Jump to content

Wikipedia:WikiProject Cryptography/Popular pages

From Wikipedia, the free encyclopedia

This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.

To report bugs, please write on the Community tech bot talk page on Meta.

List

[edit]

Period: 2024-08-01 to 2024-08-31

Total views: 5,914,336

Updated: 00:01, 6 September 2024 (UTC)

Rank Page title Views Daily average Assessment Importance
1 WhatsApp 707,906 22,835 B High
2 Telegram (software) 564,388 18,206 B Mid
3 Alan Turing 158,500 5,112 GA Top
4 Bitcoin 147,997 4,774 B High
5 WikiLeaks 114,577 3,696 B Low
6 Cryptocurrency 110,226 3,555 C High
7 Voynich manuscript 109,855 3,543 B Low
8 Tor (network) 97,334 3,139 B Mid
9 The Imitation Game 86,793 2,799 C Mid
10 Signal (software) 72,022 2,323 C Mid
11 Transport Layer Security 65,787 2,122 B Top
12 Blockchain 61,977 1,999 B High
13 National Security Agency 59,962 1,934 C High
14 HTTPS 56,257 1,814 C High
15 Enigma machine 46,516 1,500 C High
16 Virtual private network 45,920 1,481 C Mid
17 RSA (cryptosystem) 42,134 1,359 C Top
18 HTTP Strict Transport Security 41,841 1,349 C Low
19 Changpeng Zhao 41,743 1,346 Start Low
20 Advanced Encryption Standard 38,917 1,255 B Top
21 Diffie–Hellman key exchange 38,273 1,234 C Top
22 Cryptography 37,125 1,197 C Top
23 Secure Shell 36,140 1,165 C High
24 Caesar cipher 35,650 1,150 FA High
25 SHA-2 35,328 1,139 C Top
26 History of bitcoin 34,260 1,105 C Low
27 Darknet market 31,237 1,007 B Mid
28 Public-key cryptography 30,753 992 C Top
29 Vigenère cipher 30,170 973 B Low
30 Dogecoin 29,055 937 C Low
31 Vitalik Buterin 26,512 855 C Low
32 Block cipher mode of operation 26,141 843 C Top
33 MD5 26,080 841 C Top
34 Man-in-the-middle attack 25,586 825 C Mid
35 Joan Clarke 25,343 817 C Mid
36 Alice and Bob 24,911 803 Start High
37 Keychain (software) 24,323 784 Start Unknown
38 Vault 7 24,080 776 C Mid
39 Steganography 23,963 773 B High
40 Zimmermann telegram 23,766 766 B High
41 GCHQ 23,669 763 B Low
42 Password 22,823 736 C Top
43 Information theory 22,686 731 B Top
44 Proton Mail 22,482 725 C Low
45 HMAC 22,458 724 C High
46 Claude Shannon 22,224 716 C Top
47 Digital signature 22,133 713 C Top
48 Active Directory 21,574 695 C Low
49 Cryptographic hash function 21,098 680 C Top
50 Pretty Good Privacy 21,018 678 B High
51 NordVPN 20,261 653 C Mid
52 Bletchley Park 19,088 615 B High
53 Sator Square 18,953 611 B Low
54 Trusted Platform Module 18,578 599 C Mid
55 Cipher 18,331 591 C Top
56 ROT13 18,253 588 C Mid
57 Knapsack problem 18,007 580 C Mid
58 Kryptos 17,789 573 C Low
59 SHA-1 17,758 572 C Top
60 Certificate authority 17,690 570 C High
61 Information security 17,440 562 B Top
62 Public key certificate 17,425 562 C Top
63 Wi-Fi Protected Access 17,219 555 C Mid
64 Encryption 17,065 550 C Top
65 Elliptic-curve cryptography 17,022 549 C High
66 Letter frequency 16,813 542 B Low
67 Merkle tree 16,521 532 C Mid
68 Post-quantum cryptography 16,434 530 C High
