Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
()
About this ebook
Expand your mind and your crypto knowledge with the ultimate desktop dictionary for all things cryptography. Written by a renowned cryptographer for experts and novices alike, Crypto Dictionary is rigorous in its definitions, yet easy to read and laced with humor. Flip to any random page to find something new, interesting, or mind-boggling, such as:
• A survey of crypto algorithms both widespread and niche, from RSA and DES to the USSR’s GOST cipher
• Trivia from the history of cryptography, such as the MINERVA backdoor in Crypto AG’s encryption algorithms
• An explanation of why the reference to the Blowfish cipher in the TV show 24 makes absolutely no sense
• Types of cryptographic protocols like zero-knowledge; security; and proofs of work, stake, and resource
• A polemic against referring to cryptocurrency as “crypto”
• Discussions of numerous cryptographic attacks, including slide and biclique
The book also looks toward the future of cryptography, with discussions of the threat quantum computing poses to current cryptosystems and a nod to post-quantum algorithms, such as lattice-based cryptographic schemes.
With hundreds of incisive entries organized alphabetically, Crypto Dictionary is the crypto go-to guide you’ll always want within reach.
Related to Crypto Dictionary
Related ebooks
Application and Implementation of DES Algorithm Based on FPGA Rating: 0 out of 5 stars0 ratingsEncryption Demystified The Key to Securing Your Digital Life Rating: 0 out of 5 stars0 ratingsUltimate Ethical Hacking Boot Camp Beginner to Pro Rating: 0 out of 5 stars0 ratingsCryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography Rating: 0 out of 5 stars0 ratingsCryptology for Beginners #1 Guide for Security, Encryption, Crypto, Algorithms and Python Rating: 0 out of 5 stars0 ratingsHash Functions and Algorithms: Definitive Reference for Developers and Engineers Rating: 0 out of 5 stars0 ratingsWireless Security Masterclass: Penetration Testing For Network Defenders And Ethical Hackers Rating: 0 out of 5 stars0 ratingsThe History of Cryptography: A Simple Guide to Big Ideas Rating: 0 out of 5 stars0 ratingsPrivacy-Preserving Engineering: Techniques and Technologies in Software Development Rating: 0 out of 5 stars0 ratingsBlowfish Cryptography in Practice: Definitive Reference for Developers and Engineers Rating: 0 out of 5 stars0 ratingsSecure Transmission Protocols: Implementing End-to-End Encryption in Mobile and Web Applications Rating: 0 out of 5 stars0 ratingsThe Internet: A Practical Guide for Beginners Rating: 0 out of 5 stars0 ratingsThe Bytes Behind Blocks: An Architect's Guide to Blockchain Rating: 0 out of 5 stars0 ratingsCybersecurity Design Principles: Building Secure Resilient Architecture Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Tests: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsComputer Data Rating: 0 out of 5 stars0 ratingsCyber-Assurance for the Internet of Things Rating: 0 out of 5 stars0 ratingsAnatomy of a cyberattack Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Lexicon of Computer Science Terminology: Lexicon of Tech and Business, #16 Rating: 4 out of 5 stars4/5Decipher It!: A Kid's Guide to Cryptography Rating: 0 out of 5 stars0 ratingsMastering Secure Coding: Writing Software That Stands Up to Attacks Rating: 0 out of 5 stars0 ratingsHow Hackers Can Hack Your Phone and How to Stop Them: Hacking, #2 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Review Guide: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsProtecting Your Assets: A Cybersecurity Guide for Small Businesses Rating: 0 out of 5 stars0 ratingsCISSP Exam Practice Tests - Covering All Domains - 1000 Ques - 2023 Rating: 4 out of 5 stars4/5AI-Enhanced Cryptocurrencies: A Revolutionary Approach to Blockchain Development Rating: 0 out of 5 stars0 ratings
