From Wikipedia, the free encyclopedia
This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.
To report bugs, please write on the Community tech bot talk page on Meta.
Period: 2024-09-01 to 2024-09-30
Total views: 5,856,047
Updated: 01:47, 6 October 2024 (UTC)
Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
WhatsApp
|
742,689
|
24,756
|
B
|
High
|
2
|
Telegram (software)
|
333,184
|
11,106
|
B
|
Mid
|
3
|
Alan Turing
|
180,706
|
6,023
|
GA
|
Top
|
4
|
Bitcoin
|
157,136
|
5,237
|
B
|
High
|
5
|
Cryptocurrency
|
119,447
|
3,981
|
C
|
High
|
6
|
Tor (network)
|
101,011
|
3,367
|
B
|
Mid
|
7
|
WikiLeaks
|
97,486
|
3,249
|
B
|
Low
|
8
|
Voynich manuscript
|
95,281
|
3,176
|
B
|
Low
|
9
|
The Imitation Game
|
76,407
|
2,546
|
C
|
Mid
|
10
|
Blockchain
|
72,434
|
2,414
|
B
|
High
|
11
|
Transport Layer Security
|
71,956
|
2,398
|
B
|
Top
|
12
|
National Security Agency
|
64,114
|
2,137
|
C
|
High
|
13
|
HTTPS
|
61,447
|
2,048
|
C
|
High
|
14
|
Signal (software)
|
57,591
|
1,919
|
C
|
Mid
|
15
|
Enigma machine
|
53,333
|
1,777
|
C
|
High
|
16
|
RSA (cryptosystem)
|
47,911
|
1,597
|
C
|
Top
|
17
|
Virtual private network
|
45,325
|
1,510
|
C
|
Mid
|
18
|
HTTP Strict Transport Security
|
42,600
|
1,420
|
C
|
Low
|
19
|
Advanced Encryption Standard
|
42,007
|
1,400
|
B
|
Top
|
20
|
Diffie–Hellman key exchange
|
40,034
|
1,334
|
C
|
Top
|
21
|
Cryptography
|
38,967
|
1,298
|
C
|
Top
|
22
|
Secure Shell
|
38,427
|
1,280
|
C
|
High
|
23
|
SHA-2
|
38,126
|
1,270
|
C
|
Top
|
24
|
Changpeng Zhao
|
37,362
|
1,245
|
Start
|
Low
|
25
|
Caesar cipher
|
35,840
|
1,194
|
FA
|
High
|
26
|
Vigenère cipher
|
35,514
|
1,183
|
B
|
Low
|
27
|
Vitalik Buterin
|
34,388
|
1,146
|
C
|
Low
|
28
|
History of bitcoin
|
34,166
|
1,138
|
C
|
Low
|
29
|
Public-key cryptography
|
33,525
|
1,117
|
C
|
Top
|
30
|
Darknet market
|
31,179
|
1,039
|
B
|
Mid
|
31
|
Dogecoin
|
28,461
|
948
|
C
|
Low
|
32
|
Block cipher mode of operation
|
27,555
|
918
|
C
|
Top
|
33
|
Man-in-the-middle attack
|
26,658
|
888
|
C
|
Mid
|
34
|
MD5
|
25,788
|
859
|
C
|
Top
|
35
|
GCHQ
|
24,705
|
823
|
B
|
Low
|
36
|
Claude Shannon
|
24,416
|
813
|
C
|
Top
|
37
|
Information theory
|
24,043
|
801
|
B
|
Top
|
38
|
Cryptographic hash function
|
23,958
|
798
|
C
|
Top
|
39
|
Joan Clarke
|
23,590
|
786
|
C
|
Mid
|
40
|
Password
|
23,473
|
782
|
C
|
Top
|
41
|
Proton Mail
|
23,354
|
778
|
C
|
Low
|
42
|
HMAC
|
22,789
|
759
|
C
|
High
|
43
|
Zimmermann telegram
|
22,742
|
758
|
B
|
High
|
44
|
Digital signature
|
22,722
|
757
|
C
|
Top
|
45
|
Steganography
|
22,193
|
739
|
B
|
High
|
46
|
Active Directory
|
21,671
|
722
|
C
|
Low
|
47
|
NordVPN
|
21,255
|
708
|
C
|
Mid
|
48
|
Pretty Good Privacy
|
21,133
|
704
|
B
|
High
|
49
|
Knapsack problem
|
21,074
|
702
|
C
|
Mid
|
50
|
Bletchley Park
|
19,510
|
650
|
B
|
High
|
51
|
Elliptic-curve cryptography
|
19,479
|
649
|
C
|
High
|
52
|
Sator Square
|
19,449
|
648
|
B
|
Low
|
53
|
Keychain (software)
|
19,397
|
646
|
Start
|
Unknown
|
54
|
Kryptos
|
19,143
|
638
|
C
|
Low
|
55
|
Encryption
|
18,858
|
628
|
C
|
Top
|
56
|
Information security
|
18,812
|
627
|
B
|
Top
|
57
|
SHA-1
|
18,658
|
621
|
C
|
Top
|
58
|
Letter frequency
|
18,551
|
618
|
B
|
Low
|
59
|
Wi-Fi Protected Access
|
18,219
|
607
|
C
|
Mid
|
60
|
Cipher
|
18,163
|
605
|
C
|
Top
|
61
|
Trusted Platform Module
|
18,136
|
