Encryption
From Just Solve the File Format Problem
(Difference between revisions)
Parchivist (Talk | contribs) (→Steganography) |
(→Cryptographic hash functions) |
||
(11 intermediate revisions by one user not shown) | |||
Line 16: | Line 16: | ||
* [[BLAKE]] | * [[BLAKE]] | ||
* [[BLAKE2]] | * [[BLAKE2]] | ||
+ | * [[BLAKE3]] | ||
* [[MD4]] | * [[MD4]] | ||
* [[MD5]] | * [[MD5]] | ||
Line 59: | Line 60: | ||
* [[PGP]] | * [[PGP]] | ||
** [[PGP public key]] | ** [[PGP public key]] | ||
+ | * [[QuickCrypto]] (.qce, .qcotfe) | ||
* [[SDN (SDN Project)]] | * [[SDN (SDN Project)]] | ||
* [[Silent Circle Instant Messaging Protocol]] | * [[Silent Circle Instant Messaging Protocol]] | ||
* [[SSL]] | * [[SSL]] | ||
+ | * [[Steganos Privacy/Security Suite]] (.sef, .sle) | ||
* [[TrueCrypt]] | * [[TrueCrypt]] | ||
* [[White Noise Storm (WNSTORM)]] | * [[White Noise Storm (WNSTORM)]] | ||
Line 129: | Line 132: | ||
* [[MP3 File Hider]] | * [[MP3 File Hider]] | ||
* [[MP3Stego]] | * [[MP3Stego]] | ||
+ | * [[mp3stegz]] | ||
* [[MSU StegoVideo]] | * [[MSU StegoVideo]] | ||
+ | * [[OpenPuff]] | ||
* [[OpenStego]] | * [[OpenStego]] | ||
* [[OutGuess]] | * [[OutGuess]] | ||
Line 139: | Line 144: | ||
* [[S-Tools]] | * [[S-Tools]] | ||
* [[Sealed]] | * [[Sealed]] | ||
+ | * [[Secret Layer]] | ||
* [[SecretSpace]] | * [[SecretSpace]] | ||
* [[SilentEye]] | * [[SilentEye]] | ||
Line 148: | Line 154: | ||
* [[Stegan (Von Mbah)]] | * [[Stegan (Von Mbah)]] | ||
* [[Stegano]] | * [[Stegano]] | ||
+ | * [[SteganoGifPaletteOrder (SGPO)]] | ||
* [[SteganographX Plus]] | * [[SteganographX Plus]] | ||
* [[Steganography (FortKnox)]] | * [[Steganography (FortKnox)]] | ||
* [[Steganography Online Codec]] | * [[Steganography Online Codec]] | ||
* [[steganos]] | * [[steganos]] | ||
+ | * [[Steganos Privacy/Security Suite]] | ||
+ | * [[steganotool]] | ||
* [[SteganPEG]] | * [[SteganPEG]] | ||
* [[stegfs]] | * [[stegfs]] | ||
Line 186: | Line 195: | ||
* [[BMP Wrap]] | * [[BMP Wrap]] | ||
* [[bmpPacker]] | * [[bmpPacker]] | ||
+ | * [[Empty Picture]] | ||
* [[Exclusive Or]] | * [[Exclusive Or]] | ||
* [[EyeMage IIE]] | * [[EyeMage IIE]] |
Latest revision as of 14:58, 2 December 2024
Contents |
[edit] Ciphers
[edit] Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
[edit] Password hashes
See also passwd#Password field.
[edit] Formats and protocols
- Cloak (.clk)
- Cryptoloop
- DissidentX
- dm-crypt
- Codecrypt
- FractalCrypt
- Horcrux (jesseduffield)
- Horcrux (kndyry)
- icecrypt
- inKey (.iK)
- Invisible Secrets (.isc)
- IZE
- Javascript Object Signing and Encryption (JOSE)
- JSON Web Encryption (JWE)
- Loop-AES
- LUKS
- Max File Encryption (.mfe)
- MCrypt (.nc)
- Message Smuggler (.enc)
- OpenSSL salted format
- PAE
- PAE2
- PGP
- QuickCrypto (.qce, .qcotfe)
- SDN (SDN Project)
- Silent Circle Instant Messaging Protocol
- SSL
- Steganos Privacy/Security Suite (.sef, .sle)
- TrueCrypt
- White Noise Storm (WNSTORM)
- Xidie Secure Archives
- XIP
- ZED
[edit] Digital rights management (DRM)
Main article: Digital Rights Management
- Content Scramble System (used on DVDs)
[edit]
(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)
[edit] Ransomware
Additional formats may be listed at Ransomware.