69 Zero-knowledge proof 15,839 510 C Top
70 Rainbow table 15,692 506 C High
71 One-time password 15,502 500 C Mid
72 Phone hacking 15,251 491 Start Mid
73 Kerberos (protocol) 15,054 485 C High
74 Digital rights management 15,037 485 B High
75 Utah Data Center 14,533 468 C Mid
76 Code talker 14,380 463 B Low
77 Charlie Lee (computer scientist) 14,189 457 Start Low
78 One-time pad 14,067 453 C Top
79 Beale ciphers 13,956 450 B Low
80 OpenVPN 13,774 444 C Mid
81 Public key infrastructure 13,322 429 C Top
82 Salt (cryptography) 13,077 421 Start High
83 Bcrypt 12,476 402 C Mid
84 Elliptic Curve Digital Signature Algorithm 12,297 396 C High
85 .onion 12,036 388 C Low
86 Tails (operating system) 12,032 388 Start Low
87 Cryptanalysis of the Enigma 11,804 380 C Mid
88 Apple–FBI encryption dispute 11,757 379 C Low
89 Homomorphic encryption 11,701 377 C High
90 SSH File Transfer Protocol 11,642 375 Start Unknown
91 Authentication 11,581 373 C High
92 OpenSSL 11,502 371 B High
93 Secure Hash Algorithms 11,161 360 Start High
94 Brute-force attack 11,151 359 C High
95 I2P 11,127 358 B Low
96 Galois/Counter Mode 10,982 354 C Mid
97 Bombe 10,954 353 B Mid
98 Shiba Inu (cryptocurrency) 10,758 347 Start Low
99 Comparison of BitTorrent clients 10,690 344 List Low
100 SHA-3 10,523 339 Start Mid
101 Cryptonomicon 10,448 337 C Low
102 Substitution cipher 10,392 335 Unknown Unknown
103 Integer factorization 10,370 334 B Mid
104 The Tor Project 10,060 324 C Mid
105 Ultra (cryptography) 10,045 324 C High
106 Link 16 9,887 318 Start Low
107 Mullvad 9,735 314 Start Low
108 Colossus computer 9,703 313 B Mid
109 InterPlanetary File System 9,636 310 C Low
110 Pay television 9,604 309 Start Unknown
111 Symmetric-key algorithm 9,402 303 Start Top
112 Forward secrecy 9,398 303 C High
113 Theoretical computer science 9,368 302 B Low
114 Data Encryption Standard 9,219 297 C Top
115 Fort Meade 9,079 292 C Low
116 Shamir's secret sharing 9,078 292 C High
117 Bitcoin Cash 8,996 290 Start Low
118 Cryptographic nonce 8,960 289 Start High
119 Cypherpunk 8,902 287 C Mid
120 Grover's algorithm 8,831 284 C Mid
121 PBKDF2 8,635 278 C Low
122 Differential privacy 8,620 278 C Mid
123 Password cracking 8,419 271 C Mid
124 VeraCrypt 8,357 269 C Mid
125 Signal Protocol 8,262 266 C High
126 Units of information 8,183 263 C Unknown
127 EdDSA 8,170 263 C High
128 Authenticated encryption 8,115 261 C Mid
129 ChaCha20-Poly1305 7,976 257 C Low
130 Bitwarden 7,945 256 C Low
131 3-D Secure 7,936 256 Start Low
132 Cryptanalysis 7,848 253 C High
133 Curve25519 7,772 250 C High
134 Hyphanet 7,766 250 B Mid
135 Message authentication code 7,766 250 C Top
136 Proof of stake 7,712 248 Start Low
137 Decentralized finance 7,678 247 Start Low
138 Babington Plot 7,663 247 C Low
139 Birthday attack 7,481 241 C High
140 Matrix (protocol) 7,425 239 Start Unknown
141 Cryptogram 7,402 238 C Mid
142 Certificate signing request 7,107 229 C Low