604
|
C
|
Mid
|
62
|
ROT13
|
17,879
|
595
|
C
|
Mid
|
63
|
Certificate authority
|
17,448
|
581
|
C
|
High
|
64
|
Post-quantum cryptography
|
17,417
|
580
|
C
|
High
|
65
|
Vault 7
|
17,277
|
575
|
C
|
Mid
|
66
|
Merkle tree
|
17,034
|
567
|
C
|
Mid
|
67
|
Zero-knowledge proof
|
16,590
|
553
|
C
|
Top
|
68
|
One-time pad
|
15,926
|
530
|
C
|
Top
|
69
|
Rainbow table
|
15,624
|
520
|
C
|
High
|
70
|
Kerberos (protocol)
|
15,376
|
512
|
C
|
High
|
71
|
Elliptic Curve Digital Signature Algorithm
|
14,961
|
498
|
C
|
High
|
72
|
Public key certificate
|
14,765
|
492
|
C
|
Top
|
73
|
Digital rights management
|
14,765
|
492
|
B
|
High
|
74
|
Phone hacking
|
14,643
|
488
|
Start
|
Mid
|
75
|
Proof of stake
|
14,611
|
487
|
Start
|
Low
|
76
|
One-time password
|
14,182
|
472
|
C
|
Mid
|
77
|
Beale ciphers
|
14,166
|
472
|
B
|
Low
|
78
|
I2P
|
13,961
|
465
|
B
|
Low
|
79
|
OpenVPN
|
13,663
|
455
|
C
|
Mid
|
80
|
Public key infrastructure
|
13,662
|
455
|
C
|
Top
|
81
|
Colossus computer
|
13,361
|
445
|
B
|
Mid
|
82
|
Salt (cryptography)
|
13,251
|
441
|
Start
|
High
|
83
|
Bcrypt
|
13,227
|
440
|
C
|
Mid
|
84
|
Cryptanalysis of the Enigma
|
12,859
|
428
|
C
|
Mid
|
85
|
Illegal number
|
12,579
|
419
|
C
|
Low
|
86
|
Code talker
|
12,531
|
417
|
B
|
Low
|
87
|
OpenSSL
|
12,444
|
414
|
B
|
High
|
88
|
Tails (operating system)
|
12,384
|
412
|
Start
|
Low
|
89
|
Pay television
|
12,345
|
411
|
Start
|
Unknown
|
90
|
Secure Hash Algorithms
|
12,092
|
403
|
Start
|
High
|
91
|
SSH File Transfer Protocol
|
12,071
|
402
|
Start
|
Unknown
|
92
|
Brute-force attack
|
11,988
|
399
|
C
|
High
|
93
|
Cryptographic nonce
|
11,958
|
398
|
Start
|
High
|
94
|
Authentication
|
11,607
|
386
|
C
|
High
|
95
|
Integer factorization
|
11,458
|
381
|
B
|
Mid
|
96
|
.onion
|
11,420
|
380
|
C
|
Low
|
97
|
Bombe
|
11,411
|
380
|
B
|
Mid
|
98
|
Galois/Counter Mode
|
11,269
|
375
|
C
|
Mid
|
99
|
Homomorphic encryption
|
11,263
|
375
|
C
|
High
|
100
|
Data Encryption Standard
|
11,252
|
375
|
C
|
Top
|
101
|
Shiba Inu (cryptocurrency)
|
11,244
|
374
|
Start
|
Low
|
102
|
SHA-3
|
10,998
|
366
|
Start
|
Mid
|
103
|
Substitution cipher
|
10,880
|
362
|
Unknown
|
Unknown
|
104
|
Alice and Bob
|
10,385
|
346
|
Start
|
High
|
105
|
Symmetric-key algorithm
|
10,318
|
343
|
Start
|
Top
|
106
|
Decentralized finance
|
10,028
|
334
|
Start
|
Low
|
107
|
Units of information
|
10,021
|
334
|
C
|
Unknown
|
108
|
Comparison of BitTorrent clients
|
9,908
|
330
|
List
|
Low
|
109
|
Theoretical computer science
|
9,788
|
326
|
B
|
Low
|
110
|
Nyctography
|
9,684
|
322
|
Unknown
|
Unknown
|
111
|
The Tor Project
|
9,675
|
322
|
C
|
Mid
|
112
|
Babington Plot
|
9,435
|
314
|
C
|
Low
|
113
|
ChaCha20-Poly1305
|
9,412
|
313
|
C
|
Low
|
114
|
Mullvad
|
9,399
|
313
|
Start
|
Low
|
115
|
Cypherpunk
|
9,326
|
310
|
C
|
Mid
|
116
|
Apple–FBI encryption dispute
|
9,248
|
308
|
C
|
Low
|
117
|
Ultra (cryptography)
|
9,178
|
305
|
C
|
High
|
118
|
Forward secrecy
|
9,171
|
305
|
C
|
High
|
119
|
Grover's algorithm
|
9,147
|
304
|
C
|
Mid
|
120
|
Cryptonomicon
|
9,054
|
301
|
C
|
Low
|
121
|
Side-channel attack
|
9,031
|
301
|
C
|
High
|
122
|
InterPlanetary File System
|
8,949
|
298
|
C
|
Low
|
123
|
PBKDF2
|
8,863
|
295
|
C
|
Low
|
124
|
Link 16
|
8,719
|
290
|
Start
|
Low
|
125
|
Fort Meade
|
8,646
|
288
|
C
|
Low
|
126
|
