Encryption
From Just Solve the File Format Problem
(Difference between revisions)
Dan Tobias (Talk | contribs) (→External links) |
Parchivist (Talk | contribs) (→Obfuscation) |
||
(233 intermediate revisions by 5 users not shown) | |||
Line 2: | Line 2: | ||
|formattype=electronic | |formattype=electronic | ||
|thiscat=Encryption | |thiscat=Encryption | ||
+ | |image=Detective in spyglass.png | ||
}} | }} | ||
+ | == Ciphers == | ||
+ | * [[AES]] | ||
+ | * [[Blowfish]] | ||
+ | * [[ChaCha]] | ||
+ | * [[DES]] | ||
+ | * [[ICE (encryption algorithm)|ICE]] | ||
+ | * [[RC4]] | ||
+ | * [[Triple DES]] | ||
− | + | == Cryptographic hash functions == | |
+ | * [[BLAKE]] | ||
+ | * [[BLAKE2]] | ||
+ | * [[MD4]] | ||
+ | * [[MD5]] | ||
+ | * [[RIPEMD]] | ||
+ | * [[RIPEMD-160]] | ||
+ | * [[SHA-1]] | ||
+ | * [[SHA-2]] | ||
+ | * [[SHA-3]] | ||
+ | For non-cryptographic hash functions, see [[Error detection and correction]]. | ||
+ | == Password hashes == | ||
+ | * [[Argon2]] | ||
+ | * [[bcrypt]] | ||
+ | * [[passwd#crypt|crypt]] | ||
+ | * [[PBKDF2]] | ||
+ | * [[scrypt]] | ||
+ | |||
+ | See also [[passwd#Password field]]. | ||
+ | |||
+ | == Formats and protocols == | ||
+ | * [[Cloak]] (.clk) | ||
+ | * [[Cryptoloop]] | ||
+ | * [[DissidentX]] | ||
+ | * [[dm-crypt]] | ||
+ | * [[Codecrypt]] | ||
+ | * [[FractalCrypt]] | ||
+ | * [[Horcrux (jesseduffield)]] | ||
+ | * [[Horcrux (kndyry)]] | ||
+ | * [[icecrypt]] | ||
+ | * [[inKey]] (.iK) | ||
+ | * [[Invisible Secrets]] (.isc) | ||
+ | * [[IZE]] | ||
+ | * [[Javascript Object Signing and Encryption]] (JOSE) | ||
+ | * [[JSON Web Encryption]] (JWE) | ||
+ | * [[Loop-AES]] | ||
+ | * [[LUKS]] | ||
+ | * [[Max File Encryption]] (.mfe) | ||
+ | * [[MCrypt]] (.nc) | ||
+ | * [[Message Smuggler]] (.enc) | ||
+ | * [[OpenSSL salted format]] | ||
+ | * [[PAE]] | ||
+ | * [[PAE2]] | ||
* [[PGP]] | * [[PGP]] | ||
− | * [[ | + | ** [[PGP public key]] |
+ | * [[QuickCrypto]] (.qce, .qcotfe) | ||
+ | * [[SDN (SDN Project)]] | ||
+ | * [[Silent Circle Instant Messaging Protocol]] | ||
+ | * [[SSL]] | ||
+ | * [[Steganos Privacy/Security Suite]] (.sef, .sle) | ||
* [[TrueCrypt]] | * [[TrueCrypt]] | ||
+ | * [[White Noise Storm (WNSTORM)]] | ||
+ | * [[Xidie Secure Archives]] | ||
+ | * [[XIP]] | ||
+ | * [[ZED]] | ||
− | See also [[Security]]. Various other formats, including [[compression]] | + | == Digital rights management (DRM) == |
+ | Main article: [[Digital Rights Management]] | ||
+ | |||
+ | * [[Content Scramble System]] (used on DVDs) | ||
+ | |||
+ | == Blockchain-related systems == | ||
+ | (see also [[Currency]], where most such systems, including [[Bitcoin]], are documented; however, applications of blockchain technology beyond currency use are now appearing) | ||
+ | * [[Tezos]] | ||
+ | |||
+ | == [[Ransomware]] == | ||
+ | * [[Cryptolocker]] | ||
+ | |||
+ | Additional formats may be listed at [[Ransomware]]. | ||
+ | |||
+ | == [[Steganography]] == | ||
+ | * [[4t HIT Mail Privacy Lite]] | ||
+ | * [[AnyFile2Image]] | ||
+ | * [[ARMaHYDAN]] | ||
+ | * [[BDV DataHider]] | ||
+ | * [[Black Wolf's Picture Encoder (StegoDos)]] | ||
+ | * [[BlindSide]] | ||
+ | * [[Camera/Shy]] | ||
+ | * [[Contraband]] | ||
+ | * [[CryptoStego]] | ||
+ | * [[CryptoStego - YASS version]] | ||
+ | * [[Crypture]] | ||
+ | * [[DC-Stegano]] | ||
+ | * [[DeepSound]] | ||
+ | * [[defy]] | ||
+ | * [[Digital Invisible Ink Toolkit]] | ||