[edit] Steganography
- 4t HIT Mail Privacy Lite
- AnyFile2Image
- ARMaHYDAN
- BDV DataHider
- Black Wolf's Picture Encoder (StegoDos)
- BlindSide
- Camera/Shy
- Contraband
- CryptoStego
- CryptoStego - YASS version
- Crypture
- DC-Stegano
- DeepSound
- defy
- Digital Invisible Ink Toolkit
- Dound's Steganographer
- Encrypt Pic
- eShow
- EyeMage IIE
- File-Encryptor
- FireSteg
- Gif-It-Up
- gifshuffle
- Hallucinate
- Hide'N'Send
- Hide and Seek (HideSeek)
- Hide In Picture
- Hydan
- ImageContainer
- ImageHide
- ImageHide (dilshan)
- imagehide (techraj)
- Image Steganography (cpascoe)
- Image Steganography using Python
- InPlainView
- InThePicture
- Invisible Secrets
- JHide
- JPHS (JPHide/JPSeek)
- JSteg
- jsteg (Luke Champine)
- M4JPEG
- Magikfs
- Message Smuggler
- MP3 File Hider
- MP3Stego
- mp3stegz
- MSU StegoVideo
- OpenPuff
- OpenStego
- OutGuess
- PiggyPack
- QuickCrypto
- QuickStego
- rSteg
- rsteg (xgi)
- S-Tools
- Sealed
- Secret Layer
- SecretSpace
- SilentEye
- SNOW/stegsnow
- SSuite Picsel
- Stash-It (Stash)
- steg86
- stegan (edma2)
- Stegan (Von Mbah)
- Stegano
- SteganoGifPaletteOrder (SGPO)
- SteganographX Plus
- Steganography (FortKnox)
- Steganography Online Codec
- steganos
- Steganos Privacy/Security Suite
- steganotool
- SteganPEG
- stegfs
- steghide
- Stego WAV
- stego-wave
- stegodon
- StegoMagic
- StegoShare
- StegoStick
- Stegosuite
- StegoWav (Peter Heist)
- stegowav (robert461)
- Twitter Secret Messages (Steg Of The Dump)
- Unicode Steganography (unisteg)
- Virtual Steganographic Laboratory (VSL)
- Vodka-Tonic
- wbStego
- Whitespace
- White Noise Storm (WNSTORM)
- Xiao Steganography
- Xidie Security Suite
- yass-js
- yeo
[edit] Steganographic algorithms
(See also: Data Hiding/Embedding)
[edit] Obfuscation
(make one type of file appear as a different type of file or no type at all)
- BMP Wrap
- bmpPacker
- Empty Picture
- Exclusive Or
- EyeMage IIE
- File2PNG
- file2png (Sneed)
- File2PNG (softenko)
- Hallucinate
- ImPack
- nicetext
- Piet - create images that are programs
- PngBin
- ROT13
- s2png
- Sam's Big Play Maker
- Stealth
- Steganosaurus (stego)
- Texto
- tk
- UDS : Unlimited Drive Storage
- Wrapster
- ZIPD
[edit] Miscellaneous
[edit] See also
See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.
[edit] External links
[edit] Security techniques
- One way to keep your documents secure...
- Is It the Dawn of the Encryption App?
- Amid NSA uproar, encryption-standards body defends process
- STEED: project to create nonproprietary encryption
- Defending Against Crypto Backdoors
- Dark Mail Alliance - developing end-to-end encryption for e-mail
- FLOSS Manuals content being used in CryptoParties
- Cryptography Breakthrough Could Make Software Unhackable
- Time-capsule crypto to help journalists protect their sources
[edit] Code breaking, bugs, and back doors
- Breaking Hard-Disk Encryption
- Password Cracking AES-256 DMGs and Epic Self-Pwnage
- Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
- SSL: Intercepted today, decrypted tomorrow
- Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
- Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
- Researchers challenge Apple's claim of unbreakable iMessage encryption
- NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal
- Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010
- SSL3 “POODLE” Vulnerability
[edit] Unsolved (or finally-solved) codes/ciphers
- 70-year old code uncracked
- Mysterious coded messages at university library
- 7 Codes You’ll Never Ever Break
- World's most mysterious manuscript has genuine message
- Zodiac Killer cipher is cracked after eluding sleuths for 51 years
[edit] Tools, Utilities, and Software
- Encryption Detection: COPTR
- LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.
- Keybase: look up public keys connected with social-media usernames
- Easy Hash: free program which can calculate over 180 hash functions and checksums
[edit] Miscellaneous
- Cryptofloricon: send a message with flowers (not a secret one, though, since the decryption key is on the website!)
- Memo to the Amateur Cipher Designer
- Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)
- Check Out the Cipher from an Assassination Attempt on Queen Elizabeth
- Crypto Won’t Save You Either
- Programming-contest entries to hide a nasty message in note to boss
- The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison
- Mozilla Password Based Encryption