Authenticated encryption
|
8,636
|
287
|
C
|
Mid
|
127
|
Bitcoin Cash
|
8,629
|
287
|
Start
|
Low
|
128
|
Shamir's secret sharing
|
8,544
|
284
|
C
|
High
|
129
|
Playfair cipher
|
8,315
|
277
|
Unknown
|
Unknown
|
130
|
VeraCrypt
|
8,313
|
277
|
C
|
Mid
|
131
|
EdDSA
|
8,272
|
275
|
C
|
High
|
132
|
Curve25519
|
8,071
|
269
|
C
|
High
|
133
|
Birthday attack
|
8,007
|
266
|
C
|
High
|
134
|
Differential privacy
|
7,940
|
264
|
C
|
Mid
|
135
|
3-D Secure
|
7,919
|
263
|
Start
|
Low
|
136
|
Bitwarden
|
7,914
|
263
|
C
|
Low
|
137
|
Cryptanalysis
|
7,892
|
263
|
C
|
High
|
138
|
Password cracking
|
7,861
|
262
|
C
|
Mid
|
139
|
Message authentication code
|
7,856
|
261
|
C
|
Top
|
140
|
Litecoin
|
7,834
|
261
|
Start
|
Low
|
141
|
Matrix (protocol)
|
7,823
|
260
|
Start
|
Unknown
|
142
|
Signal Protocol
|
7,696
|
256
|
C
|
High
|
143
|
Quantum key distribution
|
7,402
|
246
|
B
|
Mid
|
144
|
Certificate signing request
|
7,205
|
240
|
C
|
Low
|
145
|
Argon2
|
7,202
|
240
|
C
|
Mid
|
146
|
IMSI-catcher
|
7,180
|
239
|
Start
|
Mid
|
147
|
Elliptic-curve Diffie–Hellman
|
6,945
|
231
|
Start
|
Mid
|
148
|
Fork (blockchain)
|
6,748
|
224
|
Start
|
Mid
|
149
|
Hyphanet
|
6,703
|
223
|
B
|
Mid
|
150
|
Cryptographically secure pseudorandom number generator
|
6,580
|
219
|
C
|
Top
|
151
|
Password manager
|
6,571
|
219
|
C
|
Low
|
152
|
Frequency analysis
|
6,566
|
218
|
C
|
High
|
153
|
KeePass
|
6,488
|
216
|
C
|
Low
|
154
|
Discrete logarithm
|
6,479
|
215
|
C
|
Mid
|
155
|
Triple DES
|
6,397
|
213
|
Start
|
Unknown
|
156
|
PKCS 12
|
6,393
|
213
|
Start
|
Unknown
|
157
|
Bitconnect
|
6,317
|
210
|
C
|
Low
|
158
|
Salsa20
|
6,267
|
208
|
C
|
Top
|
159
|
Password strength
|
6,239
|
207
|
C
|
High
|
160
|
Quantum cryptography
|
6,220
|
207
|
C
|
High
|
161
|
Richard Teng
|
6,178
|
205
|
Start
|
Low
|
162
|
RC4
|
6,120
|
204
|
B
|
Top
|
163
|
Digest access authentication
|
6,088
|
202
|
B
|
Low
|
164
|
Confidentiality
|
6,070
|
202
|
C
|
Low
|
165
|
Utah Data Center
|
6,064
|
202
|
C
|
Mid
|
166
|
Self-signed certificate
|
6,037
|
201
|
Start
|
Unknown
|
167
|
GNU Privacy Guard
|
5,996
|
199
|
C
|
Unknown
|
168
|
Supply chain attack
|
5,991
|
199
|
C
|
Low
|
169
|
Key derivation function
|
5,838
|
194
|
C
|
Low
|
170
|
FIPS 140-2
|
5,727
|
190
|
C
|
Mid
|
171
|
Block cipher
|
5,722
|
190
|
C
|
Top
|
172
|
Kerckhoffs's principle
|
5,673
|
189
|
Start
|
Mid
|
173
|
Citizenfour
|
5,672
|
189
|
C
|
Low
|
174
|
Qubes OS
|
5,630
|
187
|
C
|
Mid
|
175
|
Digital Signature Algorithm
|
5,581
|
186
|
C
|
Top
|
176
|
Tap code
|
5,559
|
185
|
Start
|
Low
|
177
|
Polkadot (blockchain platform)
|
5,528
|
184
|
Start
|
Low
|
178
|
Cipher suite
|
5,486
|
182
|
C
|
Top
|
179
|
Transposition cipher
|
5,485
|
182
|
Unknown
|
Unknown
|
180
|
Crypto AG
|
5,464
|
182
|
C
|
High
|
181
|
Lorenz cipher
|
5,449
|
181
|
C
|
Top
|
182
|
Mutual authentication
|
5,406
|
180
|
Stub
|
Low
|
183
|
OpenSSH
|
5,363
|
178
|
C
|
High
|
184
|
11B-X-1371
|
5,349
|
178
|
GA
|
Low
|
185
|
The Doughnut
|
5,334
|
177
|
GA
|
High
|
186
|
Automatic Certificate Management Environment
|
5,327
|
177
|
Start
|
Low
|
187
|
Cryptogram
|
5,268
|
175
|
C
|
Mid
|
188
|
Web of trust
|
5,253
|
175
|
C
|
High
|
189
|
Reception and criticism of WhatsApp security and privacy features
|
5,251
|
175
|
C
|
Low
|
190
|
Stream cipher
|
5,234
