From Wikipedia, the free encyclopedia
This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.
To report bugs, please write on the Community tech bot talk page on Meta.
Period: 2024-12-01 to 2024-12-31
Total views: 6,565,476
Updated: 22:54, 5 January 2025 (UTC)
Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
WhatsApp
|
762,223
|
24,587
|
B
|
High
|
2
|
Bitcoin
|
353,018
|
11,387
|
B
|
High
|
3
|
Telegram (software)
|
332,920
|
10,739
|
B
|
Mid
|
4
|
Cryptocurrency
|
214,487
|
6,918
|
C
|
High
|
5
|
Dogecoin
|
169,733
|
5,475
|
C
|
Low
|
6
|
Alan Turing
|
160,858
|
5,188
|
GA
|
Top
|
7
|
History of bitcoin
|
138,935
|
4,481
|
C
|
Low
|
8
|
Enigma machine
|
112,656
|
3,634
|
C
|
High
|
9
|
Blockchain
|
95,255
|
3,072
|
B
|
High
|
10
|
Tor (network)
|
91,280
|
2,944
|
B
|
Mid
|
11
|
The Imitation Game
|
75,386
|
2,431
|
C
|
Mid
|
12
|
Voynich manuscript
|
74,911
|
2,416
|
B
|
Low
|
13
|
WikiLeaks
|
68,014
|
2,194
|
B
|
Low
|
14
|
National Security Agency
|
67,661
|
2,182
|
C
|
High
|
15
|
Transport Layer Security
|
60,289
|
1,944
|
B
|
Top
|
16
|
HTTPS
|
58,260
|
1,879
|
C
|
High
|
17
|
Vitalik Buterin
|
53,138
|
1,714
|
C
|
Low
|
18
|
Signal (software)
|
52,810
|
1,703
|
C
|
Mid
|
19
|
RSA (cryptosystem)
|
49,525
|
1,597
|
C
|
Top
|
20
|
Virtual private network
|
47,867
|
1,544
|
C
|
Mid
|
21
|
Caesar cipher
|
45,062
|
1,453
|
FA
|
High
|
22
|
Darknet market
|
45,051
|
1,453
|
B
|
Mid
|
23
|
Changpeng Zhao
|
43,452
|
1,401
|
Start
|
Low
|
24
|
Shiba Inu (cryptocurrency)
|
42,504
|
1,371
|
Start
|
Low
|
25
|
Advanced Encryption Standard
|
42,317
|
1,365
|
B
|
Top
|
26
|
HTTP Strict Transport Security
|
41,890
|
1,351
|
C
|
Low
|
27
|
SHA-2
|
40,857
|
1,317
|
C
|
Top
|
28
|
Cryptography
|
38,790
|
1,251
|
C
|
Top
|
29
|
Diffie–Hellman key exchange
|
38,129
|
1,229
|
C
|
Top
|
30
|
Post-quantum cryptography
|
37,676
|
1,215
|
C
|
High
|
31
|
GCHQ
|
36,606
|
1,180
|
B
|
Low
|
32
|
Public-key cryptography
|
36,530
|
1,178
|
C
|
Top
|
33
|
Secure Shell
|
35,695
|
1,151
|
C
|
High
|
34
|
Vigenère cipher
|
33,814
|
1,090
|
B
|
Low
|
35
|
Claude Shannon
|
26,414
|
852
|
C
|
Top
|
36
|
Block cipher mode of operation
|
25,514
|
823
|
C
|
Top
|
37
|
Proton Mail
|
24,338
|
785
|
C
|
Low
|
38
|
Letter frequency
|
24,143
|
778
|
B
|
Low
|
39
|
Information theory
|
23,922
|
771
|
B
|
Top
|
40
|
Digital signature
|
23,711
|
764
|
C
|
Top
|
41
|
NordVPN
|
23,643
|
762
|
C
|
Mid
|
42
|
Trusted Platform Module
|
23,633
|
762
|
C
|
Mid
|
43
|
Password
|
23,073
|
744
|
C
|
Top
|
44
|
MD5
|
23,072
|
744
|
C
|
Top
|
45
|
Phone hacking
|
23,038
|
743
|
Start
|
Mid
|
46
|
Man-in-the-middle attack
|
22,915
|
739
|
C
|
Mid
|
47
|
Merkle tree
|
22,764
|
734
|
C
|
Mid
|
48
|
Sator Square
|
22,750
|
733
|
B
|
Low
|
49
|
Cryptographic hash function
|
22,402
|
722
|
C
|
Top
|
50
|
Zimmermann telegram
|
22,065
|
711
|
B
|
High
|
51
|
Knapsack problem
|
21,885
|
705
|
C
|
Mid
|
52
|
Pretty Good Privacy
|
20,596
|
664
|
B
|
High
|
53
|
HMAC
|
20,143
|
649
|
C
|
High
|
54
|
Steganography
|
19,730
|
636
|
C
|
High
|
55
|
Encryption
|
19,553
|
630
|
C
|
Top
|
