0%

Expand your mind and your crypto knowledge with the ultimate desktop dictionary for all things cryptography. Written by a renowned cryptographer for experts and novices alike, Crypto Dictionary is rigorous in its definitions, yet easy to read and laced with humor. Flip to any random page to find something new, interesting, or mind-boggling, such as:

•A survey of crypto algorithms both widespread and niche, from RSA and DES to the USSR’s GOST cipher
•Trivia from the history of cryptography, such as the MINERVA backdoor in Crypto AG’s encryption algorithms
•An explanation of why the reference to the Blowfish cipher in the TV show 24 makes absolutely no sense
•Types of cryptographic protocols like zero-knowledge; security; and proofs of work, stake, and resource
•A polemic against referring to cryptocurrency as “crypto”
•Discussions of numerous cryptographic attacks, including slide and biclique

The book also looks toward the future of cryptography, with discussions of the threat quantum computing poses to current cryptosystems and a nod to post-quantum algorithms, such as lattice-based cryptographic schemes.

With hundreds of incisive entries organized alphabetically, Crypto Dictionary is the crypto go-to guide you’ll always want within reach.

Table of Contents

  1. #
    1. 2013
    2. 65537
  2. A
    1. A5/0
    2. A5/1
    3. A5/2
    4. A5/3
    5. A5/4
    6. Adaptive attack
    7. AEAD (authenticated encryption with associated data)
    8. AES (Advanced Encryption Standard)
    9. AES-CCM
    10. AES-GCM
    11. AES-GCM-SIV
    12. AES-NI
    13. AES-SIV
    14. AIM (Advanced INFOSEC Machine)
    15. AKA
    16. AKS (Agrawal–Kayal–Saxena)
    17. Algebraic cryptanalysis
    18. Alice
    19. All-or-nothing transform (AONT)
    20. Anonymous signature
    21. Applied Cryptography
    22. Applied cryptography
    23. ARC4
    24. Argon2
    25. ARX (Add-Rotate-XOR)
    26. ASIACRYPT
    27. Asymmetric cryptography
    28. Attack
    29. Attribute-based encryption (ABE)
    30. Authenticated cipher
    31. Axolotl
  3. B
    1. Backdoor
    2. Backtracking resistance
    3. Backward secrecy
    4. Base64
    5. BassOmatic
    6. BB84
    7. bcrypt
    8. Biclique cryptanalysis
    9. BIKE (Bit Flipping Key Encapsulation)
    10. BIP (Bitcoin improvement proposal)
    11. Bit Gold
    12. Bitcoin
    13. Black
    14. BLAKE
    15. BLAKE2
    16. BLAKE3
    17. Bleichenbacher attack
    18. Blind signature
    19. Block cipher
    20. Blockchain
    21. Blockcipher
    22. Blowfish
    23. BLS (Boneh-Lynn-Shacham) signature
    24. Bob
    25. Boolean function
    26. Boomerang attack
    27. BQP (bounded-error quantum polynomial time)
    28. Braid group cryptography
    29. Brainpool curves
    30. Break-in recovery
    31. Broadcast encryption
    32. Brute-force attack
    33. Bulletproof
    34. Byzantine fault tolerance
  4. C
    1. CAESAR
    2. Caesar’s cipher
    3. CAVP (Cryptographic Algorithm Validation Program)
    4. CBC (cipher block chaining)
    5. CECPQ (combined elliptic-curve and post-quantum)
    6. Cellular automata
    7. Ceremony
    8. Certificate
    9. Certificate authority (CA)
    10. Certificate transparency (CT)
    11. ChaCha20
    12. CHES (Conference on Cryptographic Hardware and Embedded Systems)
    13. CIA
    14. Ciphertext stealing
    15. Clipper
    16. CMVP (Cryptographic Module Validation Program)
    17. Code-based cryptography
    18. Commitment
    19. Concurrent zero-knowledge
    20. Consensus protocol
    21. Control word
    22. COPACOBANA (Cost-Optimized PArallel COde Breaker)
    23. Cothority (collective authority)