+ | * [[Dound's Steganographer]] | ||
+ | * [[Encrypt Pic]] | ||
+ | * [[eShow]] | ||
+ | * [[EyeMage IIE]] | ||
+ | * [[File-Encryptor]] | ||
+ | * [[FireSteg]] | ||
+ | * [[Gif-It-Up]] | ||
+ | * [[gifshuffle]] | ||
+ | * [[Hallucinate]] | ||
+ | * [[Hide'N'Send]] | ||
+ | * [[Hide and Seek (HideSeek)]] | ||
+ | * [[Hide In Picture]] | ||
+ | * [[Hydan]] | ||
+ | * [[ImageContainer]] | ||
+ | * [[ImageHide]] | ||
+ | * [[ImageHide (dilshan)]] | ||
+ | * [[imagehide (techraj)]] | ||
+ | * [[Image Steganography (cpascoe)]] | ||
+ | * [[Image Steganography using Python]] | ||
+ | * [[InPlainView]] | ||
+ | * [[InThePicture]] | ||
+ | * [[Invisible Secrets]] | ||
+ | * [[JHide]] | ||
+ | * [[JPHS (JPHide/JPSeek)]] | ||
+ | * [[JSteg]] | ||
+ | * [[jsteg (Luke Champine)]] | ||
+ | * [[M4JPEG]] | ||
+ | * [[Magikfs]] | ||
+ | * [[Message Smuggler]] | ||
+ | * [[MP3 File Hider]] | ||
+ | * [[MP3Stego]] | ||
+ | * [[mp3stegz]] | ||
+ | * [[MSU StegoVideo]] | ||
+ | * [[OpenPuff]] | ||
+ | * [[OpenStego]] | ||
+ | * [[OutGuess]] | ||
+ | * [[PiggyPack]] | ||
+ | * [[QuickCrypto]] | ||
+ | * [[QuickStego]] | ||
+ | * [[rSteg]] | ||
+ | * [[rsteg (xgi)]] | ||
+ | * [[S-Tools]] | ||
+ | * [[Sealed]] | ||
+ | * [[Secret Layer]] | ||
+ | * [[SecretSpace]] | ||
+ | * [[SilentEye]] | ||
+ | * [[SNOW/stegsnow]] | ||
+ | * [[SSuite Picsel]] | ||
+ | * [[Stash-It (Stash)]] | ||
+ | * [[steg86]] | ||
+ | * [[stegan (edma2)]] | ||
+ | * [[Stegan (Von Mbah)]] | ||
+ | * [[Stegano]] | ||
+ | * [[SteganoGifPaletteOrder (SGPO)]] | ||
+ | * [[SteganographX Plus]] | ||
+ | * [[Steganography (FortKnox)]] | ||
+ | * [[Steganography Online Codec]] | ||
+ | * [[steganos]] | ||
+ | * [[Steganos Privacy/Security Suite]] | ||
+ | * [[steganotool]] | ||
+ | * [[SteganPEG]] | ||
+ | * [[stegfs]] | ||
+ | * [[steghide]] | ||
+ | * [[Stego WAV]] | ||
+ | * [[stego-wave]] | ||
+ | * [[stegodon]] | ||
+ | * [[StegoMagic]] | ||
+ | * [[StegoShare]] | ||
+ | * [[StegoStick]] | ||
+ | * [[Stegosuite]] | ||
+ | * [[StegoWav (Peter Heist)]] | ||
+ | * [[stegowav (robert461)]] | ||
+ | * [[Twitter Secret Messages]] (Steg Of The Dump) | ||
+ | * [[Unicode Steganography (unisteg)]] | ||
+ | * [[Virtual Steganographic Laboratory (VSL)]] | ||
+ | * [[Vodka-Tonic]] | ||
+ | * [[wbStego]] | ||
+ | * [[Whitespace (BeyondMeh)|Whitespace]] | ||
+ | * [[White Noise Storm (WNSTORM)]] | ||
+ | * [[Xiao Steganography]] | ||
+ | * [[Xidie Security Suite]] | ||
+ | * [[yass-js]] | ||
+ | * [[yeo]] | ||
+ | |||
+ | === Steganographic algorithms === | ||
+ | * [[F5]] | ||
+ | * [[J3]] | ||
+ | |||
+ | (See also: [[Data Hiding/Embedding]]) | ||
+ | |||
+ | == Obfuscation == | ||
+ | (make one type of file appear as a different type of file or no type at all) | ||
+ | * [[BMP Wrap]] | ||
+ | * [[bmpPacker]] | ||
+ | * [[Empty Picture]] | ||
+ | * [[Exclusive Or]] | ||
+ | * [[EyeMage IIE]] | ||
+ | * [[File2PNG]] | ||
+ | * [[file2png (Sneed)]] | ||
+ | * [[File2PNG (softenko)]] | ||
+ | * [[Hallucinate]] | ||
+ | * [[ImPack]] | ||
+ | * [[nicetext]] | ||
+ | * [[Piet]] - create images that are programs | ||
+ | * [[PngBin]] | ||
+ | * [[ROT13]] | ||
+ | * [[s2png]] | ||
+ | * [[Sam's Big Play Maker]] | ||
+ | * [[Stealth]] | ||
+ | * [[Steganosaurus (stego)]] | ||
+ | * [[Texto]] | ||
+ | * [[tk]] | ||
+ | * [[UDS : Unlimited Drive Storage]] | ||
+ | * [[Wrapster]] | ||
+ | * [[ZIPD]] | ||
+ | |||
+ | == Miscellaneous == | ||
