/T [C] \ Classic Ciphers \ M-138
[T] \ Cryptography \ Classical \ M-138 1) Classic Ciphers M-138 [attack] C/T [C] \ Cryptanalysis \ Specific \ M-138 Analyzer
[T] \ Cryptanalysis \ Classical \ M-138 Ciphertext-Only Attack
[T] \ Cryptanalysis \ Classical \ M-138 Known-Plaintext Attack
[T] \ Cryptanalysis \ Classical \ M-138 Partially-Known Plaintext Attack 6) Classic Cryptanalysis Visual codes (QR, EAN8, WAN13, Code39, Code128, PDF417) T/C/W [T] \ Codes \ RSA Signed QR Code
[T] \ Codes \ QR Code Encryption
[C] \ Tools \ Codes \ Visual Decoder
[T] \ Codes \ QR Code File Decoding
[T] \ Codes \ Detection of Optical Codes
[C] \ Tools \ Codes \ Visual Encoder
[T] \ Codes \ QR Code Creation
[W] \ Codes \ Create visual code
[W] \ Codes \ Decode visual code 3) Hash and MAC Algorithms PKCS#5 AES T [T] \ Cryptography \ Modern \ Symmetric \ AES with PKCS#5
[T] \ Cryptography \ Modern \ Symmetric \ AES (CBC) with PKCS#5 and IV
[T] \ Cryptography \ Modern \ Symmetric \ AES (ECB) with PKCS#5 2) Modern Ciphers MD5 [analysis] W [W] \ Cryptanalysis \ Modern Encryption \ Hash Functions \ MD5 3) Hash and MAC Algorithms NLFSR T [T] \ Mathematics \ Non-Linear Feedback Shift Register (NLFSR) 2) Modern Ciphers Dictionary [attack] T [T] \ Hash Functions \ Dictionary Attack on a Password Hash Value 7) Modern Cryptanalysis Avalanche effect C/T [C] \ Tools \ Misc \ Avalanche Visualization
[T] \ Cryptanalysis \ Modern \ Avalanche (AES)
[T] \ Cryptanalysis \ Modern \ Avalanche (Classic Ciphers)
[T] \ Cryptanalysis \ Modern \ Avalanche (Compare Classic Ciphers)
[T] \ Cryptanalysis \ Modern \ Avalanche (DES)
[T] \ Cryptanalysis \ Modern \ Avalanche (Hash Functions)
[T] \ Cryptanalysis \ Modern \ Avalanche (Modern Ciphers) 10) Learning Aids and Visualizations BB84 C [C] \ Protocols \ BB84 Error Detector
[C] \ Protocols \ BB84 Key Generator
[C] \ Protocols \ BB84 Photonbase Generator
[C] \ Protocols \ BB84 Photon Decoder
[C] \ Protocols \ BB84 Photon Encoder 13) Protocols Key exchange (BB84) T [T] \ Protocols \ BB84 Key Exchange with Eavesdropping Attack
[T] \ Protocols \ BB84 Key Exchange 13) Protocols BB84 [attack] C [C] \ Protocols \ BB84 Man in the Middle 13) Protocols BLAKE C/T [C] \ Hash functions \ BLAKE
[T] \ Hash Functions \ BLAKE
[T] \ Hash Functions \ Password Storage Using Salted BLAKE-256
[T] \ Hash Functions \ Password Verification Using Salted BLAKE-256 3) Hash and MAC Algorithms Blind signature C [C] \ Modern Ciphers \ Asymmetric \ Blind Signature Generator
[C] \ Modern Ciphers \ Asymmetric \ Blind Signature Verifier 2) Modern Ciphers Paillier T/C [T] \ Cryptography \ Modern \ Asymmetric \ Blind Signature with Paillier
[T] \ Cryptography \ Modern \ Asymmetric \ Blind Signature with RSA
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Voting)
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher with Blinding
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Key Generator
[C] \ Modern Ciphers \ Asymmetric \ Paillier Key Generator 4) Digital Signatures, PKI Blowfish C/T [C] \ Modern Ciphers \ Symmetric \ Blowfish
[T] \ Cryptography \ Modern \ Symmetric \ Blowfish Cipher 2) Modern Ciphers Threefish T [T] \ Cryptography \ Modern \ Symmetric \ Threefish Cipher 2) Modern Ciphers Boolean functions T [T] \ Mathematics \ Booleans 14) Tools ISAP bit commitment scheme T/C [T] \ Mathematics \ ISAP Bit Commitment Scheme
