Encryption
From Just Solve the File Format Problem
(Difference between revisions)
Parchivist (Talk | contribs) (→Obfuscation) |
Parchivist (Talk | contribs) (→Obfuscation) |
||
(86 intermediate revisions by 2 users not shown) | |||
Line 35: | Line 35: | ||
== Formats and protocols == | == Formats and protocols == | ||
+ | * [[Cloak]] (.clk) | ||
* [[Cryptoloop]] | * [[Cryptoloop]] | ||
* [[DissidentX]] | * [[DissidentX]] | ||
Line 43: | Line 44: | ||
* [[Horcrux (kndyry)]] | * [[Horcrux (kndyry)]] | ||
* [[icecrypt]] | * [[icecrypt]] | ||
+ | * [[inKey]] (.iK) | ||
+ | * [[Invisible Secrets]] (.isc) | ||
* [[IZE]] | * [[IZE]] | ||
* [[Javascript Object Signing and Encryption]] (JOSE) | * [[Javascript Object Signing and Encryption]] (JOSE) | ||
Line 48: | Line 51: | ||
* [[Loop-AES]] | * [[Loop-AES]] | ||
* [[LUKS]] | * [[LUKS]] | ||
+ | * [[Max File Encryption]] (.mfe) | ||
* [[MCrypt]] (.nc) | * [[MCrypt]] (.nc) | ||
+ | * [[Message Smuggler]] (.enc) | ||
* [[OpenSSL salted format]] | * [[OpenSSL salted format]] | ||
* [[PAE]] | * [[PAE]] | ||
Line 54: | Line 59: | ||
* [[PGP]] | * [[PGP]] | ||
** [[PGP public key]] | ** [[PGP public key]] | ||
+ | * [[QuickCrypto]] (.qce, .qcotfe) | ||
* [[SDN (SDN Project)]] | * [[SDN (SDN Project)]] | ||
* [[Silent Circle Instant Messaging Protocol]] | * [[Silent Circle Instant Messaging Protocol]] | ||
* [[SSL]] | * [[SSL]] | ||
+ | * [[Steganos Privacy/Security Suite]] (.sef, .sle) | ||
* [[TrueCrypt]] | * [[TrueCrypt]] | ||
+ | * [[White Noise Storm (WNSTORM)]] | ||
+ | * [[Xidie Secure Archives]] | ||
* [[XIP]] | * [[XIP]] | ||
* [[ZED]] | * [[ZED]] | ||
Line 76: | Line 85: | ||
== [[Steganography]] == | == [[Steganography]] == | ||
+ | * [[4t HIT Mail Privacy Lite]] | ||
* [[AnyFile2Image]] | * [[AnyFile2Image]] | ||
* [[ARMaHYDAN]] | * [[ARMaHYDAN]] | ||
+ | * [[BDV DataHider]] | ||
+ | * [[Black Wolf's Picture Encoder (StegoDos)]] | ||
* [[BlindSide]] | * [[BlindSide]] | ||
* [[Camera/Shy]] | * [[Camera/Shy]] | ||
+ | * [[Contraband]] | ||
+ | * [[CryptoStego]] | ||
+ | * [[CryptoStego - YASS version]] | ||
+ | * [[Crypture]] | ||
* [[DC-Stegano]] | * [[DC-Stegano]] | ||
+ | * [[DeepSound]] | ||
* [[defy]] | * [[defy]] | ||
* [[Digital Invisible Ink Toolkit]] | * [[Digital Invisible Ink Toolkit]] | ||
+ | * [[Dound's Steganographer]] | ||
+ | * [[Encrypt Pic]] | ||
+ | * [[eShow]] | ||
+ | * [[EyeMage IIE]] | ||
* [[File-Encryptor]] | * [[File-Encryptor]] | ||
* [[FireSteg]] | * [[FireSteg]] | ||
+ | * [[Gif-It-Up]] | ||