143 Side-channel attack 7,076 228 C High
144 Quantum key distribution 7,046 227 B Mid
145 Illegal number 6,985 225 C Low
146 Litecoin 6,905 222 Start Low
147 Password strength 6,890 222 C High
148 Cryptographically secure pseudorandom number generator 6,795 219 C Top
149 Password manager 6,793 219 C Low
150 Argon2 6,735 217 C Mid
151 Elliptic-curve Diffie–Hellman 6,598 212 Start Mid
152 KeePass 6,490 209 C Low
153 PKCS 12 6,429 207 Start Unknown
154 Playfair cipher 6,388 206 Unknown Unknown
155 Key derivation function 6,354 204 C Low
156 Confidentiality 6,324 204 C Low
157 Triple DES 6,215 200 Start Unknown
158 Digest access authentication 6,160 198 B Low
159 Self-signed certificate 6,138 198 Start Unknown
160 IMSI-catcher 6,067 195 Start Mid
161 Discrete logarithm 6,051 195 C Mid
162 Qubes OS 5,989 193 C Mid
163 FIPS 140-2 5,878 189 C Mid
164 GNU Privacy Guard 5,867 189 C Unknown
165 Bitconnect 5,841 188 C Low
166 RC4 5,756 185 B Top
167 Citizenfour 5,723 184 C Low
168 DNS-based Authentication of Named Entities 5,683 183 C Mid
169 Tap code 5,606 180 Start Low
170 Lorenz cipher 5,588 180 C Top
171 Richard Teng 5,584 180 Start Low
172 Quantum cryptography 5,536 178 C High
173 Cipher suite 5,510 177 C Top
174 Mutual authentication 5,456 176 Stub Low
175 Deniable encryption 5,427 175 Start High
176 OpenSSH 5,385 173 C High
177 Kerckhoffs's principle 5,373 173 Start Mid
178 RSA Security 5,340 172 C Unknown
179 Conel Hugh O'Donel Alexander 5,315 171 Start Low
180 Salsa20 5,295 170 C Top
181 Digital Signature Algorithm 5,236 168 C Top
182 Ricky McCormick's encrypted notes 5,195 167 B Low
183 KeePassXC 5,077 163 Start Low
184 Root certificate 5,070 163 Start Low
185 Dual EC DRBG 5,065 163 C High
186 Lavarand 5,063 163 Start Mid
187 Atbash 5,058 163 Stub Low
188 Session (software) 5,040 162 Start Low
189 Lattice-based cryptography 5,018 161 Start Low
190 Automatic Certificate Management Environment 4,964 160 Start Low
191 Blowfish (cipher) 4,962 160 B High
192 Datagram Transport Layer Security 4,947 159 Start Mid
193 Block cipher 4,930 159 C Top
194 BLAKE (hash function) 4,839 156 C Mid
195 Certificate revocation list 4,828 155 C Low
196 Polkadot (cryptocurrency) 4,814 155 Start Low
197 11B-X-1371 4,744 153 GA Low
198 Pepper (cryptography) 4,742 152 Start Low
199 Fork (blockchain) 4,608 148 Start Mid
200 Threema 4,580 147 C Unknown
201 Wired Equivalent Privacy 4,491 144 C Mid
202 Transposition cipher 4,485 144 Unknown Unknown
203 Bitcoin Core 4,385 141 Start Low
204 Web of trust 4,362 140 C High
205 Key (cryptography) 4,357 140 Start Unknown
206 Gordon Welchman 4,350 140 C Low
207 AES instruction set 4,290 138 C Low
208 Privacy-Enhanced Mail 4,260 137 Start Low
209 Secure multi-party computation 4,256 137 Start High
210 TrueCrypt 4,214 135 C Mid
211 Initialization vector 4,206 135 C High
212 Reception and criticism of WhatsApp security and privacy features 4,202 135 C Low
213 Stream cipher 4,140 133 Start Top