|
174
|
Start
|
Top
|
191
|
Root certificate
|
5,139
|
171
|
Start
|
Low
|
192
|
Blowfish (cipher)
|
5,125
|
170
|
B
|
High
|
193
|
Bacon's cipher
|
5,118
|
170
|
Start
|
Low
|
194
|
Threema
|
5,083
|
169
|
C
|
Unknown
|
195
|
Conel Hugh O'Donel Alexander
|
5,001
|
166
|
Start
|
Low
|
196
|
List of bitcoin forks
|
4,966
|
165
|
List
|
Low
|
197
|
Rijndael S-box
|
4,930
|
164
|
Start
|
Low
|
198
|
Wired Equivalent Privacy
|
4,905
|
163
|
C
|
Mid
|
199
|
Lavarand
|
4,857
|
161
|
Start
|
Mid
|
200
|
RSA Security
|
4,840
|
161
|
C
|
Unknown
|
201
|
DNS-based Authentication of Named Entities
|
4,839
|
161
|
C
|
Mid
|
202
|
Bitcoin Core
|
4,839
|
161
|
Start
|
Low
|
203
|
Electronic signature
|
4,797
|
159
|
C
|
Low
|
204
|
Certificate revocation list
|
4,779
|
159
|
C
|
Low
|
205
|
Blockchain game
|
4,765
|
158
|
Start
|
Low
|
206
|
Deniable encryption
|
4,739
|
157
|
Start
|
High
|
207
|
BLAKE (hash function)
|
4,692
|
156
|
C
|
Mid
|
208
|
Hill cipher
|
4,669
|
155
|
Unknown
|
Unknown
|
209
|
Adam Back
|
4,667
|
155
|
Start
|
Low
|
210
|
Session (software)
|
4,664
|
155
|
Start
|
Low
|
211
|
KeePassXC
|
4,651
|
155
|
Start
|
Low
|
212
|
Lattice-based cryptography
|
4,650
|
155
|
Start
|
Low
|
213
|
Boolean function
|
4,632
|
154
|
Start
|
Mid
|
214
|
Key (cryptography)
|
4,616
|
153
|
Start
|
Unknown
|
215
|
Datagram Transport Layer Security
|
4,577
|
152
|
C
|
Mid
|
216
|
XOR cipher
|
4,539
|
151
|
Stub
|
Mid
|
217
|
Crypto-anarchy
|
4,442
|
148
|
Start
|
High
|
218
|
Initialization vector
|
4,425
|
147
|
C
|
High
|
219
|
Affine cipher
|
4,391
|
146
|
C
|
Low
|
220
|
Secure multi-party computation
|
4,385
|
146
|
Start
|
High
|
221
|
Rail fence cipher
|
4,308
|
143
|
Start
|
Low
|
222
|
Dual EC DRBG
|
4,306
|
143
|
C
|
High
|
223
|
Cold boot attack
|
4,289
|
142
|
C
|
Low
|
224
|
Bruce Schneier
|
4,269
|
142
|
Start
|
High
|
225
|
SegWit
|
4,258
|
141
|
Start
|
Low
|
226
|
Adi Shamir
|
4,234
|
141
|
Start
|
Unknown
|
227
|
Padding (cryptography)
|
4,188
|
139
|
Start
|
Unknown
|
228
|
ElGamal encryption
|
4,167
|
138
|
Start
|
Top
|
229
|
Hashcash
|
4,164
|
138
|
Start
|
Unknown
|
230
|
Privacy-Enhanced Mail
|
4,159
|
138
|
Start
|
Low
|
231
|
Atbash
|
4,154
|
138
|
Stub
|
Low
|
232
|
Ciphertext
|
4,129
|
137
|
Start
|
High
|
233
|
Cryptocurrency tumbler
|
4,126
|
137
|
Start
|
Unknown
|
234
|
RSA SecurID
|
4,118
|
137
|
Unknown
|
Unknown
|
235
|
AES instruction set
|
4,106
|
136
|
C
|
Low
|
236
|
Replay attack
|
4,041
|
134
|
C
|
Top
|
237
|
History of cryptography
|
4,020
|
134
|
Start
|
High
|
238
|
David Chaum
|
4,014
|
133
|
C
|
Low
|
239
|
Padding oracle attack
|
4,002
|
133
|
Start
|
Low
|
240
|
Marian Rejewski
|
3,989
|
132
|
FA
|
Mid
|
241
|
Feistel cipher
|
3,955
|
131
|
Start
|
Unknown
|
242
|
Zcash
|
3,895
|
129
|
Start
|
Low
|
243
|
Polybius square
|
3,870
|
129
|
Start
|
Mid
|
244
|
Filecoin
|
3,854
|
128
|
Start
|
Low
|
245
|
Communications Security Establishment
|
3,852
|
128
|
C
|
Mid
|
246
|
PKCS
|
3,835
|
127
|
List
|
High
|
247
|
Diplomatic bag
|
3,834
|
127
|
Start
|
Low
|
248
|
Daniel J. Bernstein
|
3,812
|
127
|
C
|
Mid
|
249
|
Alberti cipher
|
3,780
|
126
|
C
|
Low
|
250
|
TrueCrypt
|
3,733
|
124
|
C
|
Mid
|
251
|
Schnorr signature
|
3,727
|
124
|
C
|
High
|
252
|
Ricky McCormick's encrypted notes
|
3,698
|
123
|
B
|
Low
|
253
|
Random number book