* [[gifshuffle]] | * [[gifshuffle]] | ||
+ | * [[Hallucinate]] | ||
+ | * [[Hide'N'Send]] | ||
+ | * [[Hide and Seek (HideSeek)]] | ||
* [[Hide In Picture]] | * [[Hide In Picture]] | ||
* [[Hydan]] | * [[Hydan]] | ||
+ | * [[ImageContainer]] | ||
* [[ImageHide]] | * [[ImageHide]] | ||
* [[ImageHide (dilshan)]] | * [[ImageHide (dilshan)]] | ||
* [[imagehide (techraj)]] | * [[imagehide (techraj)]] | ||
+ | * [[Image Steganography (cpascoe)]] | ||
* [[Image Steganography using Python]] | * [[Image Steganography using Python]] | ||
* [[InPlainView]] | * [[InPlainView]] | ||
* [[InThePicture]] | * [[InThePicture]] | ||
* [[Invisible Secrets]] | * [[Invisible Secrets]] | ||
+ | * [[JHide]] | ||
* [[JPHS (JPHide/JPSeek)]] | * [[JPHS (JPHide/JPSeek)]] | ||
+ | * [[JSteg]] | ||
+ | * [[jsteg (Luke Champine)]] | ||
* [[M4JPEG]] | * [[M4JPEG]] | ||
* [[Magikfs]] | * [[Magikfs]] | ||
+ | * [[Message Smuggler]] | ||
+ | * [[MP3 File Hider]] | ||
* [[MP3Stego]] | * [[MP3Stego]] | ||
+ | * [[mp3stegz]] | ||
+ | * [[MSU StegoVideo]] | ||
+ | * [[OpenPuff]] | ||
* [[OpenStego]] | * [[OpenStego]] | ||
* [[OutGuess]] | * [[OutGuess]] | ||
Line 104: | Line 139: | ||
* [[QuickCrypto]] | * [[QuickCrypto]] | ||
* [[QuickStego]] | * [[QuickStego]] | ||
+ | * [[rSteg]] | ||
+ | * [[rsteg (xgi)]] | ||
+ | * [[S-Tools]] | ||
+ | * [[Sealed]] | ||
+ | * [[Secret Layer]] | ||
+ | * [[SecretSpace]] | ||
+ | * [[SilentEye]] | ||
* [[SNOW/stegsnow]] | * [[SNOW/stegsnow]] | ||
+ | * [[SSuite Picsel]] | ||
+ | * [[Stash-It (Stash)]] | ||
* [[steg86]] | * [[steg86]] | ||
* [[stegan (edma2)]] | * [[stegan (edma2)]] | ||
* [[Stegan (Von Mbah)]] | * [[Stegan (Von Mbah)]] | ||
+ | * [[Stegano]] | ||
+ | * [[SteganoGifPaletteOrder (SGPO)]] | ||
+ | * [[SteganographX Plus]] | ||
+ | * [[Steganography (FortKnox)]] | ||
* [[Steganography Online Codec]] | * [[Steganography Online Codec]] | ||
* [[steganos]] | * [[steganos]] | ||
+ | * [[Steganos Privacy/Security Suite]] | ||
+ | * [[steganotool]] | ||
+ | * [[SteganPEG]] | ||
* [[stegfs]] | * [[stegfs]] | ||
* [[steghide]] | * [[steghide]] | ||
+ | * [[Stego WAV]] | ||
+ | * [[stego-wave]] | ||
* [[stegodon]] | * [[stegodon]] | ||
* [[StegoMagic]] | * [[StegoMagic]] | ||
* [[StegoShare]] | * [[StegoShare]] | ||
+ | * [[StegoStick]] | ||
* [[Stegosuite]] | * [[Stegosuite]] | ||
+ | * [[StegoWav (Peter Heist)]] | ||
+ | * [[stegowav (robert461)]] | ||
* [[Twitter Secret Messages]] (Steg Of The Dump) | * [[Twitter Secret Messages]] (Steg Of The Dump) | ||
* [[Unicode Steganography (unisteg)]] | * [[Unicode Steganography (unisteg)]] | ||