    24. Cryptanalysis
    25. Cryptids
    26. Crypto
    27. CRYPTO
    28. Crypto AG
    29. Crypto period
    30. Crypto variable
    31. Crypto wars
    32. Cryptobiosis
    33. Cryptocurrency
    34. Crypto-Gram
    35. Cryptography
    36. Cryptologia
    37. Cryptology
    38. Cryptonomicon
    39. Cryptorchidism
    40. Cryptovirology
    41. CRYPTREC
    42. CSIDH (Commutative Supersingular Isogeny Diffie–Hellman)
    43. CTF (capture the flag)
    44. Cube attack
    45. Curve25519
    46. Curve448
    47. Cypher
  5. D
    1. Daemon
    2. Davies–Meyer
    3. Decentralized private computation
    4. Déchiffrer
    5. Décrypter
    6. Deniable encryption
    7. DES (Data Encryption Standard)
    8. Dictionary
    9. Dictionary attack
    10. Differential cryptanalysis
    11. Diffie–Hellman
    12. Disclosure
    13. Discrete logarithm problem
    14. Distinguisher
    15. Distributed randomness
    16. Dolev–Yao model
    17. Double ratchet
    18. Dragonfly
    19. DRBG (deterministic random bit generator)
    20. DSA (Digital Signature Algorithm)
    21. DSS (Digital Signature Standard)
    22. DVB-CSA
  6. E
    1. E0
    2. ECB (electronic codebook)
    3. ECC
    4. ECDLP (Elliptic-curve discrete logarithm problem)
    5. ECDSA (Elliptic-curve DSA)
    6. ECIES (Elliptic-curve IES)
    7. Ed25519
    8. EdDSA
    9. EKMS (Electronic Key Management System)
    10. Electronic codebook
    11. ElGamal
    12. Elligator
    13. Elliptic curve
    14. Elliptic-curve cryptography
    15. Encipherment
    16. End-to-end encryption (E2EE)
    17. Enigma
    18. Entropy
    19. ePrint
    20. Erathosthenes’ sieve
    21. eSTREAM
    22. Ethereum
    23. Eurocrypt
    24. Eve
    25. E-voting
  7. F
    1. Factoring problem
    2. Feedback shift register
    3. Feistel network
    4. Fialka (Фиалка)
    5. Fiat–Shamir
    6. FIPS 140-2
    7. FIPS 140-3
    8. Forgery
    9. Formal verification
    10. Format-preserving encryption
    11. Forward secrecy
    12. FOX
    13. FSE (Fast Software Encryption)
    14. Fully homomorphic encryption
    15. Functional encryption
    16. Future secrecy
    17. Fuzzy extractor
  8. G
    1. Generalized birthday problem
    2. GNFS (General Number Field Sieve)
    3. GOST
    4. Grain
    5. Gröbner basis
    6. Group signature
    7. Grover’s algorithm
  9. H
    1. Hardcore predicate
    2. Hash function
    3. Hash-based cryptography
    4. Heartbleed
    5. Hedged signature
    6. HFE (Hidden Field Equations)
    7. HMAC (Hash-based MAC)
    8. Homomorphic encryption
    9. HPC (Hasty Pudding Cipher)
    10. HSM (hardware security module)
    11. HTTP/3
    12. Hyperelliptic-curve cryptography
  10. I
    1. IACR (International Association for Cryptologic Research)
    2. IDEA (International Data Encryption Algorithm)
    3. IDEA NXT
    4. Identity-based encryption
    5. IES (Integrated Encryption Scheme)
    6. Impatient saboteur
    7. Impossibility
    8. Impossible differential attack
    9. IND-CCA
    10. IND-CPA
    11. Indelibility
    12. Indifferentiability
    13. Indistinguishability
    14. Indistinguishability obfuscation (iO)
    15. Information-theoretic security
    16. INT-CTXT
    17. Invisible signature
    18. IOTA
    19. IPES (Improved Proposed Encryption Standard)
    20. IPSec
    21. ISO standard
    22. Isogeny-based cryptography
  11. J
    1. Journal of Cryptology (JoC)
  12. K
    1. KASUMI
    2. Keccak
    3. KeeLoq
    4. KEM (key encapsulation mechanism)
    5. Kerberos
    6. Kerckhoffs’ principles
    7. Key derivation function (KDF)
    8. Key escrow
    9. Key management
    10. Key wrapping
    11. Kleptography