[C] \ Protocols \ ISAP Bit Commitment Scheme 7) Modern Cryptanalysis ISBN T [T] \ Codes \ ISBN-10 Check
[T] \ Codes \ ISBN-13 Check 9) Codings Paillier (homomorphic encryption) T/C [T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Number Input)
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher with Addition
[C] \ Modern Ciphers \ Asymmetric \ Paillier
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Text Input) 2) Modern Ciphers Coin flipping protocol T/C [T] \ Protocols \ Coin Flipping Protocol
[C] \ Protocols \ Coin Flipping 13) Protocols Key exchange (Diffie-Hellman DH) T D [T] \ Protocols \ Diffie-Hellman Key-Exchange
[T] \ Protocols \ Diffie-Hellman Key-Exchange over Network [D] \ Visuals \ Diffie-Hellman Key Exchange (EC) 13) Protocols Dining cryptographers protocol T [T] \ Protocols \ Dining Cryptographers Protocol 10) Learning Aids and Visualizations Yao’s millionaire problem (protocol) (MPC) T/C [T] \ Protocols \ Yao’s Millionaire Problem Protocol
[C] \ Protocols \ Yao 1
[C] \ Protocols \ Yao 2
[C] \ Protocols \ Yao 3 13) Protocols Zero knowledge protocol T/C D [T] \ Protocols \ Zero Knowledge Protocol
[C] \ Protocols \ Zero Knowledge Prover
[C] \ Protocols \ Zero Knowledge Verifier [D] \ Visuals \ Zero-Knowledge: Magic Door
[D] \ Visuals \ Zero-Knowledge: Fiat Shamir
[D] \ Visuals \ Zero-Knowledge: Feige Fiat Shamir
[D] \ Visuals \ Zero-Knowledge: Graph Isomorphism 10) Learning Aids and Visualizations ChaCha C/T [C] \ Modern Ciphers \ Symmetric \ ChaCha
[T] \ Cryptography \ Modern \ Symmetric \ ChaCha Cipher
[T] \ Cryptography \ Modern \ Symmetric \ ChaCha Cipher (Presentation) 2) Modern Ciphers Encoding T/W [T] \ Tools \ Text Encoding (e.g. Base64)
[W] \ Codes \ Encoding 14) Tools Cost function C/T [C] \ Cryptanalysis \ Generic \ Cost Function
[T] \ Cryptanalysis \ Classical \ Cost Functions 7) Modern Cryptanalysis SDES [analysis] T/W [T] \ Cryptanalysis \ Modern \ SDES Brute-Force Analysis
[T] \ Cryptanalysis \ Modern \ SDES Analysis Using Entropy
[T] \ Cryptanalysis \ Modern \ SDES Known-Plaintext Analysis
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ SDES \ Ciphertext-only
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ SDES \ Known plaintext 7) Modern Cryptanalysis Cramer-Shoup C/T [C] \ Modern Ciphers \ Asymmetric \ Cramer-Shoup
[T] \ Cryptography \ Modern \ Asymmetric \ Cramer-Shoup with AES
[C] \ Modern Ciphers \ Asymmetric \ Cramer-Shoup Key Generator 2) Modern Ciphers CBC [attack] T [T] \ Cryptanalysis \ Modern \ CBC Attack 2) Modern Ciphers Padding oracle attack (POA) T/C [T] \ Cryptanalysis \ Modern \ Padding Oracle Attack on AES
[T] \ Cryptanalysis \ Modern \ Padding Oracle Attack on DES
[C] \ Cryptanalysis \ Specific \ Padding Oracle
[C] \ Cryptanalysis \ Specific \ Padding Oracle Attack 2) Modern Ciphers Secure Chat – Applied Cryptography T [T] \ Tools \ Simple Video and Audio Chat Using AES Encryption
[T] \ Tools \ Diffie-Hellman AES Video Audio Chat
[T] \ Tools \ Simple AES Chat 3) Hash and MAC Algorithms Block mode T [T] \ Cryptography \ Modern \ Symmetric \ Block Modes of Symmetric Ciphers 2) Modern Ciphers SDES C/T/W [C] \ Modern Ciphers \ Symmetric \ SDES
[T] \ Cryptography \ Modern \ Symmetric \ SDES Cipher
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ SDES 2) Modern Ciphers Differential cryptanalysis (DCA) C/T [C] \ Cryptanalysis \ Specific \ DCA KeyRecovery
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 1 (Automatic Mode)