Security For You
IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Hacking For Dummies Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHow to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsAmazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5CompTIA A+ Complete Study Guide, 2-Volume Set: Volume 1 Core 1 Exam 220-1201 and Volume 2 Core 2 Exam 220-1202 Rating: 0 out of 5 stars0 ratingsHands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions Rating: 5 out of 5 stars5/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5
Reviews for Crypto Dictionary
0 ratings0 reviews
Book preview
Crypto Dictionary - Jean-Philippe Aumasson
Contents
#
2013
65537
A
A5/0
A5/1
A5/2
A5/3
A5/4
Adaptive attack
AEAD (authenticated encryption with associated data)
AES (Advanced Encryption Standard)
AES-CCM
AES-GCM
AES-GCM-SIV
AES-NI
AES-SIV
AIM (Advanced INFOSEC Machine)
AKA
AKS (Agrawal–Kayal–Saxena)
Algebraic cryptanalysis
Alice
All-or-nothing transform (AONT)
Anonymous signature
Applied Cryptography
Applied cryptography
ARC4
Argon2
ARX (Add-Rotate-XOR)
ASIACRYPT
Asymmetric cryptography
Attack
Attribute-based encryption (ABE)
Authenticated cipher
Axolotl
B
Backdoor
Backtracking resistance
Backward secrecy
Base64
BassOmatic
BB84
bcrypt
Biclique cryptanalysis
BIKE (Bit Flipping Key Encapsulation)
BIP (Bitcoin improvement proposal)
Bit Gold
Bitcoin
Black
BLAKE
BLAKE2
BLAKE3
Bleichenbacher attack
Blind signature
Block cipher
Blockchain
Blockcipher
Blowfish
BLS (Boneh-Lynn-Shacham) signature
Bob
Boolean function
Boomerang attack
BQP (bounded-error quantum polynomial time)
Braid group cryptography
Brainpool curves
Break-in recovery
Broadcast encryption
Brute-force attack
Bulletproof
Byzantine fault tolerance
C
CAESAR
Caesar’s cipher
CAVP (Cryptographic Algorithm Validation Program)
CBC (cipher block chaining)
CECPQ (combined elliptic-curve and post-quantum)
Cellular automata
Ceremony
Certificate
Certificate authority (CA)
Certificate transparency (CT)
ChaCha20
CHES (Conference on Cryptographic Hardware and Embedded Systems)
CIA
Ciphertext stealing
Clipper
CMVP (Cryptographic Module Validation Program)
Code-based cryptography
Commitment
Concurrent zero-knowledge
Consensus protocol
Control word
COPACOBANA (Cost-Optimized PArallel COde Breaker)
Cothority (collective authority)
Cryptanalysis
Cryptids
Crypto
CRYPTO
Crypto AG
Crypto period
Crypto variable
Crypto wars
Cryptobiosis
Cryptocurrency
Crypto-Gram
Cryptography
Cryptologia
Cryptology
Cryptonomicon
Cryptorchidism
Cryptovirology
CRYPTREC
CSIDH (Commutative Supersingular Isogeny Diffie–Hellman)
CTF (capture the flag)
Cube attack
Curve25519
Curve448
Cypher
D
Daemon
Davies–Meyer
Decentralized private computation
Déchiffrer
Décrypter
Deniable encryption
DES (Data Encryption Standard)
Dictionary
Dictionary attack
Differential cryptanalysis
Diffie–Hellman
Disclosure
Discrete logarithm problem
Distinguisher
Distributed randomness
Dolev–Yao model
Double ratchet
Dragonfly
DRBG (deterministic random bit generator)
DSA (Digital Signature Algorithm)
DSS (Digital Signature Standard)
DVB-CSA
E
E0
ECB (electronic codebook)
ECC
ECDLP (Elliptic-curve discrete logarithm problem)