56
|
Elliptic-curve cryptography
|
19,476
|
628
|
C
|
High
|
57
|
Kryptos
|
19,328
|
623
|
C
|
Low
|
58
|
Bletchley Park
|
19,286
|
622
|
B
|
High
|
59
|
Bitcoin Cash
|
18,563
|
598
|
Start
|
Low
|
60
|
Information security
|
18,056
|
582
|
B
|
Top
|
61
|
Decentralized finance
|
17,765
|
573
|
Start
|
Low
|
62
|
Joan Clarke
|
17,244
|
556
|
C
|
Mid
|
63
|
Litecoin
|
17,138
|
552
|
Start
|
Low
|
64
|
Wi-Fi Protected Access
|
17,121
|
552
|
C
|
Mid
|
65
|
SHA-1
|
16,875
|
544
|
C
|
Top
|
66
|
Zero-knowledge proof
|
16,851
|
543
|
C
|
Top
|
67
|
ROT13
|
16,603
|
535
|
C
|
Mid
|
68
|
Rainbow table
|
16,425
|
529
|
C
|
High
|
69
|
Grover's algorithm
|
16,182
|
522
|
C
|
Mid
|
70
|
One-time password
|
16,099
|
519
|
B
|
Mid
|
71
|
Proof of stake
|
15,955
|
514
|
C
|
Low
|
72
|
One-time pad
|
15,924
|
513
|
C
|
Top
|
73
|
Cipher
|
15,519
|
500
|
C
|
Top
|
74
|
Certificate authority
|
15,226
|
491
|
C
|
High
|
75
|
Keychain (software)
|
14,998
|
483
|
Start
|
Unknown
|
76
|
Substitution cipher
|
14,989
|
483
|
Unknown
|
Unknown
|
77
|
OpenVPN
|
14,772
|
476
|
C
|
Mid
|
78
|
Digital rights management
|
14,765
|
476
|
C
|
High
|
79
|
Kerberos (protocol)
|
14,654
|
472
|
C
|
High
|
80
|
Cryptanalysis of the Enigma
|
14,550
|
469
|
C
|
Mid
|
81
|
.onion
|
14,222
|
458
|
C
|
Low
|
82
|
Active Directory
|
14,183
|
457
|
C
|
Low
|
83
|
Code talker
|
13,223
|
426
|
B
|
Low
|
84
|
Tails (operating system)
|
13,095
|
422
|
Start
|
Low
|
85
|
Bcrypt
|
12,815
|
413
|
C
|
Mid
|
86
|
Public key infrastructure
|
12,787
|
412
|
C
|
Top
|
87
|
Comparison of BitTorrent clients
|
12,715
|
410
|
List
|
Low
|
88
|
Elliptic Curve Digital Signature Algorithm
|
12,435
|
401
|
C
|
High
|
89
|
Polybius square
|
12,024
|
387
|
Start
|
Mid
|
90
|
Integer factorization
|
11,991
|
386
|
B
|
Mid
|
91
|
Public key certificate
|
11,903
|
383
|
C
|
Top
|
92
|
Secure Hash Algorithms
|
11,795
|
380
|
Start
|
High
|
93
|
Bombe
|
11,702
|
377
|
B
|
Mid
|
94
|
OpenSSL
|
11,466
|
369
|
B
|
High
|
95
|
SHA-3
|
11,433
|
368
|
Start
|
Mid
|
96
|
Salt (cryptography)
|
11,317
|
365
|
Start
|
High
|
97
|
Gordon Welchman
|
11,316
|
365
|
C
|
Low
|
98
|
Adam Back
|
10,845
|
349
|
C
|
Low
|
99
|
IMSI-catcher
|
10,501
|
338
|
Start
|
Mid
|
100
|
Galois/Counter Mode
|
10,471
|
337
|
C
|
Mid
|
101
|
Mullvad
|
10,465
|
337
|
Start
|
Low
|
102
|
Vault 7
|
10,429
|
336
|
C
|
Mid
|
103
|
Authentication
|
10,348
|
333
|
C
|
High
|
104
|
Bitconnect
|
10,225
|
329
|
C
|
Low
|
105
|
Homomorphic encryption
|
10,192
|
328
|
C
|
High
|
106
|
Brute-force attack
|
10,178
|
328
|
C
|
High
|
107
|
I2P
|
10,160
|
327
|
B
|
Low
|
108
|
Ultra (cryptography)
|
10,120
|
326
|
C
|
High
|
109
|
Colossus computer
|
10,110
|
326
|
B
|
Mid
|
110
|
Utah Data Center
|
10,071
|
324
|
C
|
Mid
|
111
|
SSH File Transfer Protocol
|
10,005
|
322
|
C
|
Low
|
112
|
Polkadot (blockchain platform)
|
9,831
|
317
|
Start
|
Low
|
113
|
Peter Todd (cryptographer)
|
9,821
|
316
|
Start
|
Unknown
|
114
|
Data Encryption Standard
|
9,749
|
314
|
C
|
Top
|
115
|
Password cracking
|
9,744
|
314
|
C
|
Mid
|
116
|
Playfair cipher
|