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 2 (Automatic Mode)
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 3 (Automatic Mode)
[C] \ Cryptanalysis \ Specific \ DCA Oracle
[C] \ Cryptanalysis \ Specific \ DCA PathFinder
[C] \ Cryptanalysis \ Specific \ DCA PathVisualizer
[C] \ Cryptanalysis \ Specific \ DCA ToyCipher 7) Modern Cryptanalysis Differential cryptanalysis (DCA) [visual] T [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 1 (Tutorial Mode)
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 2 (Tutorial Mode)
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 3 (Tutorial Mode) 10) Learning Aids and Visualizations Decimalization C/T [C] \ Tools \ Misc \ Decimalization
[T] \ Mathematics \ Decimalization 10) Learning Aids and Visualizations DECODE database C [C] \ DECRYPT Project \ DECRYPTClustererCaption
[C] \ DECRYPT Project \ DECRYPT Decipherer
[C] \ DECRYPT Project \ DECRYPT Downloader
[C] \ DECRYPT Project \ DecodeParserTesterCaption
[C] \ DECRYPT Project \ DECRYPTSymbolHeatmapCaption
[C] \ DECRYPT Project \ DECRYPTSyntaxAnalyzer
[C] \ DECRYPT Project \ DECRYPT Viewer 14) Tools DGK (homomorphic encryption) C/T [C] \ Modern Ciphers \ Asymmetric \ DGK
[T] \ Cryptography \ Modern \ Asymmetric \ DGK Cipher (Text Input)
[C] \ Modern Ciphers \ Asymmetric \ DGK Key Generator 2) Modern Ciphers FEAL C/T [C] \ Modern Ciphers \ Symmetric \ FEAL
[T] \ Cryptography \ Modern \ Symmetric \ FEAL Cipher 2) Modern Ciphers Format preserving encryption (FPE) (FF1, FF2, FF3 and DFF) C/T [C] \ Modern Ciphers \ Symmetric \ Format Preserving Encryption (FPE)
[T] \ Cryptography \ Modern \ Symmetric \ Format Preserving Encryption (XML)
[T] \ Cryptography \ Modern \ Symmetric \ Format Preserving Encryption 2) Modern Ciphers Grain C/T [C] \ Modern Ciphers \ Symmetric \ Grain v1
[T] \ Cryptography \ Modern \ Symmetric \ Grain v1 Cipher 2) Modern Ciphers Grøstl C/T [C] \ Hash functions \ Grøstl
[T] \ Hash Functions \ Grøstl
[T] \ Hash Functions \ Password Storage Using Salted Grøstl-256
[T] \ Hash Functions \ Password Verification Using Salted Grøstl-256 3) Hash and MAC Algorithms HC128 C/T [C] \ Modern Ciphers \ Symmetric \ HC128
[T] \ Cryptography \ Modern \ Symmetric \ HC128 Cipher 2) Modern Ciphers Key derivation function (KDF) C/T [C] \ Hash functions \ HKDF SHA-256
[T] \ Hash Functions \ KDF Performance Comparison (without Presentation)
[T] \ Hash Functions \ KDF Performance Comparison (with Presentation)
[C] \ Hash functions \ KKDF SHA-256
[C] \ Hash functions \ KKDF SHAKE256 3) Hash and MAC Algorithms Homophonic substitution [analysis] C/T [C] \ Cryptanalysis \ Specific \ Homophonic Substitution Analyzer
[T] \ Cryptanalysis \ Classical \ Homophonic Substitution Analysis 6) Classic Cryptanalysis Zodiac-408 [analysis] T [T] \ Cryptanalysis \ Classical \ Zodiac-408 Analysis 6) Classic Cryptanalysis ImageHash C/T [C] \ Hash functions \ ImageHash
[T] \ Hash Functions \ ImageHash
[T] \ Hash Functions \ ImageHash – Smooth Comparison 3) Hash and MAC Algorithms Keccak (hash, cipher, PRNG) C/T [C] \ Hash functions \ Keccak
[T] \ Cryptography \ Modern \ Symmetric \ Keccak Cipher
[T] \ Hash Functions \ Keccak Hash (SHA-3)
[T] \ Tools \ Keccak Pseudorandom Number Generator (PRNG) 5) Random Number Generators LAMBDA1 C/T [C] \ Classic Ciphers \ LAMBDA1
[T] \ Cryptography \ Modern \ Symmetric \ LAMBDA1 Block Cipher 1) Classic Ciphers M209 C/T [C] \ Classic Ciphers \ M209