ECDSA (Elliptic-curve DSA)
ECIES (Elliptic-curve IES)
Ed25519
EdDSA
EKMS (Electronic Key Management System)
Electronic codebook
ElGamal
Elligator
Elliptic curve
Elliptic-curve cryptography
Encipherment
End-to-end encryption (E2EE)
Enigma
Entropy
ePrint
Erathosthenes’ sieve
eSTREAM
Ethereum
Eurocrypt
Eve
E-voting
F
Factoring problem
Feedback shift register
Feistel network
Fialka (Фиалка)
Fiat–Shamir
FIPS 140-2
FIPS 140-3
Forgery
Formal verification
Format-preserving encryption
Forward secrecy
FOX
FSE (Fast Software Encryption)
Fully homomorphic encryption
Functional encryption
Future secrecy
Fuzzy extractor
G
Generalized birthday problem
GNFS (General Number Field Sieve)
GOST
Grain
Gröbner basis
Group signature
Grover’s algorithm
H
Hardcore predicate
Hash function
Hash-based cryptography
Heartbleed
Hedged signature
HFE (Hidden Field Equations)
HMAC (Hash-based MAC)
Homomorphic encryption
HPC (Hasty Pudding Cipher)
HSM (hardware security module)
HTTP/3
Hyperelliptic-curve cryptography
I
IACR (International Association for Cryptologic Research)
IDEA (International Data Encryption Algorithm)
IDEA NXT
Identity-based encryption
IES (Integrated Encryption Scheme)
Impatient saboteur
Impossibility
Impossible differential attack
IND-CCA
IND-CPA
Indelibility
Indifferentiability
Indistinguishability
Indistinguishability obfuscation (iO)
Information-theoretic security
INT-CTXT
Invisible signature
IOTA
IPES (Improved Proposed Encryption Standard)
IPSec
ISO standard
Isogeny-based cryptography
J
Journal of Cryptology (JoC)
K
KASUMI
Keccak
KeeLoq
KEM (key encapsulation mechanism)
Kerberos
Kerckhoffs’ principles
Key derivation function (KDF)
Key escrow
Key management
Key wrapping
Kleptography
Known-key attack
Kupyna (Купина)
L
Laconic zero-knowledge proof
Lai–Massey
Lamport signature
Lattice-based cryptography
Le Chiffre
Leakage-resilient cryptography
Learning with errors (LWE)
Length extension attack
Length-preserving encryption
LFSR (linear feedback shift register)
Lightweight cryptography
Linear cryptanalysis
Linkability
LM hash
Luby–Rackoff
Lucifer
M
MAC (message authentication code)
MAGENTA
Malleability
Manger attack
Man-in-the-middle
MASH (Modular Arithmetic Secure Hash)
McEliece encryption scheme
MD4
MD5
MDC (Message Digest Cipher)
MDC-2 (Modification Detection Code 2)
Meet-in-the-middle
Merkle puzzle
Merkle tree
Merkle–Damgård construction
Mersenne twister
Message franking
Miller–Rabin
MINERVA
Mining
Misuse resistance
Mixnet
MQV (Menezes–Qu–Vanstone)
Multicollision
Multi-party computation (MPC)
Multivariate cryptography
N
NBS (National Bureau of Standards)
NESSIE (New European Schemes for Signatures, Integrity, and Encryption)
New Directions in Cryptography
NFSR (nonlinear feedback shift register)
NIST (National Institute of Standards and Technology)
NIZK (non-interactive zero-knowledge)
Noekeon
Noise
Nonce
Non-committing encryption
Non-outsourceability
Non-slanderability
NSA (National Security Agency)
NT hash
NTRU (Nth degree Truncated polynomial Ring Units)
Null cipher
O
OAEP (Optimal Asymmetric Encryption Padding)
Oblivious key management system (OKMS)
Oblivious PRF (OPRF)
Oblivious RAM (ORAM)
Oblivious transfer
Obscurity
OCB (offset codebook mode)
One-time pad
One-way function
Onion-AE
OPAQUE
OpenSSL
Oracle
OTR (Off-the-Record)
P
Padding oracle attack
Paillier cryptosystem
Pairing
Pairing-based cryptography
PAKE (password-authenticated key exchange)
Paradigm
Password hash function
PBKDF2 (Password-Based Key Derivation Function 2)
PCT (Private Communications Technology)
PEP (Plaintext equivalence proof)
