# Cryptography

Welcome to Cryptography, the study of transforming information in order to make it secure from unintended recipients or use.

Part I: Introducing Cryptography

Part II: Designing Cryptosystems

Part III: Cryptanalysis

Part IV: Using Cryptosystems

1. Applying Cryptography
2. Classical Ciphers
1. Beale Cipher
2. Transposition Ciphers
3. Caesar cipher
4. Atbash Cipher
5. Autokey cipher
6. Playfair Cipher
7. Polyalphabetic substitution
8. Scytale
9. Substitution cipher
10. nomenclator
11. Permutation Cipher
12. Affine cipher
13. Vigenère cipher
14. Polybius square
16. Fractionation (Polybius square, straddling checkerboard, CT-37c conversion table, etc.)
3. Contemporary Ciphers
1. Symmetric Ciphers
2. Asymmetric Ciphers
3. Hashes
1. MD5
2. SHA-1
3. SHA-2
4. SHA-3
5. RIPEMD-160
6. Tiger
7. message authentication code (often MAC); A MAC algorithm is sometimes called a keyed (cryptographic) hash function.
4. Protocols
1. Authentication protocols
1. e.g. Kerberos
2. Key exchange protocols
3. Secure Communications
1. e.g. SSL, SSH
2. Generate a keypair using OpenSSL

Part V: Cryptography and Society

Part VI: Miscellaneous

1. Future Possibilities
2. Glossary of Terms
4. Appendix A: Mathematical background
 Almost all of these topics have articles about them in Wikipedia (there are about 50-100 crypto related articles) so many sections could be imported. Perhaps this needs a little Discussion.--RobKohr 17:14, 22 Nov 2004 (UTC) Cryptography/Scratch pad - a mid-way ground for importing articles from Wikipedia.

Pages to be merged into the text.

Cryptography/Prime Curve/Affine Coordinates

Cryptography/Prime Curve/Chudnovsky Coordinates

Cryptography/Prime Curve/Jacobian Coordinates

Cryptography/Prime Curve/Standard Projective Coordinates

Cryptography/Notes