9,628
|
310
|
Unknown
|
Unknown
|
117
|
Theoretical computer science
|
9,545
|
307
|
B
|
Low
|
118
|
Forward secrecy
|
9,478
|
305
|
C
|
High
|
119
|
Shamir's secret sharing
|
9,431
|
304
|
C
|
High
|
120
|
Cryptonomicon
|
9,429
|
304
|
C
|
Low
|
121
|
Symmetric-key algorithm
|
9,425
|
304
|
Start
|
Top
|
122
|
Beale ciphers
|
9,339
|
301
|
B
|
Low
|
123
|
Pay television
|
9,311
|
300
|
Start
|
Unknown
|
124
|
Bitwarden
|
9,192
|
296
|
C
|
Low
|
125
|
InterPlanetary File System
|
9,188
|
296
|
C
|
Low
|
126
|
Bitcoin Core
|
9,156
|
295
|
Start
|
Low
|
127
|
Matrix (protocol)
|
9,114
|
294
|
Start
|
Unknown
|
128
|
Alice and Bob
|
8,961
|
289
|
Start
|
High
|
129
|
ChaCha20-Poly1305
|
8,814
|
284
|
C
|
Low
|
130
|
VeraCrypt
|
8,810
|
284
|
C
|
Mid
|
131
|
Babington Plot
|
8,756
|
282
|
C
|
Low
|
132
|
Quantum cryptography
|
8,736
|
281
|
C
|
High
|
133
|
Algorand
|
8,707
|
280
|
B
|
Low
|
134
|
Quantum key distribution
|
8,684
|
280
|
B
|
Mid
|
135
|
Fort Meade
|
8,598
|
277
|
C
|
Low
|
136
|
Cryptographic nonce
|
8,550
|
275
|
Start
|
High
|
137
|
Cryptogram
|
8,397
|
270
|
C
|
Mid
|
138
|
Cypherpunk
|
8,311
|
268
|
C
|
Mid
|
139
|
EdDSA
|
8,249
|
266
|
C
|
High
|
140
|
Password manager
|
8,168
|
263
|
C
|
Low
|
141
|
PBKDF2
|
8,118
|
261
|
C
|
Low
|
142
|
The Tor Project
|
8,075
|
260
|
C
|
Mid
|
143
|
Birthday attack
|
7,886
|
254
|
C
|
High
|
144
|
Cryptanalysis
|
7,875
|
254
|
C
|
High
|
145
|
Len Sassaman
|
7,823
|
252
|
Start
|
Unknown
|
146
|
Discrete logarithm
|
7,744
|
249
|
C
|
Mid
|
147
|
Apple–FBI encryption dispute
|
7,739
|
249
|
C
|
Low
|
148
|
Tabula recta
|
7,713
|
248
|
Unknown
|
Unknown
|
149
|
Link 16
|
7,586
|
244
|
Start
|
Low
|
150
|
Tap code
|
7,552
|
243
|
Start
|
Low
|
151
|
Authenticated encryption
|
7,533
|
243
|
C
|
Mid
|
152
|
The Doughnut
|
7,478
|
241
|
GA
|
High
|
153
|
Richard Teng
|
7,467
|
240
|
Start
|
Low
|
154
|
Message authentication code
|
7,405
|
238
|
C
|
Top
|
155
|
Nyctography
|
7,354
|
237
|
Unknown
|
Unknown
|
156
|
Lattice-based cryptography
|
7,205
|
232
|
Start
|
Low
|
157
|
KeePass
|
7,176
|
231
|
C
|
Low
|
158
|
Curve25519
|
7,112
|
229
|
C
|
High
|
159
|
Signal Protocol
|
7,104
|
229
|
C
|
High
|
160
|
Hyphanet
|
6,981
|
225
|
B
|
Mid
|
161
|
Elliptic-curve Diffie–Hellman
|
6,976
|
225
|
Start
|
Mid
|
162
|
Magic (cryptography)
|
6,889
|
222
|
Start
|
Unknown
|
163
|
Argon2
|
6,804
|
219
|
C
|
Mid
|
164
|
Units of information
|
6,693
|
215
|
C
|
Unknown
|
165
|
Differential privacy
|
6,615
|
213
|
C
|
Mid
|
166
|
Qubes OS
|
6,614
|
213
|
C
|
Mid
|
167
|
List of bitcoin forks
|
6,491
|
209
|
List
|
Low
|
168
|
Digest access authentication
|
6,243
|
201
|
B
|
Low
|
169
|
3-D Secure
|
6,222
|
200
|
Start
|
Low
|
170
|
Password strength
|
6,197
|
199
|
C
|
High
|
171
|
Key derivation function
|
6,153
|
198
|
C
|
Low
|
172
|
Lavarand
|
6,070
|
195
|
Start
|
Mid
|
173
|
Transposition cipher
|
5,908
|
190
|
Unknown
|
Unknown
|
174
|
TrueCrypt
|
5,857
|
188
|
C
|
Mid
|
175
|
Certificate signing request
|
5,828
|
188
|
C
|
Low
|
176
|
Lorenz cipher
|
5,825
|
187
|
C
|
Top
|
177
|
