Encryption
From Just Solve the File Format Problem
(Difference between revisions)
Parchivist (Talk | contribs) (→Steganography) |
Parchivist (Talk | contribs) (→Steganography) |
||
Line 125: | Line 125: | ||
* [[wbStego]] | * [[wbStego]] | ||
* [[Whitespace (BeyondMeh)|Whitespace]] | * [[Whitespace (BeyondMeh)|Whitespace]] | ||
+ | * [[White Noise Storm (WNSTORM)]] | ||
* [[Xidie Security Suite]] | * [[Xidie Security Suite]] | ||
* [[yeo]] | * [[yeo]] |
Revision as of 03:11, 15 October 2023
Contents |
Ciphers
Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
Password hashes
See also passwd#Password field.
Formats and protocols
- Cryptoloop
- DissidentX
- dm-crypt
- Codecrypt
- FractalCrypt
- Horcrux (jesseduffield)
- Horcrux (kndyry)
- icecrypt
- IZE
- Javascript Object Signing and Encryption (JOSE)
- JSON Web Encryption (JWE)
- Loop-AES
- LUKS
- Max File Encryption (.mfe)
- MCrypt (.nc)
- OpenSSL salted format
- PAE
- PAE2
- PGP
- SDN (SDN Project)
- Silent Circle Instant Messaging Protocol
- SSL
- TrueCrypt
- Xidie Secure Archives
- XIP
- ZED
Digital rights management (DRM)
Main article: Digital Rights Management
- Content Scramble System (used on DVDs)
(see also Currency, where most such systems, including Bitcoin, are documented; however, applications of blockchain technology beyond currency use are now appearing)
Ransomware
Additional formats may be listed at Ransomware.
Steganography
- AnyFile2Image
- ARMaHYDAN
- BlindSide
- Camera/Shy
- DC-Stegano
- defy
- Digital Invisible Ink Toolkit
- EyeMage IIE
- File-Encryptor
- FireSteg
- gifshuffle
- Hide In Picture
- Hydan
- ImageHide
- ImageHide (dilshan)
- imagehide (techraj)
- Image Steganography using Python
- InPlainView
- InThePicture
- Invisible Secrets
- JPHS (JPHide/JPSeek)
- M4JPEG
- Magikfs
- MP3Stego
- OpenStego
- OutGuess
- PiggyPack
- QuickCrypto
- QuickStego
- SNOW/stegsnow
- steg86
- stegan (edma2)
- Stegan (Von Mbah)
- Stegano
- Steganography Online Codec
- steganos
- stegfs
- steghide
- stegodon
- StegoMagic
- StegoShare
- Stegosuite
- Twitter Secret Messages (Steg Of The Dump)
- Unicode Steganography (unisteg)
- Virtual Steganographic Laboratory (VSL)
- wbStego
- Whitespace
- White Noise Storm (WNSTORM)
- Xidie Security Suite
- yeo
Steganographic algorithms
(See also: Data Hiding/Embedding)
Obfuscation
(make one type of file appear as a different type of file or no type at all)
- bmpPacker
- Exclusive Or
- EyeMage IIE
- File2PNG
- file2png (Sneed)
- File2PNG (softenko)
- Piet - create images that are programs
- PngBin
- ROT13
- tk
- UDS : Unlimited Drive Storage
- Wrapster
- ZIPD
Miscellaneous
See also
See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.
External links
Security techniques
- One way to keep your documents secure...
- Is It the Dawn of the Encryption App?
- Amid NSA uproar, encryption-standards body defends process
- STEED: project to create nonproprietary encryption
- Defending Against Crypto Backdoors
- Dark Mail Alliance - developing end-to-end encryption for e-mail
- FLOSS Manuals content being used in CryptoParties
- Cryptography Breakthrough Could Make Software Unhackable
- Time-capsule crypto to help journalists protect their sources
Code breaking, bugs, and back doors
- Breaking Hard-Disk Encryption
- Password Cracking AES-256 DMGs and Epic Self-Pwnage
- Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
- SSL: Intercepted today, decrypted tomorrow
- Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
- Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
- Researchers challenge Apple's claim of unbreakable iMessage encryption
- NSA had secret deal on back-doored crypto with security firm RSA, Snowden docs reveal
- Why Android SSL was downgraded from AES256-SHA to RC4-MD5 in late 2010
- SSL3 “POODLE” Vulnerability
Unsolved (or finally-solved) codes/ciphers
- 70-year old code uncracked
- Mysterious coded messages at university library
- 7 Codes You’ll Never Ever Break
- World's most mysterious manuscript has genuine message
- Zodiac Killer cipher is cracked after eluding sleuths for 51 years
Tools, Utilities, and Software
- Encryption Detection: COPTR
- LibFTE: A toolkit for constructing practical, format-abiding encryption schemes.
- Keybase: look up public keys connected with social-media usernames
- Easy Hash: free program which can calculate over 180 hash functions and checksums
Miscellaneous
- Cryptofloricon: send a message with flowers (not a secret one, though, since the decryption key is on the website!)
- Memo to the Amateur Cipher Designer
- Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)
- Check Out the Cipher from an Assassination Attempt on Queen Elizabeth
- Crypto Won’t Save You Either
- Programming-contest entries to hide a nasty message in note to boss
- The Secret Codes That Cartel Bosses Use to Send Handwritten Orders from Prison
- Mozilla Password Based Encryption