Perfect forward secrecy
Permutation-based cryptography
PES (Proposed Encryption Standard)
PET (Plaintext equivalence test)
PFS
PGP (Pretty Good Privacy)
Photuris
Picnic
PKC
PKCS (Public Key Cryptography Standards)
Poly1305
Polynomial complexity
Post-compromise security
Post-quantum cryptography
Post-quantum RSA
Prediction resistance
Preimage
PRESENT
PRIMES
Privacy-preserving
Private information retrieval (PIR)
Proof of burn
Proof of catalytic space
Proof of human work
Proof of replication
Proof of reserve
Proof of security
Proof of sequential work
Proof of space
Proof of spacetime
Proof of stake
Proof of storage
Proof of useful work
Proof of work
Provable security
Provably secure
Proxy re-encryption
Pseudo-random
Pseudorandom function (PRF)
Pseudorandom number generator (PRNG)
Pseudorandom permutation (PRP)
Public-key cryptography
PUF (physically unclonable function)
Puncturable encryption
Puncturable pseudorandom function (PPRF)
Q
Quantum computer
Quantum cryptography
Quantum encryption
Quantum key distribution
Quantum signature
QUIC (Quick UDP Internet Connections)
R
Rabin cryptosystem
Rainbow tables
Random bits
Random oracle
Randomness
Range proof
RC4
RC5
RC6
Real world
Real World Crypto (RWC)
Rectangle attack
Related-key attack
Research papers
Revocation
Rijndael
Ring signature
RIPEMD-160
Rivest–Shamir–Adleman
ROBOT (Return Of Bleichenbacher’s Oracle Threat)
ROS
RSA
Rubber-hose cryptanalysis
Rumba20
S
SAEP (Simplified OAEP)
Salsa20
Sandwich attack
S-box
Scalar
sci.crypt
Scrambler
scrypt
Searchable encryption
secp256k1
Secret sharing
Security
Security proof
Semantic security
Serious Cryptography
Serpent
SHA-0
SHA-1
SHA-2
SHA-3
SHA-3 competition
SHACAL
Shamir’s secret database
Shor’s algorithm
SHS (Secure Hash Standard)
Side channel
Side-channel attack
Sigaba
Signal protocol
Signature
Signcryption
SIKE (Supersingular Isogeny Key Encapsulation)
SIMECK
SIMON
SipHash
SIV-AES
Skipjack
Slide attack
SM
Smart contract
Snake-oil
SNARK (succinct non-interactive argument of knowledge)
SNIP (secret-shared non-interactive proof)
SNOW 3G
Solitaire
SPECK
SPEKE (Simple Password Exponential Key Exchange)
SPHINCS
Sponge function
SRP (Secure Remote Password)
SSH (Secure Shell)
SSL (Secure Socket Layer)
STARK (scalable transparent arguments of knowledge)
Steganography
Stream cipher
Substitution-permutation network (SPN)
Suck
Sugar beet auctions
Suite A
SUPERCOP
Superpolynomial complexity
SVP (shortest vector problem)
Symmetric-key cryptography
T
TCC
Test vectors
Threefish
Threshold encryption
Threshold secret-sharing
Threshold signature
Time AI™
Time-lock encryption
Time-lock puzzle
Timing attack
TLS (Transport Layer Security)
Tor
Traitor tracing
Transfinite cryptography
Trapdoor
Triple DES
Trivium
True random number generator (TRNG)
Trusted third party
Tweakable block cipher
Twofish
U
Undeniable signature
Universal composability
Universal hash function
Updatable encryption
V
Verifiable delay function (VDF)
Verifiable random function (VRF)
Verifiable unpredictable function (VUF)
Vigenère cipher
VSH (Very Smooth Hash)
W
Wallet
Watermarking
White-box cryptography
Winternitz signature
WireGuard
X
X25519
X3DH
XMSS (eXtended Merkle Signature Scheme)
XOF (extendable output function)
XOR
XOR encryption
Z
Zerocash
ZKP (zero-knowledge proof)
ZRTP
Index of Terms
CRYPTO DICTIONARY
500 Tasty Tidbits for the Curious Cryptographer
by Jean-Philippe Aumasson
Publisher's MarkCRYPTO DICTONARY. Copyright © 2021 by Jean-Philippe Aumasson
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher.