Side-channel attack
|
5,741
|
185
|
C
|
High
|
178
|
Cryptographically secure pseudorandom number generator
|
5,735
|
185
|
C
|
Top
|
179
|
Bitcoin scalability problem
|
5,720
|
184
|
C
|
Low
|
180
|
Triple DES
|
5,702
|
183
|
Start
|
Unknown
|
181
|
XOR cipher
|
5,494
|
177
|
Stub
|
Mid
|
182
|
Reception and criticism of WhatsApp security and privacy features
|
5,459
|
176
|
C
|
Low
|
183
|
GNU Privacy Guard
|
5,445
|
175
|
C
|
Unknown
|
184
|
Self-signed certificate
|
5,436
|
175
|
Start
|
Unknown
|
185
|
Bacon's cipher
|
5,392
|
173
|
Start
|
Low
|
186
|
RC4
|
5,370
|
173
|
B
|
Top
|
187
|
Digital Signature Algorithm
|
5,363
|
173
|
C
|
Top
|
188
|
PKCS 12
|
5,357
|
172
|
Start
|
Low
|
189
|
Harvest now, decrypt later
|
5,347
|
172
|
Start
|
Low
|
190
|
Block cipher
|
5,300
|
170
|
C
|
Top
|
191
|
KeePassXC
|
5,287
|
170
|
Start
|
Low
|
192
|
ElGamal encryption
|
5,272
|
170
|
Start
|
Top
|
193
|
Rijndael S-box
|
5,256
|
169
|
Start
|
Low
|
194
|
Salsa20
|
5,249
|
169
|
C
|
Top
|
195
|
Citizenfour
|
5,193
|
167
|
C
|
Low
|
196
|
11B-X-1371
|
5,162
|
166
|
GA
|
Low
|
197
|
Web of trust
|
5,045
|
162
|
C
|
High
|
198
|
FIPS 140-2
|
4,927
|
158
|
C
|
Mid
|
199
|
Adi Shamir
|
4,919
|
158
|
C
|
Unknown
|
200
|
Conel Hugh O'Donel Alexander
|
4,900
|
158
|
Start
|
Low
|
201
|
Confidentiality
|
4,865
|
156
|
C
|
Low
|
202
|
Mutual authentication
|
4,864
|
156
|
Stub
|
Low
|
203
|
Cipher suite
|
4,846
|
156
|
C
|
Top
|
204
|
Feistel cipher
|
4,833
|
155
|
Start
|
Unknown
|
205
|
Automatic Certificate Management Environment
|
4,826
|
155
|
Start
|
Low
|
206
|
Kerckhoffs's principle
|
4,807
|
155
|
Start
|
Mid
|
207
|
Fork (blockchain)
|
4,774
|
154
|
Start
|
Mid
|
208
|
Cold boot attack
|
4,729
|
152
|
C
|
Low
|
209
|
Hashcash
|
4,704
|
151
|
Start
|
Unknown
|
210
|
OpenSSH
|
4,647
|
149
|
C
|
High
|
211
|
Key (cryptography)
|
4,640
|
149
|
Start
|
Unknown
|
212
|
Marian Rejewski
|
4,629
|
149
|
FA
|
Mid
|
213
|
Stream cipher
|
4,623
|
149
|
Start
|
Top
|
214
|
Known-plaintext attack
|
4,584
|
147
|
Start
|
High
|
215
|
Illegal number
|
4,579
|
147
|
C
|
Low
|
216
|
Rail fence cipher
|
4,544
|
146
|
Start
|
Low
|
217
|
Ricky McCormick's encrypted notes
|
4,533
|
146
|
B
|
Low
|
218
|
Blowfish (cipher)
|
4,505
|
145
|
B
|
High
|
219
|
Root certificate
|
4,504
|
145
|
Start
|
Low
|
220
|
Electronic signature
|
4,496
|
145
|
C
|
Low
|
221
|
David Chaum
|
4,493
|
144
|
C
|
Low
|
222
|
Session (software)
|
4,488
|
144
|
Start
|
Low
|
223
|
BLAKE (hash function)
|
4,463
|
143
|
C
|
Mid
|
224
|
Datagram Transport Layer Security
|
4,353
|
140
|
C
|
Mid
|
225
|
Blockchain game
|
4,297
|
138
|
Start
|
Low
|
226
|
Wired Equivalent Privacy
|
4,292
|
138
|
C
|
Mid
|
227
|
Book cipher
|
4,290
|
138
|
C
|
Low
|
228
|
Boolean function
|
4,243
|
136
|
Start
|
Mid
|
229
|
Secure multi-party computation
|
4,233
|
136
|
Start
|
High
|
230
|
Zcash
|
4,228
|
136
|
Start
|
Low
|
231
|
Filecoin
|
4,221
|
136
|
Start
|
Low
|
232
|
RSA Security
|
4,219
|
136
|
C
|
Unknown
|
233
|
Certificate revocation list
|
4,167
|
134
|
C
|
Low
|
234
|
Padding (cryptography)
|