|
3,681
|
122
|
Stub
|
Low
|
254
|
Challenge–response authentication
|
3,668
|
122
|
Start
|
Mid
|
255
|
Directory service
|
3,650
|
121
|
Start
|
Mid
|
256
|
One-way function
|
3,644
|
121
|
Start
|
Top
|
257
|
SipHash
|
3,577
|
119
|
Start
|
Low
|
258
|
Commitment scheme
|
3,540
|
118
|
C
|
High
|
259
|
Harvest now, decrypt later
|
3,508
|
116
|
Start
|
Low
|
260
|
PKCS 7
|
3,442
|
114
|
Start
|
Low
|
261
|
Non-repudiation
|
3,436
|
114
|
Start
|
Mid
|
262
|
Trusted timestamping
|
3,433
|
114
|
Start
|
Unknown
|
263
|
Bitcoin scalability problem
|
3,421
|
114
|
C
|
Low
|
264
|
Len Sassaman
|
3,408
|
113
|
Start
|
Unknown
|
265
|
Polyalphabetic cipher
|
3,382
|
112
|
Start
|
Unknown
|
266
|
List of ciphertexts
|
3,337
|
111
|
List
|
Low
|
267
|
Special Collection Service
|
3,331
|
111
|
C
|
Low
|
268
|
Length extension attack
|
3,301
|
110
|
Start
|
Unknown
|
269
|
Timing attack
|
3,241
|
108
|
C
|
High
|
270
|
Known-plaintext attack
|
3,212
|
107
|
Start
|
High
|
271
|
PKCS 11
|
3,211
|
107
|
Unknown
|
Unknown
|
272
|
Key size
|
3,196
|
106
|
C
|
High
|
273
|
Whonix
|
3,177
|
105
|
Start
|
Mid
|
274
|
Algorand
|
3,119
|
103
|
B
|
Low
|
275
|
Book cipher
|
3,110
|
103
|
C
|
Low
|
276
|
Australian Signals Directorate
|
3,075
|
102
|
C
|
Low
|
277
|
Encryption software
|
3,074
|
102
|
Start
|
Top
|
278
|
Bomba (cryptography)
|
3,057
|
101
|
Start
|
Low
|
279
|
Disk encryption
|
3,041
|
101
|
C
|
High
|
280
|
Digital watermarking
|
3,032
|
101
|
B
|
Mid
|
281
|
NIST Post-Quantum Cryptography Standardization
|
3,004
|
100
|
C
|
Mid
|
282
|
K-anonymity
|
2,990
|
99
|
Start
|
Mid
|
283
|
Quantum network
|
2,989
|
99
|
C
|
Low
|
284
|
PKCS 1
|
2,968
|
98
|
C
|
Mid
|
285
|
Proof of authority
|
2,946
|
98
|
Start
|
Low
|
286
|
Type B Cipher Machine
|
2,942
|
98
|
Start
|
Low
|
287
|
Criticism of Dropbox
|
2,890
|
96
|
B
|
Low
|
288
|
Keygen
|
2,841
|
94
|
C
|
Low
|
289
|
Dictionary attack
|
2,834
|
94
|
C
|
Unknown
|
290
|
Merkle–Damgård construction
|
2,833
|
94
|
C
|
Unknown
|
291
|
Gordon Welchman
|
2,800
|
93
|
C
|
Low
|
292
|
AES key schedule
|
2,793
|
93
|
Start
|
Low
|
293
|
Elizebeth Smith Friedman
|
2,783
|
92
|
C
|
Mid
|
294
|
Whitfield Diffie
|
2,779
|
92
|
B
|
High
|
295
|
Disk encryption theory
|
2,779
|
92
|
C
|
Unknown
|
296
|
S-box
|
2,770
|
92
|
Start
|
Top
|
297
|
Authenticator
|
2,754
|
91
|
Start
|
Unknown
|
298
|
Code signing
|
2,732
|
91
|
C
|
Low
|
299
|
RSA Factoring Challenge
|
2,731
|
91
|
Start
|
Low
|
300
|
Plaintext
|
2,709
|
90
|
Start
|
High
|
301
|
Pre-shared key
|
2,704
|
90
|
Start
|
Mid
|
302
|
Entrust
|
2,681
|
89
|
Start
|
Low
|
303
|
Collision attack
|
2,666
|
88
|
Start
|
High
|
304
|
Digital renminbi
|
2,641
|
88
|
B
|
High
|
305
|
Cryptographic protocol
|
2,631
|
87
|
Start
|
High
|
306
|
Certificate Transparency
|
2,624
|
87
|
C
|
High
|
307
|
BTCC (company)
|
2,623
|
87
|
Start
|
Low
|
308
|
PKCS 8
|
2,614
|
87
|
Stub
|
Unknown
|
309
|
Key exchange
|
2,600
|
86
|
Start
|
Unknown
|
310
|
Comparison of SSH clients
|
2,594
|
86
|
List
|
Low
|
311
|
Elliptic curve point multiplication
|
2,594
|
86
|
C
|
Mid
|
312
|
Scrambler
|
2,584
|
86
|
C
|
Unknown
|
313
|
Operation Rubicon
|
2,547
|
84
|
C
|
Low
|
314
|
Bitcoin Gold
|
2,544
|
84
|
Start
|
Low
|
315
|
Avalanche effect
|
2,541
|
84
|
Start
|
High
|
316
|
BB84
|
2,516
|
83
|
Start
|