+ | * [[Doom cheat code encryption]] | ||
+ | * [[Mono]] | ||
+ | * [[OpenSSL]] | ||
+ | * [[Shamir's Secret Sharing]] | ||
+ | |||
+ | == See also == | ||
+ | See also [[Security]] for information on digital certificates and electronic signing. Various other formats, including [[compression]], [[archiving]], and [[filesystem]] formats, may support encryption as a built-in feature or through plug-ins. | ||
== External links == | == External links == | ||
+ | === Security techniques === | ||
+ | * [http://boingboing.net/2013/02/22/secure-documents.html One way to keep your documents secure...] | ||
+ | * [https://mashable.com/2013/06/28/encryption-apps/ Is It the Dawn of the Encryption App?] | ||
+ | * [http://news.cnet.com/8301-13578_3-57602246-38/amid-nsa-uproar-encryption-standards-body-defends-process/ Amid NSA uproar, encryption-standards body defends process] | ||
+ | * [http://blogs.fsfe.org/greve/?p=634 STEED: project to create nonproprietary encryption] | ||
+ | * [https://www.schneier.com/blog/archives/2013/10/defending_again_1.html Defending Against Crypto Backdoors] | ||
+ | * [http://www.darkmail.info/ Dark Mail Alliance] - developing end-to-end encryption for e-mail | ||
+ | * [http://www.flossmanuals.org/news/floss-manuals-content-being-used-cryptoparties FLOSS Manuals content being used in CryptoParties] | ||
+ | * [http://www.wired.com/wiredscience/2014/02/cryptography-breakthrough/all/ Cryptography Breakthrough Could Make Software Unhackable] | ||
+ | * [http://boingboing.net/2014/06/09/time-capsule-crypto-to-help-jo.html Time-capsule crypto to help journalists protect their sources] | ||
+ | |||
+ | === Code breaking, bugs, and back doors === | ||
+ | * [http://www.schneier.com/blog/archives/2012/12/breaking_hard-d.html Breaking Hard-Disk Encryption] | ||
+ | * [http://blog.whitehatsec.com/cracking-aes-256-dmgs-and-epic-self-pwnage/ Password Cracking AES-256 DMGs and Epic Self-Pwnage] | ||
+ | * [http://www.wired.com/wiredscience/2013/06/quantum-cryptography-hack/ Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not] | ||
+ | * [http://news.netcraft.com/archives/2013/06/25/ssl-intercepted-today-decrypted-tomorrow.html SSL: Intercepted today, decrypted tomorrow] | ||
+ | * [http://boingboing.net/2013/09/05/report-nsa-slices-through-mos.html Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden] | ||
+ | * [http://arstechnica.com/security/2014/03/critical-crypto-bug-leaves-linux-hundreds-of-apps-open-to-eavesdropping/ Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping] | ||
+ | * [http://www.macworld.com/article/2055640/researchers-challenge-apples-claim-of-unbreakable-imessage-encryption.html Researchers challenge Apple's claim of unbreakable iMessage encryption] | ||
+ | * [http://boingboing.net/2013/12/20/nsa-had-secret-deal-on-back-do.html NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal] | ||
+ | * [http://op-co.de/blog/posts/android_ssl_downgrade/ Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010] | ||
+ | * [http://security.stackexchange.com/questions/70719/ssl3-poodle-vulnerability SSL3 “POODLE” Vulnerability] | ||
+ | |||
+ | === Unsolved (or finally-solved) codes/ciphers === | ||
* [http://mobile.reuters.com/article/idUSBRE8AM0E520121123?irpc=932 70-year old code uncracked] | * [http://mobile.reuters.com/article/idUSBRE8AM0E520121123?irpc=932 70-year old code uncracked] | ||