4,114
|
132
|
Start
|
Unknown
|
235
|
Non-repudiation
|
4,061
|
131
|
Start
|
Mid
|
236
|
AES instruction set
|
4,044
|
130
|
C
|
Low
|
237
|
Dual EC DRBG
|
4,000
|
129
|
C
|
High
|
238
|
Crypto-anarchy
|
3,984
|
128
|
Start
|
High
|
239
|
Key signing party
|
3,976
|
128
|
Stub
|
Low
|
240
|
Threema
|
3,952
|
127
|
C
|
Unknown
|
241
|
Atbash
|
3,950
|
127
|
Stub
|
Low
|
242
|
Quantum network
|
3,894
|
125
|
C
|
Low
|
243
|
Replay attack
|
3,888
|
125
|
C
|
Top
|
244
|
Bruce Schneier
|
3,882
|
125
|
Start
|
High
|
245
|
History of cryptography
|
3,872
|
124
|
Start
|
High
|
246
|
Deniable encryption
|
3,850
|
124
|
Start
|
High
|
247
|
Commitment scheme
|
3,847
|
124
|
C
|
High
|
248
|
Padding oracle attack
|
3,831
|
123
|
Start
|
Low
|
249
|
Diplomatic bag
|
3,752
|
121
|
Start
|
Low
|
250
|
Frequency analysis
|
3,749
|
120
|
C
|
High
|
251
|
Communications Security Establishment
|
3,729
|
120
|
C
|
Mid
|
252
|
Ciphertext
|
3,695
|
119
|
Start
|
High
|
253
|
Initialization vector
|
3,677
|
118
|
C
|
High
|
254
|
Certificate Transparency
|
3,674
|
118
|
C
|
High
|
255
|
Charlie Lee (computer scientist)
|
3,568
|
115
|
Start
|
Low
|
256
|
PKCS
|
3,558
|
114
|
List
|
High
|
257
|
Whonix
|
3,547
|
114
|
Start
|
Mid
|
258
|
Plaintext
|
3,520
|
113
|
Start
|
High
|
259
|
Polyalphabetic cipher
|
3,499
|
112
|
Start
|
Unknown
|
260
|
Privacy-Enhanced Mail
|
3,492
|
112
|
Start
|
Low
|
261
|
NIST Post-Quantum Cryptography Standardization
|
3,483
|
112
|
C
|
Mid
|
262
|
Daniel J. Bernstein
|
3,451
|
111
|
C
|
Mid
|
263
|
Cryptocurrency tumbler
|
3,440
|
110
|
Start
|
Unknown
|
264
|
One-way function
|
3,430
|
110
|
Start
|
Top
|
265
|
Secret decoder ring
|
3,423
|
110
|
Start
|
Low
|
266
|
RSA SecurID
|
3,373
|
108
|
C
|
Low
|
267
|
Elliptic curve point multiplication
|
3,351
|
108
|
C
|
Mid
|
268
|
PKCS 11
|
3,335
|
107
|
Unknown
|
Unknown
|
269
|
Merkle–Damgård construction
|
3,325
|
107
|
C
|
Unknown
|
270
|
Digital renminbi
|
3,309
|
106
|
B
|
High
|
271
|
Timing attack
|
3,299
|
106
|
C
|
High
|
272
|
Bomba (cryptography)
|
3,281
|
105
|
Start
|
Low
|
273
|
Hill cipher
|
3,265
|
105
|
Unknown
|
Unknown
|
274
|
Challenge–response authentication
|
3,259
|
105
|
Start
|
Mid
|
275
|
Supply chain attack
|
3,257
|
105
|
C
|
Low
|
276
|
Keygen
|
3,233
|
104
|
C
|
Low
|
277
|
Digital watermarking
|
3,212
|
103
|
B
|
Mid
|
278
|
List of ciphertexts
|
3,204
|
103
|
List
|
Low
|
279
|
Special Collection Service
|
3,200
|
103
|
C
|
Low
|
280
|
Type B Cipher Machine
|
3,090
|
99
|
Start
|
Low
|
281
|
SipHash
|
3,087
|
99
|
Start
|
Low
|
282
|
Directory service
|
3,009
|
97
|
Start
|
Mid
|
283
|
Australian Signals Directorate
|
3,001
|
96
|
C
|
Low
|
284
|
DNS-based Authentication of Named Entities
|
2,992
|
96
|
C
|
Mid
|
285
|
Bitcoin Gold
|
2,983
|
96
|
Start
|
Low
|
286
|
PKCS 7
|
2,957
|
95
|
Start
|
Low
|
287
|
Key size
|
2,943
|
94
|
C
|
High
|
288
|
BB84
|
2,943
|
94
|
Start
|
Low
|
289
|
Crypto AG
|
2,903
|
93
|
C
|
High
|
290
|
Non-interactive zero-knowledge proof
|
2,903
|
93
|
Start
|
Low
|
291
|
Authenticator
|
2,897
|
93
|
B
|
Low
|