Low
|
317
|
Classical cipher
|
2,464
|
82
|
Start
|
Top
|
318
|
Double Ratchet Algorithm
|
2,442
|
81
|
Start
|
Low
|
319
|
Proof of space
|
2,431
|
81
|
Start
|
Low
|
320
|
Dilly Knox
|
2,427
|
80
|
B
|
Unknown
|
321
|
FIPS 140
|
2,424
|
80
|
Start
|
Mid
|
322
|
Key disclosure law
|
2,406
|
80
|
C
|
Low
|
323
|
William Binney (intelligence official)
|
2,406
|
80
|
Start
|
Mid
|
324
|
Preimage attack
|
2,396
|
79
|
Stub
|
Unknown
|
325
|
Twofish
|
2,377
|
79
|
Start
|
High
|
326
|
Optimal asymmetric encryption padding
|
2,370
|
79
|
Start
|
High
|
327
|
HKDF
|
2,360
|
78
|
Start
|
Unknown
|
328
|
Quahl
|
2,354
|
78
|
C
|
Low
|
329
|
Crypt (C)
|
2,327
|
77
|
C
|
High
|
330
|
Tox (protocol)
|
2,319
|
77
|
C
|
Low
|
331
|
Data at rest
|
2,318
|
77
|
C
|
Mid
|
332
|
Chosen-plaintext attack
|
2,313
|
77
|
Stub
|
Unknown
|
333
|
Export of cryptography from the United States
|
2,312
|
77
|
C
|
Unknown
|
334
|
Communications security
|
2,298
|
76
|
Start
|
Mid
|
335
|
Autokey cipher
|
2,288
|
76
|
C
|
Mid
|
336
|
Off-the-record messaging
|
2,287
|
76
|
Start
|
Unknown
|
337
|
Data anonymization
|
2,276
|
75
|
Start
|
Mid
|
338
|
Hash chain
|
2,255
|
75
|
Start
|
Unknown
|
339
|
Ciphertext indistinguishability
|
2,253
|
75
|
C
|
High
|
340
|
Peercoin
|
2,253
|
75
|
Stub
|
Low
|
341
|
Phil Zimmermann
|
2,250
|
75
|
Start
|
Mid
|
342
|
Privacy and blockchain
|
2,249
|
74
|
C
|
Low
|
343
|
Martin Hellman
|
2,230
|
74
|
Start
|
High
|
344
|
Comparison of cryptography libraries
|
2,223
|
74
|
List
|
Unknown
|
345
|
NEO (cryptocurrency)
|
2,217
|
73
|
Start
|
Low
|
346
|
Kasiski examination
|
2,214
|
73
|
Unknown
|
Unknown
|
347
|
IEEE 802.11i-2004
|
2,208
|
73
|
C
|
Mid
|
348
|
Key encapsulation mechanism
|
2,202
|
73
|
Start
|
High
|
349
|
Clipper chip
|
2,201
|
73
|
C
|
High
|
350
|
Magic (cryptography)
|
2,199
|
73
|
Start
|
Unknown
|
351
|
FIPS 140-3
|
2,183
|
72
|
C
|
Low
|
352
|
HTTP Public Key Pinning
|
2,182
|
72
|
C
|
Mid
|
353
|
DNS Certification Authority Authorization
|
2,182
|
72
|
GA
|
Low
|
354
|
Ralph Merkle
|
2,161
|
72
|
C
|
High
|
355
|
Trusted Computing
|
2,142
|
71
|
C
|
Mid
|
356
|
Comparison of disk encryption software
|
2,127
|
70
|
List
|
High
|
357
|
William F. Friedman
|
2,123
|
70
|
C
|
Unknown
|
358
|
Bouncy Castle (cryptography)
|
2,088
|
69
|
Start
|
Unknown
|
359
|
Briar (software)
|
2,084
|
69
|
Start
|
Low
|
360
|
Alastair Denniston
|
2,072
|
69
|
Start
|
Unknown
|
361
|
Dm-crypt
|
2,055
|
68
|
Start
|
Low
|
362
|
Pepper (cryptography)
|
2,042
|
68
|
Start
|
Low
|
363
|
Nothing-up-my-sleeve number
|
2,039
|
67
|
C
|
Low
|
364
|
Baby-step giant-step
|
2,027
|
67
|
C
|
Unknown
|
365
|
Open Whisper Systems
|
2,021
|
67
|
B
|
Unknown
|
366
|
Coinye
|
2,008
|
66
|
Start
|
Low
|
367
|
Encrypting File System
|
2,007
|
66
|
B
|
Unknown
|
368
|
Non-interactive zero-knowledge proof
|
1,994
|
66
|
Start
|
Low
|
369
|
Opportunistic TLS
|
1,975
|
65
|
Start
|
Mid
|
370
|
ShapeShift
|
1,971
|
65
|
Start
|
Low
|
371
|
Key management
|
1,951
|
65
|
Unknown
|
Unknown
|
372
|
Mumble (software)
|
1,951
|
65
|
C
|
Unknown
|
373
|
Generic Security Services Application Program Interface
|
1,941
|
64
|
Start
|
Low
|
374
|
Physical unclonable function
|
1,937
|
64
|
Start
|
Unknown
|
375
|
CCM mode
|
1,933
|
64
|
Start
|
High
|
376
|
Secret sharing
|
1,902
|
63
|
C
|