214 Rijndael S-box 4,100 132 Start Low
215 Electronic signature 4,094 132 C Low
216 RSA SecurID 4,072 131 Unknown Unknown
217 Adam Back 4,021 129 Start Low
218 Polybius square 4,002 129 Start Mid
219 Marian Rejewski 3,968 128 FA Mid
220 Elizebeth Smith Friedman 3,928 126 C Mid
221 Diplomatic bag 3,925 126 Start Low
222 The Doughnut 3,924 126 GA High
223 XOR cipher 3,914 126 Stub Mid
224 Replay attack 3,898 125 C Top
225 Directory service 3,895 125 Start Mid
226 Commitment scheme 3,853 124 C High
227 Communications Security Establishment 3,839 123 C Mid
228 PKCS 3,837 123 List High
229 Adi Shamir 3,836 123 Start Unknown
230 Cold boot attack 3,820 123 C Low
231 Challenge–response authentication 3,818 123 Start Mid
232 Blockchain game 3,791 122 Start Low
233 Bacon's cipher 3,741 120 Start Low
234 Frequency analysis 3,740 120 C High
235 Ciphertext 3,684 118 Start High
236 Crypto-anarchy 3,643 117 Start High
237 Boolean function 3,622 116 Start Mid
238 Padding (cryptography) 3,611 116 Start Unknown
239 List of ciphertexts 3,606 116 List Low
240 ElGamal encryption 3,596 116 Start Top
241 Book cipher 3,581 115 C Low
242 History of cryptography 3,574 115 Start High
243 Rail fence cipher 3,543 114 Start Low
244 Bruce Schneier 3,531 113 Start High
245 Daniel J. Bernstein 3,509 113 C Mid
246 Special Collection Service 3,496 112 C Low
247 Harvest now, decrypt later 3,491 112 Start Low
248 Cryptocurrency tumbler 3,476 112 Start Unknown
249 NIST Post-Quantum Cryptography Standardization 3,462 111 C Mid
250 William Binney (intelligence official) 3,413 110 Start Mid
251 SipHash 3,399 109 Start Low
252 David Chaum 3,356 108 C Low
253 Crypto AG 3,353 108 C High
254 Hashcash 3,336 107 Start Unknown
255 One-way function 3,333 107 Start Top
256 Australian Signals Directorate 3,307 106 C Low
257 Briar (software) 3,283 105 Start Low
258 Type B Cipher Machine 3,256 105 Start Low
259 PKCS 7 3,244 104 Start Low
260 Len Sassaman 3,225 104 Start Unknown
261 List of bitcoin forks 3,154 101 List Low
262 Non-repudiation 3,109 100 Start Mid
263 Disk encryption 3,101 100 C High
264 Key disclosure law 3,099 99 C Low
265 PKCS 11 3,097 99 Unknown Unknown
266 Known-plaintext attack 3,077 99 Start High
267 Whonix 3,044 98 Start Mid
268 Padding oracle attack 3,036 97 Start Low
269 Key size 3,023 97 C High
270 Polyalphabetic cipher 3,007 97 Start Unknown
271 Feistel cipher 3,003 96 Start Unknown
272 Disk encryption theory 2,969 95 C Unknown
273 Timing attack 2,955 95 C High
274 Digital watermarking 2,947 95 B Mid
275 Supply chain attack 2,942 94 C Low
276 Entrust 2,936 94 Start Low
277 Criticism of Dropbox 2,926 94 B Low
278 Plaintext 2,917 94 Start High
279 Open Whisper Systems 2,905 93 B Unknown
280 PKCS 1 2,880 92 C Mid
281 Dictionary attack 2,876 92 C Unknown
282 Key exchange 2,876 92 Start Unknown
283 Double Ratchet Algorithm 2,876 92 Start Low
284 Authenticator 2,871 92 Start Unknown
285 Zcash 2,833 91 Start Low
286 Hill cipher 2,829 91 Unknown Unknown