+ | * [http://boingboing.net/2014/03/25/mysterious-coded-messages-at-u.html Mysterious coded messages at university library] | ||
* [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break] | * [http://www.wired.com/dangerroom/2012/12/codes/?pid=1708&viewall=true 7 Codes You’ll Never Ever Break] | ||
+ | * [http://www.nbcnews.com/science/worlds-most-mysterious-manuscript-has-genuine-message-6C10444898 World's most mysterious manuscript has genuine message] | ||
+ | * [https://arstechnica.com/information-technology/2020/12/zodiac-killer-cipher-is-cracked-after-eluding-sleuths-for-51-years/ Zodiac Killer cipher is cracked after eluding sleuths for 51 years] | ||
+ | |||
+ | === Tools, Utilities, and Software === | ||
+ | * [http://coptr.digipres.org/Category:Encryption_Detection Encryption Detection: COPTR] | ||
+ | * [https://libfte.org/ LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.] | ||
+ | * [https://keybase.io/ Keybase: look up public keys connected with social-media usernames] | ||
+ | * [http://ziin.pl/en/easy_hash Easy Hash: free program which can calculate over 180 hash functions and checksums] | ||
+ | |||
+ | === Miscellaneous === | ||
+ | * [http://cryptofloricon.com/ Cryptofloricon: send a message with flowers] (not a ''secret'' one, though, since the decryption key is on the website!) | ||
+ | * [https://www.schneier.com/crypto-gram-9810.html#cipherdesign Memo to the Amateur Cipher Designer] | ||
+ | * [http://www.theonion.com/articles/fasttalking-computer-hacker-just-has-to-break-thro,32000/ Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)] | ||
+ | * [http://io9.com/check-out-the-cipher-from-an-assassination-attempt-on-q-1567478070 Check Out the Cipher from an Assassination Attempt on Queen Elizabeth] | ||
+ | * [http://regmedia.co.uk/2014/05/16/0955_peter_gutmann.pdf Crypto Won’t Save You Either] | ||
+ | * [http://codegolf.stackexchange.com/questions/32024/i-am-passive-aggressive-and-want-to-insult-my-boss-without-him-finding-out?stw=2 Programming-contest entries to hide a nasty message in note to boss] | ||
+ | * [http://motherboard.vice.com/read/the-secret-codes-that-cartels-use-to-send-orders-from-prison?trk_source=recommended The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison] | ||
+ | * [https://github.com/lclevy/firepwd/blob/master/mozilla_pbe.pdf Mozilla Password Based Encryption] |
Latest revision as of 17:35, 12 November 2023
Contents |
[edit] Ciphers
[edit] Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
[edit] Password hashes
See also passwd#Password field.
[edit] Formats and protocols
- Cloak (.clk)
- Cryptoloop
- DissidentX
- dm-crypt
- Codecrypt
- FractalCrypt
- Horcrux (jesseduffield)
- Horcrux (kndyry)
- icecrypt
- inKey (.iK)
- Invisible Secrets (.isc)
- IZE
- Javascript Object Signing and Encryption (JOSE)
- JSON Web Encryption (JWE)
- Loop-AES
- LUKS
- Max File Encryption (.mfe)
- MCrypt (.nc)
- Message Smuggler (.enc)
- OpenSSL salted format
- PAE
- PAE2
- PGP
- QuickCrypto (.qce, .qcotfe)
- SDN (SDN Project)
- Silent Circle Instant Messaging Protocol
- SSL
- Steganos Privacy/Security Suite (.sef, .sle)
- TrueCrypt
- White Noise Storm (WNSTORM)
- Xidie Secure Archives
- XIP
- ZED
[edit] Digital rights management (DRM)
Main article: Digital Rights Management
- Content Scramble System (used on DVDs)
[edit]
(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)
[edit] Ransomware
Additional formats may be listed at Ransomware.