High
|
377
|
Confusion and diffusion
|
1,886
|
62
|
Start
|
Mid
|
378
|
Trapdoor function
|
1,883
|
62
|
Start
|
High
|
379
|
I. J. Good
|
1,875
|
62
|
C
|
Low
|
380
|
Beaufort cipher
|
1,865
|
62
|
Start
|
Low
|
381
|
Bullrun (decryption program)
|
1,847
|
61
|
B
|
Low
|
382
|
Copiale cipher
|
1,838
|
61
|
Start
|
Low
|
383
|
Clock drift
|
1,827
|
60
|
C
|
Low
|
384
|
WebTorrent
|
1,824
|
60
|
Start
|
Unknown
|
385
|
Leo Marks
|
1,820
|
60
|
B
|
Unknown
|
386
|
DeCSS
|
1,811
|
60
|
C
|
Mid
|
387
|
Poly1305
|
1,811
|
60
|
Start
|
Top
|
388
|
Charlie Lee (computer scientist)
|
1,799
|
59
|
Start
|
Low
|
389
|
Cryptographic primitive
|
1,782
|
59
|
Start
|
Top
|
390
|
ADFGVX cipher
|
1,759
|
58
|
Unknown
|
Unknown
|
391
|
Lenstra elliptic-curve factorization
|
1,751
|
58
|
C
|
Low
|
392
|
Primecoin
|
1,742
|
58
|
Start
|
Unknown
|
393
|
Orbot
|
1,735
|
57
|
Stub
|
Low
|
394
|
FileVault
|
1,728
|
57
|
C
|
Mid
|
395
|
Comparison of TLS implementations
|
1,727
|
57
|
List
|
High
|
396
|
Jami (software)
|
1,707
|
56
|
Start
|
Unknown
|
397
|
Security level
|
1,705
|
56
|
Stub
|
Mid
|
398
|
Anonymous P2P
|
1,690
|
56
|
C
|
Low
|
399
|
Enigma rotor details
|
1,677
|
55
|
Start
|
Mid
|
400
|
Government Communications Security Bureau
|
1,655
|
55
|
B
|
Low
|
401
|
Ricochet (software)
|
1,645
|
54
|
Start
|
Low
|
402
|
Coppersmith's attack
|
1,642
|
54
|
B
|
High
|
403
|
MD4
|
1,640
|
54
|
Start
|
Low
|
404
|
Crypto Wars
|
1,634
|
54
|
Start
|
High
|
405
|
Paillier cryptosystem
|
1,632
|
54
|
Start
|
High
|
406
|
Black Chamber
|
1,624
|
54
|
Unknown
|
Unknown
|
407
|
Differential cryptanalysis
|
1,621
|
54
|
B
|
High
|
408
|
ROCA vulnerability
|
1,620
|
54
|
Start
|
Mid
|
409
|
Meet-in-the-middle attack
|
1,611
|
53
|
C
|
High
|
410
|
Key stretching
|
1,607
|
53
|
Start
|
Unknown
|
411
|
Four-square cipher
|
1,602
|
53
|
C
|
Unknown
|
412
|
UltraViolet (website)
|
1,598
|
53
|
C
|
Low
|
413
|
Tabula recta
|
1,592
|
53
|
Unknown
|
Unknown
|
414
|
Null cipher
|
1,585
|
52
|
Stub
|
Low
|
415
|
Red/black concept
|
1,585
|
52
|
Stub
|
Unknown
|
416
|
Integrated Encryption Scheme
|
1,584
|
52
|
Start
|
Low
|
417
|
SecureDrop
|
1,576
|
52
|
Start
|
Mid
|
418
|
Roger Dingledine
|
1,575
|
52
|
Start
|
Unknown
|
419
|
Advanced Access Content System
|
1,572
|
52
|
C
|
Mid
|
420
|
SIGSALY
|
1,571
|
52
|
C
|
Low
|
421
|
Tiny Encryption Algorithm
|
1,560
|
52
|
Unknown
|
Unknown
|
422
|
Cryptanalysis of the Lorenz cipher
|
1,557
|
51
|
C
|
High
|
423
|
W. T. Tutte
|
1,549
|
51
|
C
|
Mid
|
424
|
NSAKEY
|
1,547
|
51
|
C
|
High
|
425
|
Strong cryptography
|
1,546
|
51
|
Unknown
|
Unknown
|
426
|
Arthur Scherbius
|
1,537
|
51
|
Start
|
Mid
|
427
|
Code (cryptography)
|
1,536
|
51
|
Start
|
Top
|
428
|
CBC-MAC
|
1,532
|
51
|
C
|
High
|
429
|
Open Technology Fund
|
1,512
|
50
|
Start
|
Unknown
|
430
|
Tor2web
|
1,511
|
50
|
Start
|
Low
|
431
|
FreeOTP
|
1,501
|
50
|
Start
|
Low
|
432
|
One-key MAC
|
1,500
|
50
|
Start
|
Low
|
433
|
ZeroNet
|
1,487
|
49
|
Start
|
Low
|
434
|
Secret decoder ring
|
1,482
|
49
|
Start
|
Low
|
435
|
Dorabella Cipher
|
1,482
|
49
|
Unknown
|
Unknown
|
436
|
A5/1
|
1,476
|
49
|
B
|
High
|
437
|
Comparison of cryptographic hash functions
|
1,476
|
49
|
List
|
Low
|
438
|
SYN cookies
|
1,473
|
49
|
Start
|
Unknown
|
439
|
Public key fingerprint
|
1,449
|
48
|
Start
|
Mid
|