[T] \ Cryptography \ Classical \ M209 Cipher Machine
[T] \ Cryptography \ Classical \ M209 Key Setup 1) Classic Ciphers MD5 attack (collisions) C [C] \ Hash functions \ MD5 Collider 7) Modern Cryptanalysis Mickey 2 C/T [C] \ Modern Ciphers \ Symmetric \ Mickey 2
[T] \ Cryptography \ Modern \ Symmetric \ Mickey 2 Cipher 2) Modern Ciphers Heartbleed [analysis] T/W [T] \ Protocols \ Heartbleed Test
[W] \ Tools \ Heartbleed analysis 13) Protocols HTTP protocol T [T] \ Protocols \ HTTP Request 13) Protocols Simple webserver T [T] \ Protocols \ Simple Webserver 13) Protocols Simple multi-client communication – Applied Cryptography T [T] \ Protocols \ Simple Multi Client Communication 13) Protocols Discrete logarithm T [T] \ Mathematics \ Discrete Logarithm 7) Modern Cryptanalysis Oblivious transfer protocol (MPC) C/T [C] \ Protocols \ Oblivious Transfer 1
[T] \ Protocols \ Oblivious Transfer Protocol (1 out of n)
[C] \ Protocols \ Oblivious Transfer 2 10) Learning Aids and Visualizations Purple C/T [C] \ Classic Ciphers \ Purple
[T] \ Cryptography \ Classical \ PURPLE Cipher Machine 1) Classic Ciphers Rabbit C/T [C] \ Modern Ciphers \ Symmetric \ Rabbit
[T] \ Cryptography \ Modern \ Symmetric \ Rabbit Cipher 2) Modern Ciphers PRESENT T/C [T] \ Cryptography \ Modern \ Symmetric \ PRESENT Cipher
[C] \ Modern Ciphers \ Symmetric \ PRESENT 2) Modern Ciphers Salsa20 C/T [C] \ Modern Ciphers \ Symmetric \ Salsa20
[T] \ Cryptography \ Modern \ Symmetric \ Salsa20 Cipher 2) Modern Ciphers SAT solver C/T [C] \ Cryptanalysis \ Generic \ SAT Solver
[T] \ Mathematics \ SAT Solver (File Input)
[T] \ Mathematics \ SAT Solver (Text Input) 14) Tools Sosemanuk C/T [C] \ Modern Ciphers \ Symmetric \ Sosemanuk
[T] \ Cryptography \ Modern \ Symmetric \ Sosemanuk Cipher 2) Modern Ciphers Spanish strip cipher (SSC) C/T [C] \ Classic Ciphers \ Spanish Strip Cipher
[T] \ Cryptography \ Classical \ Spanish Strip Cipher 1) Classic Ciphers Speck cipher C/T [C] \ Modern Ciphers \ Symmetric \ Speck
[T] \ Cryptography \ Modern \ Symmetric \ Speck Cipher 2) Modern Ciphers Lorenz SZ42 C [C] \ Classic Ciphers \ Lorenz SZ42 1) Classic Ciphers T-310 C/T [C] \ Classic Ciphers \ T-310
[T] \ Cryptography \ Classical \ T-310/50 Cipher Machine
[T] \ Cryptography \ Classical \ T-310/51 Cipher Machine 1) Classic Ciphers Transcriptor [analysis] C/T [C] \ Cryptanalysis \ Generic \ Transcriptor
[T] \ Cryptanalysis \ Classical \ Transcriptor – Manual Mode
[T] \ Cryptanalysis \ Classical \ Transcriptor – Semi-automatic Mode 6) Classic Cryptanalysis VIC cipher C/T [C] \ Classic Ciphers \ VIC Cipher
[T] \ Cryptography \ Classical \ VIC Cipher 1) Classic Ciphers Visual cryptography C/T [C] \ Modern Ciphers \ Symmetric \ Visual Cryptography
[T] \ Cryptography \ Modern \ Symmetric \ Visual Cryptography 2) Modern Ciphers VCard T [T] \ Codes \ vCard 9) Codings Watermark creator C/T [C] \ Steganography \ Watermark Creator
[T] \ Steganography \ Watermark Creator – Invisible Watermark
[T] \ Steganography \ Watermark Creator – Robustness
[T] \ Steganography \ Watermark Creator – Visible Watermark 8) Steganography Navajo code T [T] \ Cryptography \ Classical \ Navajo Code 1) Classic Ciphers TEA C/T/W [C] \ Modern Ciphers \ Symmetric \ TEA
[T] \ Cryptography \ Modern \ Symmetric \ TEA Cipher