287 Phil Zimmermann 2,820 90 Start Mid
288 Cryptanalysis of the Lorenz cipher 2,774 89 C High
289 Export of cryptography from the United States 2,760 89 C Unknown
290 Cryptographic protocol 2,749 88 Start High
291 Bomba (cryptography) 2,747 88 Start Low
292 Keygen 2,733 88 C Low
293 Bitcoin scalability problem 2,732 88 C Low
294 Quantum network 2,726 87 C Low
295 Scrambler 2,720 87 C Unknown
296 K-anonymity 2,704 87 Start Mid
297 Pre-shared key 2,691 86 Start Mid
298 Comparison of SSH clients 2,678 86 List Low
299 Certificate Transparency 2,652 85 C High
300 Schnorr signature 2,635 85 C High
301 Length extension attack 2,631 84 Start Unknown
302 PKCS 8 2,619 84 Stub Unknown
303 Avalanche effect 2,616 84 Start High
304 Elliptic curve point multiplication 2,607 84 C Mid
305 Clipper chip 2,565 82 C High
306 HTTP Public Key Pinning 2,563 82 C Mid
307 Whitfield Diffie 2,538 81 B High
308 Dilly Knox 2,533 81 B Unknown
309 Tox (protocol) 2,532 81 C Low
310 Digital renminbi 2,529 81 B High
311 Collision attack 2,509 80 Start High
312 Filecoin 2,482 80 Stub Low
313 Off-the-record messaging 2,466 79 Start Unknown
314 Merkle–Damgård construction 2,462 79 C Unknown
315 William F. Friedman 2,408 77 C Unknown
316 Algorand 2,406 77 B Low
317 Communications security 2,393 77 Start Mid
318 AES key schedule 2,382 76 Start Low
319 HKDF 2,360 76 Start Unknown
320 Code signing 2,346 75 C Low
321 Affine cipher 2,314 74 C Low
322 DNS Certification Authority Authorization 2,301 74 GA Low
323 Encryption software 2,290 73 Start Top
324 Optimal asymmetric encryption padding 2,283 73 Start High
325 Twofish 2,269 73 Start High
326 Magic (cryptography) 2,259 72 Start Unknown
327 Data anonymization 2,256 72 Start Mid
328 Preimage attack 2,230 71 Stub Unknown
329 Comparison of disk encryption software 2,221 71 List High
330 Data at rest 2,213 71 C Mid
331 FIPS 140 2,208 71 Start Mid
332 Alastair Denniston 2,188 70 Start Unknown
333 RSA Factoring Challenge 2,173 70 Start Low
334 Key management 2,150 69 Unknown Unknown
335 Trusted timestamping 2,136 68 Start Unknown
336 Dm-crypt 2,133 68 Start Low
337 Copiale cipher 2,133 68 Start Low
338 Key encapsulation mechanism 2,118 68 Start High
339 Bullrun (decryption program) 2,098 67 B Low
340 FIPS 140-3 2,073 66 C Low
341 Leo Marks 2,069 66 B Unknown
342 Classical cipher 2,068 66 Start Top
343 Trusted Computing 2,067 66 C Mid
344 I. J. Good 2,050 66 C Low
345 WebTorrent 2,049 66 Start Unknown
346 Crypto Wars 2,043 65 Start High
347 Encrypting File System 2,042 65 B Unknown
348 Non-interactive zero-knowledge proof 2,029 65 Start Low
349 CCM mode 2,027 65 Start High
350 Ralph Merkle 2,013 64 C High
351 BB84 2,009 64 Start Low
352 Proof of authority 1,999 64 Start Low
353 Hash chain 1,991 64 Start Unknown
354 IEEE 802.11i-2004 1,985 64 C Mid
355 Physical unclonable function 1,983 63 Start Unknown
356 S-box 1,979 63 Start Top
357 Opportunistic TLS 1,968 63 Start Mid
358 Cryptography law 1,965 63 C Mid