* [[Virtual Steganographic Laboratory (VSL)]] | * [[Virtual Steganographic Laboratory (VSL)]] | ||
+ | * [[Vodka-Tonic]] | ||
* [[wbStego]] | * [[wbStego]] | ||
− | * [[Whitespace]] | + | * [[Whitespace (BeyondMeh)|Whitespace]] |
+ | * [[White Noise Storm (WNSTORM)]] | ||
+ | * [[Xiao Steganography]] | ||
+ | * [[Xidie Security Suite]] | ||
+ | * [[yass-js]] | ||
+ | * [[yeo]] | ||
=== Steganographic algorithms === | === Steganographic algorithms === | ||
Line 130: | Line 192: | ||
== Obfuscation == | == Obfuscation == | ||
(make one type of file appear as a different type of file or no type at all) | (make one type of file appear as a different type of file or no type at all) | ||
+ | * [[BMP Wrap]] | ||
* [[bmpPacker]] | * [[bmpPacker]] | ||
+ | * [[Empty Picture]] | ||
* [[Exclusive Or]] | * [[Exclusive Or]] | ||
+ | * [[EyeMage IIE]] | ||
* [[File2PNG]] | * [[File2PNG]] | ||
* [[file2png (Sneed)]] | * [[file2png (Sneed)]] | ||
+ | * [[File2PNG (softenko)]] | ||
+ | * [[Hallucinate]] | ||
+ | * [[ImPack]] | ||
+ | * [[nicetext]] | ||
+ | * [[Piet]] - create images that are programs | ||
* [[PngBin]] | * [[PngBin]] | ||
* [[ROT13]] | * [[ROT13]] | ||
+ | * [[s2png]] | ||
+ | * [[Sam's Big Play Maker]] | ||
+ | * [[Stealth]] | ||
+ | * [[Steganosaurus (stego)]] | ||
+ | * [[Texto]] | ||
* [[tk]] | * [[tk]] | ||
* [[UDS : Unlimited Drive Storage]] | * [[UDS : Unlimited Drive Storage]] |
Latest revision as of 17:35, 12 November 2023
Contents |
[edit] Ciphers
[edit] Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
[edit] Password hashes
See also passwd#Password field.
[edit] Formats and protocols
- Cloak (.clk)
- Cryptoloop
- DissidentX
- dm-crypt
- Codecrypt
- FractalCrypt
- Horcrux (jesseduffield)
- Horcrux (kndyry)
- icecrypt
- inKey (.iK)
- Invisible Secrets (.isc)
- IZE
- Javascript Object Signing and Encryption (JOSE)
- JSON Web Encryption (JWE)
- Loop-AES
- LUKS
- Max File Encryption (.mfe)
- MCrypt (.nc)
- Message Smuggler (.enc)
- OpenSSL salted format
- PAE
- PAE2
- PGP
- QuickCrypto (.qce, .qcotfe)
- SDN (SDN Project)
- Silent Circle Instant Messaging Protocol
- SSL
- Steganos Privacy/Security Suite (.sef, .sle)
- TrueCrypt
- White Noise Storm (WNSTORM)
- Xidie Secure Archives
- XIP
- ZED
[edit] Digital rights management (DRM)
Main article: Digital Rights Management
- Content Scramble System (used on DVDs)
[edit]
(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)
[edit] Ransomware
Additional formats may be listed at Ransomware.