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ TEA 2) Modern Ciphers Trivium C [C] \ Modern Ciphers \ Symmetric \ Trivium 2) Modern Ciphers Kryptos K1 [analysis] T [T] \ Cryptanalysis \ Classical \ Kryptos K1 Analysis 6) Classic Cryptanalysis Kryptos K2 [analysis] T [T] \ Cryptanalysis \ Classical \ Kryptos K2 Analysis 6) Classic Cryptanalysis WEP C [C] \ Protocols \ WEP protocol 2) Modern Ciphers One-time pad (OTP) T [T] \ Cryptography \ Classical \ One-Time Pad Demo
[T] \ Cryptography \ Classical \ One-Time Pad Misusage 1) Classic Ciphers Word pattern [analysis] T/C [T] \ Cryptanalysis \ Classical \ Wordpattern Analysis
[T] \ Cryptanalysis \ Classical \ Wordpattern Analysis with Self-Defined Dictionary
[C] \ Cryptanalysis \ Generic \ Word Patterns 6) Classic Cryptanalysis Hamming distance C/T [C] \ Tools \ Misc \ HammingDistance
[T] \ Mathematics \ Hamming Distance 9) Codings IDP [analysis] C [C] \ Cryptanalysis \ Specific \ IDP Analyzer 7) Modern Cryptanalysis Transposition (double column transposition) [attack] T [T] \ Cryptanalysis \ Classical \ Dictionary Attack on the Double Columnar Transposition Cipher 7) Modern Cryptanalysis Key searcher C [C] \ Cryptanalysis \ Specific \ KeySearcher 7) Modern Cryptanalysis Lattice [visual] N [N] \ Crypto tutorials \ Lattice-based Cryptography
[N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptography \ GGH
[N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptography \ LWE
[N] \ Crypto tutorials \ Lattice-based Cryptography \ Shortest Vector Problem (SVP) \ Gauss algorithm
[N] \ Crypto tutorials \ Lattice-based Cryptography \ Shortest Vector Problem (SVP) \ LLL algorithm
[N] \ Crypto tutorials \ Lattice-based Cryptography \ Closest Vector Problem (CVP) \ Find closest vector 15) Post-quantum cryptography (PQC) Lattice [attack] N [N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptanalysis \ Merkle-Hellman Knapsack
[N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptanalysis \ RSA (Coppersmith’s attack) 15) Post-quantum cryptography (PQC) Nihilist cipher C/T [C] \ Classic Ciphers \ Nihilist
[T] \ Cryptography \ Classical \ Nihilist Cipher 1) Classic Ciphers PKCS#1 [attack] N [N] \ Crypto tutorials \ Attacks on PKCS#1
[N] \ Crypto tutorials \ Attacks on PKCS#1 \ Attacks on PKCS#1 \ Bleichenbacher attack
[N] \ Crypto tutorials \ Attacks on PKCS#1 \ Attacks on PKCS#1 \ Attack with shorter keys (Kuehn) 10) Learning Aids and Visualizations PKCS#5 C [C] \ Hash functions \ PKCS#5 3) Hash and MAC Algorithms Powering [visual] N [N] \ Crypto tutorials \ World of Primes \ Number theory \ Powering (iterating exponent)
[N] \ Crypto tutorials \ World of Primes \ Number theory \ Powering (iterating base)(RSA) 12) Prime numbers RIPEMD C/T A [C] \ Hash functions \ RIPEMD160
[T] \ Hash Functions \ RIPEMD160 [A] \ Message Digests \ RIPEMD320
[A] \ Message Digests \ RIPEMD128
[A] \ Message Digests \ RIPEMD160
[A] \ Message Digests \ RIPEMD256 3) Hash and MAC Algorithms Password hash (SHA-1) T [T] \ Hash Functions \ Password Store Using Salted SHA-1
[T] \ Hash Functions \ Password Verification Using Salted SHA-1 3) Hash and MAC Algorithms PBKDF-1 (PKCS#5 2.0) T [T] \ Hash Functions \ PBKDF-1 (PKCS#5 2.0) 3) Hash and MAC Algorithms Virtual smartcard C/T [C] \ Protocols \ Smartcard
[T] \ Protocols \ Communication with a SmartCard
[C] \ Protocols \ Smartcard Interpreter 10) Learning Aids and Visualizations Levenshtein distance T [T] \ Mathematics \ Levenshtein Distance 14) Tools Tiger C/T A [C] \ Hash functions \ Tiger