359 Martin Hellman 1,958 63 Start High
360 Bouncy Castle (cryptography) 1,924 62 Start Unknown
361 Generic Security Services Application Program Interface 1,913 61 Start Low
362 FileVault 1,907 61 C Mid
363 Tor2web 1,900 61 Start Low
364 Tiny Encryption Algorithm 1,898 61 Unknown Unknown
365 Comparison of cryptography libraries 1,869 60 List Unknown
366 Orbot 1,867 60 Stub Low
367 SegWit 1,853 59 Start Low
368 Jami (software) 1,847 59 Start Unknown
369 Comparison of TLS implementations 1,840 59 List High
370 CableCARD 1,811 58 B Unknown
371 Crypt (C) 1,801 58 C High
372 Clock drift 1,779 57 C Low
373 Shugborough inscription 1,778 57 Start Low
374 SIGSALY 1,774 57 C Low
375 Secret sharing 1,769 57 B High
376 Mumble (software) 1,765 56 C Unknown
377 Key stretching 1,760 56 Start Unknown
378 Anonymous P2P 1,743 56 C Low
379 Advanced Access Content System 1,738 56 C Mid
380 Autokey cipher 1,730 55 C Mid
381 Ciphertext indistinguishability 1,718 55 C High
382 Content Authenticity Initiative 1,717 55 C Low
383 DeCSS 1,713 55 C Mid
384 Trapdoor function 1,710 55 Start High
385 Government Communications Security Bureau 1,709 55 B Low
386 Always-on DRM 1,695 54 Start Low
387 MD4 1,679 54 Start Low
388 Baby-step giant-step 1,673 53 C Unknown
389 BTCC (company) 1,668 53 Start Low
390 Cryptographic primitive 1,667 53 Start Top
391 UltraViolet (website) 1,646 53 C Low
392 W. T. Tutte 1,644 53 C Mid
393 Black Chamber 1,639 52 Unknown Unknown
394 Poly1305 1,633 52 Start Top
395 Differential cryptanalysis 1,627 52 B High
396 Bitcoin Gold 1,626 52 Start Low
397 Red/black concept 1,623 52 Stub Unknown
398 Security level 1,619 52 Stub Mid
399 List of cryptographers 1,618 52 List Low
400 ADFGVX cipher 1,609 51 Unknown Unknown
401 Chosen-plaintext attack 1,601 51 Stub Unknown
402 SecureDrop 1,595 51 Start Mid
403 Content Scramble System 1,584 51 Start Mid
404 Roger Dingledine 1,584 51 Start Unknown
405 Pollard's kangaroo algorithm 1,571 50 C Low
406 ZeroNet 1,565 50 Start Low
407 Strong cryptography 1,561 50 Unknown Unknown
408 Enigma rotor details 1,560 50 Start Mid
409 Proof of space 1,554 50 Start Low
410 Comparison of cryptographic hash functions 1,537 49 List Low
411 National Cryptologic Museum 1,532 49 C Mid
412 Banburismus 1,531 49 C Low
413 Operations Support Branch 1,529 49 Start Mid
414 FreeOTP 1,513 48 Start Low
415 Null cipher 1,510 48 Stub Low
416 Four-square cipher 1,505 48 C Unknown
417 Format-preserving encryption 1,499 48 Start High
418 Nothing-up-my-sleeve number 1,493 48 C Low
419 Secret decoder ring 1,482 47 Start Low
420 Integrated Encryption Scheme 1,468 47 Start Low
421 Grille (cryptography) 1,462 47 C Mid
422 Information-theoretic security 1,451 46 Start Top
423 Challenge-Handshake Authentication Protocol 1,449 46 Start Low
424 Lenstra elliptic-curve factorization 1,449 46 C Low
425 Downgrade attack 1,446 46 Start Mid
426 GNUnet 1,441 46 B Low
427 Key server (cryptographic) 1,438 46 Start Mid