[edit] Steganography
- 4t HIT Mail Privacy Lite
- AnyFile2Image
- ARMaHYDAN
- BDV DataHider
- Black Wolf's Picture Encoder (StegoDos)
- BlindSide
- Camera/Shy
- Contraband
- CryptoStego
- CryptoStego - YASS version
- Crypture
- DC-Stegano
- DeepSound
- defy
- Digital Invisible Ink Toolkit
- Dound's Steganographer
- Encrypt Pic
- eShow
- EyeMage IIE
- File-Encryptor
- FireSteg
- Gif-It-Up
- gifshuffle
- Hallucinate
- Hide'N'Send
- Hide and Seek (HideSeek)
- Hide In Picture
- Hydan
- ImageContainer
- ImageHide
- ImageHide (dilshan)
- imagehide (techraj)
- Image Steganography (cpascoe)
- Image Steganography using Python
- InPlainView
- InThePicture
- Invisible Secrets
- JHide
- JPHS (JPHide/JPSeek)
- JSteg
- jsteg (Luke Champine)
- M4JPEG
- Magikfs
- Message Smuggler
- MP3 File Hider
- MP3Stego
- mp3stegz
- MSU StegoVideo
- OpenPuff
- OpenStego
- OutGuess
- PiggyPack
- QuickCrypto
- QuickStego
- rSteg
- rsteg (xgi)
- S-Tools
- Sealed
- Secret Layer
- SecretSpace
- SilentEye
- SNOW/stegsnow
- SSuite Picsel
- Stash-It (Stash)
- steg86
- stegan (edma2)
- Stegan (Von Mbah)
- Stegano
- SteganoGifPaletteOrder (SGPO)
- SteganographX Plus
- Steganography (FortKnox)
- Steganography Online Codec
- steganos
- Steganos Privacy/Security Suite
- steganotool
- SteganPEG
- stegfs
- steghide
- Stego WAV
- stego-wave
- stegodon
- StegoMagic
- StegoShare
- StegoStick
- Stegosuite
- StegoWav (Peter Heist)
- stegowav (robert461)
- Twitter Secret Messages (Steg Of The Dump)
- Unicode Steganography (unisteg)
- Virtual Steganographic Laboratory (VSL)
- Vodka-Tonic
- wbStego
- Whitespace
- White Noise Storm (WNSTORM)
- Xiao Steganography
- Xidie Security Suite
- yass-js
- yeo
[edit] Steganographic algorithms
(See also: Data Hiding/Embedding)
[edit] Obfuscation
(make one type of file appear as a different type of file or no type at all)
- BMP Wrap
- bmpPacker
- Empty Picture
- Exclusive Or
- EyeMage IIE
- File2PNG
- file2png (Sneed)
- File2PNG (softenko)
- Hallucinate
- ImPack
- nicetext
- Piet - create images that are programs
- PngBin
- ROT13
- s2png
- Sam's Big Play Maker
- Stealth
- Steganosaurus (stego)
- Texto
- tk
- UDS : Unlimited Drive Storage
- Wrapster
- ZIPD
[edit] Miscellaneous
[edit] See also
See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.
[edit] External links
[edit] Security techniques
- One way to keep your documents secure...
- Is It the Dawn of the Encryption App?
- Amid NSA uproar, encryption-standards body defends process
- STEED: project to create nonproprietary encryption
- Defending Against Crypto Backdoors
- Dark Mail Alliance - developing end-to-end encryption for e-mail
- FLOSS Manuals content being used in CryptoParties
- Cryptography Breakthrough Could Make Software Unhackable
- Time-capsule crypto to help journalists protect their sources
[edit] Code breaking, bugs, and back doors
- Breaking Hard-Disk Encryption
- Password Cracking AES-256 DMGs and Epic Self-Pwnage
- Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
- SSL: Intercepted today, decrypted tomorrow
- Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
- Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
- Researchers challenge Apple's claim of unbreakable iMessage encryption
- NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal
- Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010
- SSL3 “POODLE” Vulnerability
[edit] Unsolved (or finally-solved) codes/ciphers
- 70-year old code uncracked
- Mysterious coded messages at university library
- 7 Codes You’ll Never Ever Break
- World's most mysterious manuscript has genuine message
- Zodiac Killer cipher is cracked after eluding sleuths for 51 years
[edit] Tools, Utilities, and Software
- Encryption Detection: COPTR
- LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.
- Keybase: look up public keys connected with social-media usernames
- Easy Hash: free program which can calculate over 180 hash functions and checksums
[edit] Miscellaneous
- Cryptofloricon: send a message with flowers (not a secret one, though, since the decryption key is on the website!)
- Memo to the Amateur Cipher Designer
- Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)
- Check Out the Cipher from an Assassination Attempt on Queen Elizabeth
- Crypto Won’t Save You Either
- Programming-contest entries to hide a nasty message in note to boss
- The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison
- Mozilla Password Based Encryption