    12. Known-key attack
    13. Kupyna (Купина)
  13. L
    1. Laconic zero-knowledge proof
    2. Lai–Massey
    3. Lamport signature
    4. Lattice-based cryptography
    5. Le Chiffre
    6. Leakage-resilient cryptography
    7. Learning with errors (LWE)
    8. Length extension attack
    9. Length-preserving encryption
    10. LFSR (linear feedback shift register)
    11. Lightweight cryptography
    12. Linear cryptanalysis
    13. Linkability
    14. LM hash
    15. Luby–Rackoff
    16. Lucifer
  14. M
    1. MAC (message authentication code)
    2. MAGENTA
    3. Malleability
    4. Manger attack
    5. Man-in-the-middle
    6. MASH (Modular Arithmetic Secure Hash)
    7. McEliece encryption scheme
    8. MD4
    9. MD5
    10. MDC (Message Digest Cipher)
    11. MDC-2 (Modification Detection Code 2)
    12. Meet-in-the-middle
    13. Merkle puzzle
    14. Merkle tree
    15. Merkle–Damgård construction
    16. Mersenne twister
    17. Message franking
    18. Miller–Rabin
    19. MINERVA
    20. Mining
    21. Misuse resistance
    22. Mixnet
    23. MQV (Menezes–Qu–Vanstone)
    24. Multicollision
    25. Multi-party computation (MPC)
    26. Multivariate cryptography
  15. N
    1. NBS (National Bureau of Standards)
    2. NESSIE (New European Schemes for Signatures, Integrity, and Encryption)
    3. “New Directions in Cryptography”
    4. NFSR (nonlinear feedback shift register)
    5. NIST (National Institute of Standards and Technology)
    6. NIZK (non-interactive zero-knowledge)
    7. Noekeon
    8. Noise
    9. Nonce
    10. Non-committing encryption
    11. Non-outsourceability
    12. Non-slanderability
    13. NSA (National Security Agency)
    14. NT hash
    15. NTRU (Nth degree Truncated polynomial Ring Units)
    16. Null cipher
  16. O
    1. OAEP (Optimal Asymmetric Encryption Padding)
    2. Oblivious key management system (OKMS)
    3. Oblivious PRF (OPRF)
    4. Oblivious RAM (ORAM)
    5. Oblivious transfer
    6. Obscurity
    7. OCB (offset codebook mode)
    8. One-time pad
    9. One-way function
    10. Onion-AE
    11. OPAQUE
    12. OpenSSL
    13. Oracle
    14. OTR (Off-the-Record)
  17. P
    1. Padding oracle attack
    2. Paillier cryptosystem
    3. Pairing
    4. Pairing-based cryptography
    5. PAKE (password-authenticated key exchange)
    6. Paradigm
    7. Password hash function
    8. PBKDF2 (Password-Based Key Derivation Function 2)
    9. PCT (Private Communications Technology)
    10. PEP (Plaintext equivalence proof)
    11. Perfect forward secrecy
    12. Permutation-based cryptography
    13. PES (Proposed Encryption Standard)
    14. PET (Plaintext equivalence test)
    15. PFS
    16. PGP (Pretty Good Privacy)
    17. Photuris
    18. Picnic
    19. PKC
    20. PKCS (Public Key Cryptography Standards)
    21. Poly1305
    22. Polynomial complexity
    23. Post-compromise security
    24. Post-quantum cryptography
    25. Post-quantum RSA
    26. Prediction resistance
    27. Preimage
    28. PRESENT
    29. PRIMES
    30. Privacy-preserving
    31. Private information retrieval (PIR)
    32. Proof of burn
    33. Proof of catalytic space
    34. Proof of human work
    35. Proof of replication
    36. Proof of reserve
    37. Proof of security
    38. Proof of sequential work
    39. Proof of space
    40. Proof of spacetime
    41. Proof of stake
    42. Proof of storage
    43. Proof of useful work
    44. Proof of work
    45. Provable security
    46. Provably secure
    47. Proxy re-encryption
    48. Pseudo-random
    49. Pseudorandom function (PRF)
    50. Pseudorandom number generator (PRNG)
    51. Pseudorandom permutation (PRP)