428 Temporal Key Integrity Protocol 1,434 46 C Low
429 Tabula recta 1,430 46 Unknown Unknown
430 Cryptovirology 1,427 46 Start Mid
431 BLS digital signature 1,423 45 Start Mid
432 AES implementations 1,417 45 List Low
433 Paillier cryptosystem 1,416 45 Start High
434 Confusion and diffusion 1,414 45 Start Mid
435 Code (cryptography) 1,409 45 Start Top
436 International Data Encryption Algorithm 1,400 45 C Unknown
437 Blind signature 1,398 45 C Mid
438 Meet-in-the-middle attack 1,394 44 C High
439 Open Technology Fund 1,388 44 Start Unknown
440 Codebook 1,383 44 Stub Unknown
441 Simultaneous Authentication of Equals 1,379 44 Start High
442 Advanced Encryption Standard process 1,378 44 C Mid
443 LibreSSL 1,374 44 Start High
444 Serpent (cipher) 1,373 44 C Low
445 Quahl 1,362 43 C Low
446 Public key fingerprint 1,361 43 Start Mid
447 Wildcard certificate 1,350 43 Redirect NA
448 Two-square cipher 1,346 43 Unknown Unknown
449 One-key MAC 1,345 43 Start Low
450 Dorabella Cipher 1,342 43 Unknown Unknown
451 McEliece cryptosystem 1,341 43 C High
452 NTRU 1,337 43 C Low
453 Key-agreement protocol 1,334 43 Start Top
454 Keybase 1,328 42 Start Low
455 Word square 1,320 42 C Low
456 RSA problem 1,314 42 Start Top
457 Alberti cipher 1,312 42 C Low
458 Secure cryptoprocessor 1,306 42 C Mid
459 CBC-MAC 1,302 42 C High
460 Cipher runes 1,301 41 Start Unknown
461 NEO (cryptocurrency) 1,299 41 Start Low
462 SIGABA 1,295 41 C High
463 Random oracle 1,290 41 Start Low
464 Fuzzy hashing 1,283 41 C Low
465 Coppersmith's attack 1,282 41 B High
466 Privacy and blockchain 1,276 41 C Low
467 Hidden message 1,274 41 Start Low
468 Snowflake (software) 1,272 41 Start Low
469 Arthur Scherbius 1,270 40 Start Mid
470 OMEMO 1,270 40 Start Low
471 Rijndael MixColumns 1,265 40 Start Low
472 Twisted Edwards curve 1,257 40 C Low
473 Power analysis 1,252 40 Unknown Unknown
474 Steganographia 1,240 40 Start Low
475 Rotor machine 1,238 39 Unknown Unknown
476 A5/1 1,237 39 B High
477 SYN cookies 1,236 39 Start Unknown
478 Opportunistic Wireless Encryption 1,228 39 Stub Low
479 Wiener's attack 1,225 39 B High
480 Visual cryptography 1,223 39 Unknown Unknown
481 Great Cipher 1,223 39 Start Mid
482 RIPEMD 1,222 39 C Unknown
483 Friend-to-friend 1,221 39 Start Low
484 MS-CHAP 1,221 39 Start Low
485 Hash-based cryptography 1,220 39 Start Low
486 David Wheeler (computer scientist) 1,214 39 Start Low
487 XTEA 1,211 39 Start Low
488 Proton Drive 1,211 39 Start Low
489 Perfect Dark (P2P) 1,200 38 C Low
490 NTRUEncrypt 1,196 38 C Mid
491 Cipher Bureau (Poland) 1,190 38 GA Low
492 Integrated Windows Authentication 1,188 38 Start Unknown
493 EFF DES cracker 1,188 38 C Mid
494 Hybrid cryptosystem 1,188 38 Start High
495 Frank Terpil 1,167 37 Start Low
496 Shared secret 1,157 37 Stub High
497 Montgomery curve 1,152 37 C Mid
498 Rubber-hose cryptanalysis 1,149 37 Redirect Low
499 SM4 (cipher) 1,142 36 Start Low
500 Peercoin 1,138 36 Stub Low