[T] \ Hash Functions \ Tiger [A] \ Message Digests \ Tiger 3) Hash and MAC Algorithms Transposition (double column transposition) T [T] \ Cryptography \ Classical \ Double Columnar Transposition Cipher 1) Classic Ciphers Whirlpool C/T [C] \ Hash functions \ Whirlpool
[T] \ Hash Functions \ Whirlpool 3) Hash and MAC Algorithms Crib [analysis] W [W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Crib 6) Classic Cryptanalysis Encryption with AES and password W [W] \ Tools \ Encrypt with password 13) Protocols ElGamal A/D [A] \ Asymmetric Block Ciphers \ ElGamal
[D] \ Algorithms \ Asymmetric \ ElGamal 2) Modern Ciphers McEliece signature A [A] \ Asymmetric Block Ciphers \ McEliecePKCS 15) Post-quantum cryptography (PQC) Niederreiter A [A] \ Asymmetric Block Ciphers \ Niederreiter
[A] \ Signatures \ NiederreiterCFS 15) Post-quantum cryptography (PQC) RC5 A [A] \ Block Ciphers \ RC5 2) Modern Ciphers Shacal A [A] \ Block Ciphers \ Shacal
[A] \ Block Ciphers \ Shacal2 2) Modern Ciphers SAFER++ A [A] \ Block Ciphers \ SAFER++
[A] \ Message Authentication Codes \ CBCMac \ CBCmacSAFER++ 2) Modern Ciphers SAFER+ A [A] \ Block Ciphers \ SAFER+
[A] \ Message Authentication Codes \ CBCMac \ CBCmacSAFER+ 2) Modern Ciphers Misty A [A] \ Block Ciphers \ Misty1 2) Modern Ciphers ECIES A [A] \ Hybrid Ciphers \ ECIES 2) Modern Ciphers McEliece A/D [A] \ Hybrid Ciphers \ McElieceFujisakiCipher
[A] \ Hybrid Ciphers \ McElieceKobaraImaiCipher
[D] \ Visuals \ McEliece Cryptosystem 15) Post-quantum cryptography (PQC) AES MAC A [A] \ Message Authentication Codes \ CMac \ CmacAES128
[A] \ Message Authentication Codes \ CMac \ CmacAES192
[A] \ Message Authentication Codes \ CMac \ CmacAES256
[A] \ Message Authentication Codes \ CBCMac \ CBCmacAES256
[A] \ Message Authentication Codes \ CBCMac \ CBCmacAES192
[A] \ Message Authentication Codes \ CBCMac \ CBCmacAES128 3) Hash and MAC Algorithms DES MAC A [A] \ Message Authentication Codes \ CMac \ CmacDESede
[A] \ Message Authentication Codes \ CBCMac \ CBCmacDESede 3) Hash and MAC Algorithms Tiger MAC A [A] \ Message Authentication Codes \ HMac \ HmacTiger 3) Hash and MAC Algorithms FORK MAC A [A] \ Message Authentication Codes \ HMac \ HmacFORK256 3) Hash and MAC Algorithms SHA MAC A [A] \ Message Authentication Codes \ HMac \ HmacSHA512
[A] \ Message Authentication Codes \ HMac \ HmacSHA1
[A] \ Message Authentication Codes \ HMac \ HmacSHA224
[A] \ Message Authentication Codes \ HMac \ HmacSHA256
[A] \ Message Authentication Codes \ HMac \ HmacSHA384 3) Hash and MAC Algorithms RIPEMD MAC A [A] \ Message Authentication Codes \ HMac \ HmacRIPEMD256
[A] \ Message Authentication Codes \ HMac \ HmacRIPEMD128
[A] \ Message Authentication Codes \ HMac \ HmacRIPEMD160
[A] \ Message Authentication Codes \ HMac \ HmacRIPEMD320 3) Hash and MAC Algorithms DHA MAC A [A] \ Message Authentication Codes \ HMac \ HmacDHA256 3) Hash and MAC Algorithms Serpent MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacSerpent 3) Hash and MAC Algorithms RC5 MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacRC5 3) Hash and MAC Algorithms RC6 MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacRC6 3) Hash and MAC Algorithms RC2 MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacRC2 3) Hash and MAC Algorithms IDEA MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacIDEA 3) Hash and MAC Algorithms Misty MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacMisty1 3) Hash and MAC Algorithms MARS MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacMARS 3) Hash and MAC Algorithms Camellia MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacCamellia 3) Hash and MAC Algorithms Twofish MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacTwofish 3) Hash and MAC Algorithms Shacal MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacShacal
[A] \ Message Authentication Codes \ CBCMac \ CBCmacShacal2 3) Hash and MAC Algorithms TwoTrack MAC A [A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac160
[A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac64
[A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac32
[A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac96
[A] \ Message Authentication Codes \ TwoTrackMac \ TTmac128 3) Hash and MAC Algorithms DHA A [A] \ Message Digests \ DHA256 3) Hash and MAC Algorithms VSH A [A] \ Message Digests \ VSH 3) Hash and MAC Algorithms MD A [A] \ Message Digests \ MD5
[A] \ Message Digests \ MD4 3) Hash and MAC Algorithms FORK A [A] \ Message Digests \ FORK256 3) Hash and MAC Algorithms PBES2 A [A] \ Password-Based Ciphers \ PBES2 2) Modern Ciphers Blum Blum Shub (BBS) – PRNG A [A] \ Pseudo Random Number Generators \ BBSRandom 5) Random Number Generators EC PRNG A [A] \ Pseudo Random Number Generators \ ECPRNG 5) Random Number Generators RSA signature A [A] \ Signatures \ RprimeRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ RIPEMD160/RSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA384withRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA1/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA512withRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA384/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ MD5withRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA224/RSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA256withRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA1/RSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ MD5/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA512/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA224/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ RIPEMD160/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA256/RSA/RAW
[A] \ Signatures \ RbRSA
[A] \ Signatures \ SSL_MD5andSHA1withRSA 4) Digital Signatures, PKI GQ signature A [A] \ Signatures \ IQGQSignature \ IQGQ
[A] \ Signatures \ IQGQSignature \ RIPEMD160withIQGQ 4) Digital Signatures, PKI Winternitz signature A/D [A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_1
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_3
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_4
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_1
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_2
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_3
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_3
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_4
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_2
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_1
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_1
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_4
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_2
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_4
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_3
