Read Time:1 Minute, 13 Second
General
Introductory articles about cybersecurity subjects:
- Security
- Computer security[3]
- Internet security[4]
- Network security[5]
- Information security, Data security[6]
- List of computer security certifications
Cryptography
The art of secret writing or code. A “plaintext” message is converted by the sender to “ciphertext” by means of a mathematical algorithm that uses a secret key. The receiver of the message then reverses the process and converts the ciphertext back to the original plaintext.[7]
- History of cryptography
- Enigma machine
- Alan Turing
- Cipher
- Substitution cipher
- One-time pad
- Beale ciphers
- The Codebreakers[8]
- Cryptanalysis
- Cryptographic primitive
- Cryptographic Service Provider
- Data Encryption Standard
- Advanced Encryption Standard
- International Data Encryption Algorithm
- HMAC
- HMAC-based One-time Password algorithm
- Cryptographic hash function
- Collision (computer science)
- List of hash functions
- Comparison of cryptographic hash functions
- Hash-based cryptography
- SHA-1
- SHA-2
- SHA-3
- SHA-3 competition
- Cryptographic nonce
- Salt (cryptography)
- Cryptographic strength
- Block cipher
- Block cipher mode of operation
- Stream cipher
- Key (cryptography)
- Key size
- Cryptographic key types
- Symmetric-key algorithm
- Public-key cryptography
- Public-Key Cryptography (conference)
- Digital signature
- Non-repudiation
- Public key certificate
- Certificate authority
- X.509
- Public key fingerprint
- RSA (cryptosystem)
- Secret sharing
- Internet key exchange
- Pretty Good Privacy
- Strong cryptography
Steganography
The art of hidden writing. The secret message is hidden within another object, such as a digital photograph.[9]
Authentication and access
The process by which a potential client is granted authorized use of an IT facility by proving its identity.[11]
- Authentication
- Login
- Password
- Passphrase
- Password strength
- One-time password
- Multi-factor authentication
- Identity management
- Identity management theory
- Identity management system
- Encrypting PIN Pad
- Shared secret
- Authorization
- Access control
- Principle of least privilege
- Cryptographic protocol
- Authentication protocol
- Public key infrastructure
- RADIUS
- Kerberos (protocol)
- OpenID
- OAuth
- Active Directory Federation Services
- Security Assertion Markup Language
- SAML-based products and services