ISBN-13: 978-1-7185-0140-9 (print)
ISBN-13: 978-1-7185-0141-6 (ebook)
Publisher: William Pollock
Execuitve Editor: Barbara Yien
Production Editor: Paula Williamson
Developmental Editors: Frances Saux and Athabasca Witschi
Cover Illustration: Rick Reese
Interior Design and Composition: Maureen Forys, Happenstance Type-O-Rama
Technical Reviewer: Pascal Junod
Copyeditor: Anne Marie Walker
Proofreader: James Fraleigh
For information on book distributors or translations, please contact No Starch Press, Inc. directly:
No Starch Press, Inc.
245 8th Street, San Francisco, CA 94103
phone: 1-415-863-9900; [email protected]
www.nostarch.com
The Library of Congress Control Number is: 2020946022
No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark.
The information in this book is distributed on an As Is
basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it.
À Melina
About the Author
Jean-Philippe (JP) Aumasson is the Chief Security Officer and cofounder of Taurus Group, a Swiss financial tech company specializing in digital assets infrastructure. Since 2006, he has authored more than 60 research articles in the field of cryptography and designed the widely used cryptographic algorithms BLAKE2 and SipHash. The author of the acclaimed book Serious Cryptography (No Starch Press, 2017), he speaks regularly at information security and technology conferences.
About the Technical Reviewer
Pascal Junod has worked in applied (and less applied) cryptography for a living since 1999, both in the academic and industrial worlds. He holds a master’s in computer science from ETH Zurich and a PhD in cryptography from EPF Lausanne. In his spare time, he loves trail running, white-water kayaking, reading books, and caring about his family.
Preface
I promise nothing complete; because any human thing supposed to be complete must for that very reason infallibly be faulty. I shall not pretend to a minute anatomical description of the various species, or—in this space at least—to much of any description. My object here is simply to project the draught of a systematization of cetology. I am the architect, not the builder.
—Herman Melville, in Moby Dick (Chapter XXXII)
Crypto Dictionary is quite different from my previous book. Its format and lighter tone might make it look less serious, but its seriousness lies in its breadth of treatment. Whereas Serious Cryptography covered applied crypto’s fundamentals, or less than 10 percent of all there is to know in the field, this dictionary has the pretension of covering at least 75 percent of cryptography’s realm.
The unhurried, gradual, and relatively deep exposition in Serious Cryptography is replaced with a less headache-inducing structure filled with concise, direct definitions. This coffee-table book form intends to expose the richness of cryptography, including its exotic and underappreciated corners, to share knowledge and be a gateway to a better appreciation of the science of secrecy.
As the epigraph hints, Crypto Dictionary isn’t an attempt to deliver a real dictionary that would comprehensively and consistently cover cryptography’s diverse areas. You might not find your favorite protocol or cipher and will probably be surprised by the absence of certain terms that I purposefully omitted or just didn’t think of. But you’ll find many of the major notions and algorithms that cryptographers encounter today, as well as an opinionated selection of terms that I found of practical, theoretical, historical, or anecdotal interest.
Seasoned cryptographers might observe that the book isn’t very egalitarian. Although I attempted to cover all streets and alleys of cryptography evenly, certain neighborhoods are inevitably more equally treated than others due to my biases, experience, interests, and variable inspiration. I hope this heterogeneity won’t be perceived as unfairness, because that was definitely not my intention.
For example, I chose not to list individuals or software components; instead, the book focuses on the concepts and cryptographic objects that people created and that engineers implemented, which I believe are of greater interest. In accordance with the no-software rule, I didn’t include the Signal application, yet I did include the Signal protocol. But this rule suffered one exception, which you’ll find between the letters N and P.
This dictionary doesn’t pretend to provide a precise description of the various protocols, algorithms, and other cryptologic notions. Crypto Dictionary isn’t an encyclopedia and doesn’t aim to be a modern version of the venerable Handbook of Applied Cryptography. Readers who seek, for example, a formal definition of attribute-based cryptography or a detailed specification of AES will find plenty of references online.
Most definitions are actual definitions, but they vary in how informative they are. I didn’t strive for a consistent level of detail and deliberately just minimally explained certain terms—including some of the most established ones—or