[D] \ Visuals \ Winternitz OT-Signature (WOTS / WOTS+) 4) Digital Signatures, PKI CMSS signature A [A] \ Signatures \ CMSSSignature \ CMSS 4) Digital Signatures, PKI GMSS signature A [A] \ Signatures \ GMSSSignature \ GMSSwithSHA512
[A] \ Signatures \ GMSSSignature \ GMSSwithSHA1
[A] \ Signatures \ GMSSSignature \ GMSSwithSHA224
[A] \ Signatures \ GMSSSignature \ GMSSwithSHA256
[A] \ Signatures \ GMSSSignature \ GMSSwithSHA384 4) Digital Signatures, PKI Merkle signature A/D [A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA512
[A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA384
[A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA1
[A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA256
[D] \ Visuals \ Merkle Signatures (XMSS^MT) 15) Post-quantum cryptography (PQC) Bifid D [D] \ Algorithms \ Classic \ Bifid 1) Classic Ciphers Double box D [D] \ Algorithms \ Classic \ Double Box 1) Classic Ciphers Dragon D [D] \ Algorithms \ Symmetric \ Dragon 2) Modern Ciphers Fleissner Grille [analysis] D [D] \ Analysis \ Fleissner-Grille Analysis 6) Classic Cryptanalysis Viterbi [analysis] D [D] \ Analysis \ Viterbi Analysis 6) Classic Cryptanalysis Divider game D [D] \ Games \ Divider Game 11) Games Zudo-Ku D [D] \ Games \ Zudo-Ku 11) Games Key exchange (multipartite) D [D] \ Visuals \ Multipartite Key Exchange (BD II) 10) Learning Aids and Visualizations Ant Colony Optimization (ACO) D [D] \ Visuals \ Ant Colony Optimization (ACO) 10) Learning Aids and Visualizations Android Unlock Pattern (AUP) D [D] \ Visuals \ Android Unlock Pattern (AUP) 10) Learning Aids and Visualizations Shanks Babystep-Giantstep D [D] \ Visuals \ Shanks Babystep-Giantstep 10) Learning Aids and Visualizations Certificate verification D [D] \ Visuals \ Certificate Verification 10) Learning Aids and Visualizations EC calculations D [D] \ Visuals \ Elliptic Curve Calculations 10) Learning Aids and Visualizations Reciprocal subtraction D [D] \ Visuals \ Extended Euclidean / Reciprocal Subtraction 10) Learning Aids and Visualizations Homomorphic Encryption (HE) (with RSA, Paillier, Gentry & Hallevi) D [D] \ Visuals \ Homomorphic Encryption (HE) 10) Learning Aids and Visualizations Public-Key Infrastructure D [D] \ Visuals \ Public-Key Infrastructure 4) Digital Signatures, PKI Kleptography (4 methods generating a prime, SETUP attack) D [D] \ Visuals \ Kleptography 10) Learning Aids and Visualizations Knapsack D [D] \ Visuals \ Merkle-Hellman Knapsack Cryptosystem 10) Learning Aids and Visualizations Multivariate cryptography D [D] \ Visuals \ Multivariate Cryptography 15) Post-quantum cryptography (PQC) Redactable signature schemes (RSS) D [D] \ Visuals \ Redactable Signature Schemes (RSS) 10) Learning Aids and Visualizations Shamir’s secret sharing (MPC) D [D] \ Visuals \ Shamir’s Secret Sharing 13) Protocols Square and multiply D [D] \ Visuals \ Simple Power Analysis / Square and Multiply 10) Learning Aids and Visualizations SPHINCS signature D [D] \ Visuals \ SPHINCS Signature

15) Post-quantum cryptography (PQC) SPHINCS+ signature D [D] \ Visuals \ SPHINCS+ Signature 15) Post-quantum cryptography (PQC) TLS handshake D [D] \ Visuals \ SSL/TLS Handshake 10) Learning Aids and Visualizations Verifiable secret sharing (VSS) D [D] \ Visuals \ Verifiable Secret Sharing 10) Learning Aids and Visualizations

Leave a Reply

Your email address will not be published.