292
|
Length extension attack
|
2,894
|
93
|
Start
|
Unknown
|
293
|
S-box
|
2,879
|
92
|
Start
|
Top
|
294
|
Affine cipher
|
2,860
|
92
|
C
|
Low
|
295
|
AES key schedule
|
2,856
|
92
|
Start
|
Low
|
296
|
Dilly Knox
|
2,849
|
91
|
B
|
Unknown
|
297
|
Cryptographic protocol
|
2,845
|
91
|
Start
|
High
|
298
|
Preimage attack
|
2,837
|
91
|
Stub
|
Unknown
|
299
|
Elizebeth Smith Friedman
|
2,791
|
90
|
C
|
Mid
|
300
|
Collision attack
|
2,744
|
88
|
Start
|
High
|
301
|
Key exchange
|
2,740
|
88
|
Start
|
Unknown
|
302
|
Disk encryption
|
2,737
|
88
|
C
|
High
|
303
|
Whitfield Diffie
|
2,704
|
87
|
B
|
High
|
304
|
RSA Factoring Challenge
|
2,680
|
86
|
Start
|
Low
|
305
|
Clipper chip
|
2,662
|
85
|
C
|
High
|
306
|
Code signing
|
2,644
|
85
|
C
|
Low
|
307
|
PKCS 1
|
2,626
|
84
|
C
|
Mid
|
308
|
Dictionary attack
|
2,615
|
84
|
C
|
Unknown
|
309
|
Disk encryption theory
|
2,612
|
84
|
C
|
Unknown
|
310
|
Schnorr signature
|
2,608
|
84
|
C
|
High
|
311
|
K-anonymity
|
2,606
|
84
|
Start
|
Mid
|
312
|
William Binney (intelligence official)
|
2,583
|
83
|
C
|
Mid
|
313
|
Phil Zimmermann
|
2,553
|
82
|
Start
|
Mid
|
314
|
Autokey cipher
|
2,521
|
81
|
C
|
Mid
|
315
|
Pre-shared key
|
2,521
|
81
|
Start
|
Mid
|
316
|
Key encapsulation mechanism
|
2,447
|
78
|
Start
|
High
|
317
|
ADFGVX cipher
|
2,437
|
78
|
Unknown
|
Unknown
|
318
|
SegWit
|
2,420
|
78
|
Start
|
Low
|
319
|
Strong cryptography
|
2,372
|
76
|
Unknown
|
Unknown
|
320
|
Baby-step giant-step
|
2,366
|
76
|
C
|
Unknown
|
321
|
Lenstra elliptic-curve factorization
|
2,360
|
76
|
C
|
Low
|
322
|
Alastair Denniston
|
2,336
|
75
|
Start
|
Unknown
|
323
|
DNS Certification Authority Authorization
|
2,336
|
75
|
GA
|
Low
|
324
|
Comparison of SSH clients
|
2,328
|
75
|
List
|
Low
|
325
|
Entrust
|
2,272
|
73
|
Start
|
Low
|
326
|
Scrambler
|
2,271
|
73
|
C
|
Unknown
|
327
|
PKCS 8
|
2,242
|
72
|
Stub
|
Unknown
|
328
|
Twofish
|
2,225
|
71
|
Start
|
High
|
329
|
HKDF
|
2,221
|
71
|
Start
|
Unknown
|
330
|
Avalanche effect
|
2,216
|
71
|
Start
|
High
|
331
|
Ralph Merkle
|
2,215
|
71
|
C
|
High
|
332
|
Export of cryptography from the United States
|
2,213
|
71
|
C
|
Unknown
|
333
|
Communications security
|
2,206
|
71
|
Start
|
Mid
|
334
|
Classical cipher
|
2,200
|
70
|
Start
|
Top
|
335
|
BTCC (company)
|
2,186
|
70
|
Start
|
Low
|
336
|
Comparison of disk encryption software
|
2,176
|
70
|
List
|
High
|
337
|
Bullrun (decryption program)
|
2,176
|
70
|
B
|
Low
|
338
|
Tox (protocol)
|
2,168
|
69
|
C
|
Low
|
339
|
Martin Hellman
|
2,157
|
69
|
Start
|
High
|
340
|
Optimal asymmetric encryption padding
|
2,155
|
69
|
Start
|
High
|
341
|
Trusted timestamping
|
2,149
|
69
|
Start
|
Unknown
|
342
|
Bouncy Castle (cryptography)
|
2,144
|
69
|
Start
|
Unknown
|
343
|
FIPS 140
|
2,085
|
67
|
Start
|
Mid
|
344
|
Hash chain
|
2,071
|
66
|
Start
|
Unknown
|
345
|
Double Ratchet Algorithm
|
2,071
|
66
|
Start
|
Low
|
346
|
IEEE 802.11i-2004
|
2,056
|
66
|
C
|
Mid
|
347
|
Grille (cryptography)
|
2,056
|
66
|
C
|
Mid
|
348
|
Off-the-record messaging
|
2,052
|
66
|
Start
|
Unknown
|
349