[edit] Steganography
- 4t HIT Mail Privacy Lite
- AnyFile2Image
- ARMaHYDAN
- BDV DataHider
- Black Wolf's Picture Encoder (StegoDos)
- BlindSide
- Camera/Shy
- Contraband
- CryptoStego
- CryptoStego - YASS version
- Crypture
- DC-Stegano
- DeepSound
- defy
- Digital Invisible Ink Toolkit
- Dound's Steganographer
- Encrypt Pic
- eShow
- EyeMage IIE
- File-Encryptor
- FireSteg
- Gif-It-Up
- gifshuffle
- Hallucinate
- Hide'N'Send
- Hide and Seek (HideSeek)
- Hide In Picture
- Hydan
- ImageContainer
- ImageHide
- ImageHide (dilshan)
- imagehide (techraj)
- Image Steganography (cpascoe)
- Image Steganography using Python
- InPlainView
- InThePicture
- Invisible Secrets
- JHide
- JPHS (JPHide/JPSeek)
- JSteg
- jsteg (Luke Champine)
- M4JPEG
- Magikfs
- Message Smuggler
- MP3 File Hider
- MP3Stego
- mp3stegz
- MSU StegoVideo
- OpenPuff
- OpenStego
- OutGuess
- PiggyPack
- QuickCrypto
- QuickStego
- rSteg
- rsteg (xgi)
- S-Tools
- Sealed
- Secret Layer
- SecretSpace
- SilentEye
- SNOW/stegsnow
- SSuite Picsel
- Stash-It (Stash)
- steg86
- stegan (edma2)
- Stegan (Von Mbah)
- Stegano
- SteganoGifPaletteOrder (SGPO)
- SteganographX Plus
- Steganography (FortKnox)
- Steganography Online Codec
- steganos
- Steganos Privacy/Security Suite
- steganotool
- SteganPEG
- stegfs
- steghide
- Stego WAV
- stego-wave
- stegodon
- StegoMagic
- StegoShare
- StegoStick
- Stegosuite
- StegoWav (Peter Heist)
- stegowav (robert461)
- Twitter Secret Messages (Steg Of The Dump)
- Unicode Steganography (unisteg)
- Virtual Steganographic Laboratory (VSL)
- Vodka-Tonic
- wbStego
- Whitespace
- White Noise Storm (WNSTORM)
- Xiao Steganography
- Xidie Security Suite
- yass-js
- yeo
[edit] Steganographic algorithms
(See also: Data Hiding/Embedding)
[edit] Obfuscation
(make one type of file appear as a different type of file or no type at all)
- BMP Wrap
- bmpPacker
- Empty Picture
- Exclusive Or
- EyeMage IIE
- File2PNG
- file2png (Sneed)
- File2PNG (softenko)
- Hallucinate
- ImPack
- nicetext
- Piet - create images that are programs
- PngBin
- ROT13
- s2png
- Sam's Big Play Maker
- Stealth
- Steganosaurus (stego)
- Texto
- tk
- UDS : Unlimited Drive Storage
- Wrapster
- ZIPD
[edit] Miscellaneous
[edit] See also
See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.
[edit] External links
[edit] Security techniques
- One way to keep your documents secure...
- Is It the Dawn of the Encryption App?
- Amid NSA uproar, encryption-standards body defends process
- STEED: project to create nonproprietary encryption
- Defending Against Crypto Backdoors
- Dark Mail Alliance - developing end-to-end encryption for e-mail
- FLOSS Manuals content being used in CryptoParties
- Cryptography Breakthrough Could Make Software Unhackable
- Time-capsule crypto to help journalists protect their sources
[edit] Code breaking, bugs, and back doors
- Breaking Hard-Disk Encryption
- Password Cracking AES-256 DMGs and Epic Self-Pwnage
- Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
- SSL: Intercepted today, decrypted tomorrow
- Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
- Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
- Researchers challenge Apple's claim of unbreakable iMessage encryption
- NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal
- Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010
- SSL3 “POODLE” Vulnerability
[edit] Unsolved (or finally-solved) codes/ciphers
- 70-year old code uncracked
- Mysterious coded messages at university library
- 7 Codes You’ll Never Ever Break
- World's most mysterious manuscript has genuine message
- Zodiac Killer cipher is cracked after eluding sleuths for 51 years
[edit] Tools, Utilities, and Software
- Encryption Detection: COPTR
- LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.
- Keybase: look up public keys connected with social-media usernames
- Easy Hash: free program which can calculate over 180 hash functions and checksums
[edit] Miscellaneous
- Cryptofloricon: send a message with flowers (not a secret one, though, since the decryption key is on the website!)
- Memo to the Amateur Cipher Designer
- Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)
- Check Out the Cipher from an Assassination Attempt on Queen Elizabeth
- Crypto Won’t Save You Either
- Programming-contest entries to hide a nasty message in note to boss
- The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison
- Mozilla Password Based Encryption