    52. Public-key cryptography
    53. PUF (physically unclonable function)
    54. Puncturable encryption
    55. Puncturable pseudorandom function (PPRF)
  18. Q
    1. Quantum computer
    2. Quantum cryptography
    3. Quantum encryption
    4. Quantum key distribution
    5. Quantum signature
    6. QUIC (Quick UDP Internet Connections)
  19. R
    1. Rabin cryptosystem
    2. Rainbow tables
    3. Random bits
    4. Random oracle
    5. Randomness
    6. Range proof
    7. RC4
    8. RC5
    9. RC6
    10. Real world
    11. Real World Crypto (RWC)
    12. Rectangle attack
    13. Related-key attack
    14. Research papers
    15. Revocation
    16. Rijndael
    17. Ring signature
    18. RIPEMD-160
    19. Rivest–Shamir–Adleman
    20. ROBOT (Return Of Bleichenbacher’s Oracle Threat)
    21. ROS
    22. RSA
    23. Rubber-hose cryptanalysis
    24. Rumba20
  20. S
    1. SAEP (Simplified OAEP)
    2. Salsa20
    3. Sandwich attack
    4. S-box
    5. Scalar
    6. sci.crypt
    7. Scrambler
    8. scrypt
    9. Searchable encryption
    10. secp256k1
    11. Secret sharing
    12. Security
    13. Security proof
    14. Semantic security
    15. Serious Cryptography
    16. Serpent
    17. SHA-0
    18. SHA-1
    19. SHA-2
    20. SHA-3
    21. SHA-3 competition
    22. SHACAL
    23. Shamir’s secret database
    24. Shor’s algorithm
    25. SHS (Secure Hash Standard)
    26. Side channel
    27. Side-channel attack
    28. Sigaba
    29. Signal protocol
    30. Signature
    31. Signcryption
    32. SIKE (Supersingular Isogeny Key Encapsulation)
    33. SIMECK
    34. SIMON
    35. SipHash
    36. SIV-AES
    37. Skipjack
    38. Slide attack
    39. SM
    40. Smart contract
    41. Snake-oil
    42. SNARK (succinct non-interactive argument of knowledge)
    43. SNIP (secret-shared non-interactive proof)
    44. SNOW 3G
    45. Solitaire
    46. SPECK
    47. SPEKE (Simple Password Exponential Key Exchange)
    48. SPHINCS
    49. Sponge function
    50. SRP (Secure Remote Password)
    51. SSH (Secure Shell)
    52. SSL (Secure Socket Layer)
    53. STARK (scalable transparent arguments of knowledge)
    54. Steganography
    55. Stream cipher
    56. Substitution-permutation network (SPN)
    57. Suck
    58. Sugar beet auctions
    59. Suite A
    60. SUPERCOP
    61. Superpolynomial complexity
    62. SVP (shortest vector problem)
    63. Symmetric-key cryptography
  21. T
    1. TCC
    2. Test vectors
    3. Threefish
    4. Threshold encryption
    5. Threshold secret-sharing
    6. Threshold signature
    7. Time AI™
    8. Time-lock encryption
    9. Time-lock puzzle
    10. Timing attack
    11. TLS (Transport Layer Security)
    12. Tor
    13. Traitor tracing
    14. Transfinite cryptography
    15. Trapdoor
    16. Triple DES
    17. Trivium
    18. True random number generator (TRNG)
    19. Trusted third party
    20. Tweakable block cipher
    21. Twitter
    22. Twofish
  22. U
    1. Undeniable signature
    2. Universal composability
    3. Universal hash function
    4. Updatable encryption
  23. V
    1. Verifiable delay function (VDF)
    2. Verifiable random function (VRF)
    3. Verifiable unpredictable function (VUF)
    4. Vigenère cipher
    5. VSH (Very Smooth Hash)
  24. W
    1. Wallet
    2. Watermarking
    3. White-box cryptography
    4. Winternitz signature
    5. WireGuard
  25. X
    1. X25519
    2. X3DH
    3. XMSS (eXtended Merkle Signature Scheme)
    4. XOF (extendable output function)
    5. XOR
    6. XOR encryption
  26. Z
    1. Zerocash
    2. ZKP (zero-knowledge proof)
    3. ZRTP
  27. Index of Terms
18.224.0.25