|
Data at rest
|
2,050
|
66
|
C
|
Mid
|
350
|
Coinye
|
2,046
|
66
|
Start
|
Low
|
351
|
WebTorrent
|
2,046
|
66
|
Start
|
Unknown
|
352
|
Data anonymization
|
2,037
|
65
|
Start
|
Mid
|
353
|
HTTP Public Key Pinning
|
2,037
|
65
|
C
|
Mid
|
354
|
FIPS 140-3
|
2,028
|
65
|
C
|
Low
|
355
|
Dm-crypt
|
2,023
|
65
|
Start
|
Low
|
356
|
Enigma rotor details
|
2,004
|
64
|
Start
|
Mid
|
357
|
Trusted Computing
|
1,973
|
63
|
C
|
Mid
|
358
|
Security level
|
1,963
|
63
|
Stub
|
Mid
|
359
|
I. J. Good
|
1,950
|
62
|
C
|
Low
|
360
|
CCM mode
|
1,947
|
62
|
Start
|
High
|
361
|
Nothing-up-my-sleeve number
|
1,938
|
62
|
C
|
Low
|
362
|
NSAKEY
|
1,918
|
61
|
C
|
High
|
363
|
Encrypting File System
|
1,915
|
61
|
B
|
Unknown
|
364
|
William F. Friedman
|
1,910
|
61
|
C
|
Unknown
|
365
|
Copiale cipher
|
1,898
|
61
|
Start
|
Low
|
366
|
Crypto Wars
|
1,897
|
61
|
Start
|
High
|
367
|
Opportunistic TLS
|
1,893
|
61
|
Start
|
Mid
|
368
|
Paillier cryptosystem
|
1,889
|
60
|
Start
|
High
|
369
|
Briar (software)
|
1,879
|
60
|
Start
|
Low
|
370
|
Trapdoor function
|
1,875
|
60
|
Start
|
High
|
371
|
Rijndael MixColumns
|
1,868
|
60
|
Start
|
Low
|
372
|
McEliece cryptosystem
|
1,860
|
60
|
C
|
High
|
373
|
Comparison of TLS implementations
|
1,858
|
59
|
List
|
High
|
374
|
Criticism of Dropbox
|
1,852
|
59
|
B
|
Low
|
375
|
Station HYPO
|
1,843
|
59
|
Start
|
Low
|
376
|
Mumble (software)
|
1,841
|
59
|
C
|
Unknown
|
377
|
Pepper (cryptography)
|
1,831
|
59
|
Start
|
Low
|
378
|
Ciphertext indistinguishability
|
1,829
|
59
|
C
|
High
|
379
|
BLS digital signature
|
1,829
|
59
|
Start
|
Mid
|
380
|
Bitcoin Satoshi Vision
|
1,829
|
59
|
Start
|
Low
|
381
|
Secret sharing
|
1,823
|
58
|
C
|
High
|
382
|
Black Chamber
|
1,808
|
58
|
Unknown
|
Unknown
|
383
|
UltraViolet (website)
|
1,805
|
58
|
C
|
Low
|
384
|
Comparison of cryptography libraries
|
1,802
|
58
|
List
|
Unknown
|
385
|
DeCSS
|
1,798
|
58
|
C
|
Mid
|
386
|
Serene (pianist)
|
1,795
|
57
|
Start
|
Unknown
|
387
|
Key management
|
1,794
|
57
|
Unknown
|
Unknown
|
388
|
Cryptographic primitive
|
1,791
|
57
|
Start
|
Top
|
389
|
Orbot
|
1,783
|
57
|
Stub
|
Low
|
390
|
Musical cryptogram
|
1,769
|
57
|
C
|
Low
|
391
|
Government Communications Security Bureau
|
1,766
|
56
|
B
|
Low
|
392
|
Physical unclonable function
|
1,764
|
56
|
Start
|
Unknown
|
393
|
Snowflake (software)
|
1,744
|
56
|
Start
|
Low
|
394
|
Four-square cipher
|
1,736
|
56
|
C
|
Unknown
|
395
|
Arthur Scherbius
|
1,719
|
55
|
Start
|
Mid
|
396
|
CBC-MAC
|
1,719
|
55
|
C
|
High
|
397
|
Advanced Access Content System
|
1,716
|
55
|
C
|
Mid
|
398
|
Key stretching
|
1,712
|
55
|
Start
|
Unknown
|
399
|
Cryptanalysis of the Lorenz cipher
|
1,691
|
54
|
C
|
High
|
400
|
Encryption software
|
1,686
|
54
|
Start
|
Top
|
401
|
Chosen-plaintext attack
|
1,678
|
54
|
Stub
|
Unknown
|
402
|
Nihilist cipher
|
1,677
|
54
|
Unknown
|
Unknown
|
403
|
Poly1305
|
1,666
|
53
|
Start
|
Top
|
404
|
Leo Marks
|
1,655
|
53
|
B
|
Unknown
|
405
|
NEO (cryptocurrency)
|
1,653
|
53
|
Start
|
Low
|
406
|
Anonymous P2P
|
1,649
|
53
|
C
|
Low
|
407