440
|
Pseudorandom function family
|
1,435
|
47
|
Start
|
Low
|
441
|
Codebook
|
1,423
|
47
|
Stub
|
Unknown
|
442
|
BLS digital signature
|
1,420
|
47
|
Start
|
Mid
|
443
|
Information-theoretic security
|
1,413
|
47
|
Start
|
Top
|
444
|
Opportunistic Wireless Encryption
|
1,413
|
47
|
Stub
|
Low
|
445
|
Pollard's kangaroo algorithm
|
1,412
|
47
|
C
|
Low
|
446
|
DES supplementary material
|
1,411
|
47
|
C
|
Low
|
447
|
Simultaneous Authentication of Equals
|
1,404
|
46
|
Start
|
High
|
448
|
National Cryptologic Museum
|
1,399
|
46
|
C
|
Mid
|
449
|
Challenge-Handshake Authentication Protocol
|
1,397
|
46
|
Start
|
Low
|
450
|
Rotor machine
|
1,395
|
46
|
Unknown
|
Unknown
|
451
|
Wiener's attack
|
1,393
|
46
|
B
|
High
|
452
|
Format-preserving encryption
|
1,392
|
46
|
Start
|
High
|
453
|
GNUnet
|
1,388
|
46
|
B
|
Low
|
454
|
Advanced Encryption Standard process
|
1,386
|
46
|
C
|
Mid
|
455
|
Rijndael MixColumns
|
1,383
|
46
|
Start
|
Low
|
456
|
Always-on DRM
|
1,383
|
46
|
Start
|
Low
|
457
|
LibreSSL
|
1,383
|
46
|
Start
|
High
|
458
|
SIGABA
|
1,375
|
45
|
C
|
High
|
459
|
Blind signature
|
1,373
|
45
|
C
|
Mid
|
460
|
List of cryptographers
|
1,362
|
45
|
List
|
Low
|
461
|
NTRU
|
1,361
|
45
|
C
|
Low
|
462
|
RIPEMD
|
1,351
|
45
|
C
|
Unknown
|
463
|
Blum Blum Shub
|
1,350
|
45
|
Start
|
High
|
464
|
CableCARD
|
1,349
|
44
|
B
|
Unknown
|
465
|
Key server (cryptographic)
|
1,345
|
44
|
Start
|
Mid
|
466
|
Content Scramble System
|
1,344
|
44
|
Start
|
Mid
|
467
|
Wildcard certificate
|
1,340
|
44
|
Redirect
|
NA
|
468
|
Word square
|
1,339
|
44
|
C
|
Low
|
469
|
AES implementations
|
1,331
|
44
|
List
|
Low
|
470
|
Steganographia
|
1,331
|
44
|
Start
|
Low
|
471
|
Two-square cipher
|
1,329
|
44
|
Unknown
|
Unknown
|
472
|
Temporal Key Integrity Protocol
|
1,328
|
44
|
C
|
Low
|
473
|
David Wheeler (computer scientist)
|
1,323
|
44
|
Start
|
Low
|
474
|
Downgrade attack
|
1,320
|
44
|
Start
|
Mid
|
475
|
Electronic Signatures in Global and National Commerce Act
|
1,319
|
43
|
Stub
|
Unknown
|
476
|
Secure cryptoprocessor
|
1,311
|
43
|
C
|
Mid
|
477
|
Banburismus
|
1,305
|
43
|
C
|
Low
|
478
|
McEliece cryptosystem
|
1,271
|
42
|
C
|
High
|
479
|
Random oracle
|
1,266
|
42
|
Start
|
Low
|
480
|
Hybrid cryptosystem
|
1,260
|
42
|
Start
|
High
|
481
|
Shugborough inscription
|
1,259
|
41
|
Start
|
Low
|
482
|
Serpent (cipher)
|
1,258
|
41
|
C
|
Low
|
483
|
Berlekamp–Massey algorithm
|
1,255
|
41
|
Start
|
Unknown
|
484
|
Collision resistance
|
1,247
|
41
|
Start
|
High
|
485
|
Keybase
|
1,243
|
41
|
Start
|
Low
|
486
|
Sponge function
|
1,237
|
41
|
Unknown
|
Unknown
|
487
|
Proton Drive
|
1,235
|
41
|
Start
|
Low
|
488
|
Karsten Nohl
|
1,234
|
41
|
Start
|
Unknown
|
489
|
Max Newman
|
1,232
|
41
|
B
|
Low
|
490
|
Key-agreement protocol
|
1,225
|
40
|
Start
|
Top
|
491
|
Great Cipher
|
1,223
|
40
|
Start
|
Mid
|
492
|
Fuzzy hashing
|
1,221
|
40
|
C
|
Low
|
493
|
Ross J. Anderson
|
1,217
|
40
|
C
|
Mid
|
494
|
Visual cryptography
|
1,216
|
40
|
Unknown
|
Unknown
|
495
|
Power analysis
|
1,213
|
40
|
Unknown
|
Unknown
|
496
|
Nihilist cipher
|
1,211
|
40
|
Unknown
|
Unknown
|
497
|
Station HYPO
|
1,207
|
40
|
Start
|
Low
|
498
|
MD6
|
1,205
|
40
|
Start
|
High
|
499
|
Cryptovirology
|
1,199
|
39
|
Start
|
Mid
|
500
|
Cipher runes
|
1,198
|
39
|
Start
|
Unknown
|