|
Proton Drive
|
1,644
|
53
|
Start
|
Low
|
408
|
Dorabella Cipher
|
1,643
|
53
|
Unknown
|
Unknown
|
409
|
Tor2web
|
1,632
|
52
|
Start
|
Low
|
410
|
FreeOTP
|
1,628
|
52
|
Start
|
Low
|
411
|
MD4
|
1,619
|
52
|
Start
|
Low
|
412
|
National Cryptologic Museum
|
1,611
|
51
|
C
|
Mid
|
413
|
Open Whisper Systems
|
1,611
|
51
|
B
|
Unknown
|
414
|
FileVault
|
1,603
|
51
|
C
|
Mid
|
415
|
Meet-in-the-middle attack
|
1,589
|
51
|
C
|
High
|
416
|
Clock drift
|
1,587
|
51
|
C
|
Low
|
417
|
Blum Blum Shub
|
1,585
|
51
|
Start
|
High
|
418
|
Operation Rubicon
|
1,580
|
50
|
C
|
Low
|
419
|
Jami (software)
|
1,571
|
50
|
Start
|
Unknown
|
420
|
Temporal Key Integrity Protocol
|
1,564
|
50
|
C
|
Low
|
421
|
Quahl
|
1,564
|
50
|
C
|
Low
|
422
|
W. T. Tutte
|
1,559
|
50
|
C
|
Mid
|
423
|
Key disclosure law
|
1,557
|
50
|
C
|
Low
|
424
|
Generic Security Services Application Program Interface
|
1,555
|
50
|
Start
|
Low
|
425
|
Advanced Encryption Standard process
|
1,548
|
49
|
C
|
Mid
|
426
|
Two-square cipher
|
1,544
|
49
|
Unknown
|
Unknown
|
427
|
AES implementations
|
1,544
|
49
|
List
|
Low
|
428
|
Pollard's kangaroo algorithm
|
1,533
|
49
|
C
|
Low
|
429
|
Comparison of cryptographic hash functions
|
1,532
|
49
|
List
|
Low
|
430
|
Proof of authority
|
1,526
|
49
|
Start
|
Low
|
431
|
SecureDrop
|
1,525
|
49
|
Start
|
Mid
|
432
|
RSA problem
|
1,521
|
49
|
Start
|
Top
|
433
|
Confusion and diffusion
|
1,518
|
48
|
Start
|
Mid
|
434
|
Challenge-Handshake Authentication Protocol
|
1,471
|
47
|
Start
|
Low
|
435
|
Integrated Encryption Scheme
|
1,471
|
47
|
Start
|
Low
|
436
|
Code (cryptography)
|
1,469
|
47
|
Start
|
Top
|
437
|
Differential cryptanalysis
|
1,468
|
47
|
B
|
High
|
438
|
NTRU
|
1,466
|
47
|
C
|
Low
|
439
|
Opportunistic Wireless Encryption
|
1,458
|
47
|
Stub
|
Low
|
440
|
ZeroNet
|
1,454
|
46
|
Start
|
Low
|
441
|
Peercoin
|
1,445
|
46
|
Stub
|
Low
|
442
|
Tiny Encryption Algorithm
|
1,436
|
46
|
Unknown
|
Unknown
|
443
|
Alberti cipher
|
1,432
|
46
|
C
|
Low
|
444
|
NTRUEncrypt
|
1,429
|
46
|
C
|
Mid
|
445
|
Null cipher
|
1,425
|
45
|
Stub
|
Low
|
446
|
Taher Elgamal
|
1,419
|
45
|
C
|
Unknown
|
447
|
List of cryptographers
|
1,416
|
45
|
List
|
Low
|
448
|
Content Scramble System
|
1,416
|
45
|
Start
|
Mid
|
449
|
Clifford Cocks
|
1,409
|
45
|
C
|
High
|
450
|
Frank Terpil
|
1,409
|
45
|
Start
|
Low
|
451
|
Berlekamp–Massey algorithm
|
1,407
|
45
|
Start
|
Unknown
|
452
|
Collision resistance
|
1,399
|
45
|
Start
|
High
|
453
|
Hybrid cryptosystem
|
1,395
|
45
|
Start
|
High
|
454
|
One-way compression function
|
1,393
|
44
|
C
|
Top
|
455
|
David Wheeler (computer scientist)
|
1,392
|
44
|
C
|
Low
|
456
|
Crypt (C)
|
1,383
|
44
|
C
|
High
|
457
|
Information-theoretic security
|
1,380
|
44
|
Start
|
Top
|
458
|
Blind signature
|
1,378
|
44
|
C
|
Mid
|
459
|
Hash-based cryptography
|
1,378
|
44
|
Start
|
Low
|
460
|
Roger Dingledine
|
1,376
|
44
|
Start
|
Unknown
|
461
|
A5/1
|
1,375
|
44
|
B
|
High
|
462
|
Oblivious transfer
|
1,375
|
44
|
Start
|
Unknown
|
463
|
SIGABA
|
1,364
|
44
|
C
|
High
|
464
|
Twisted Edwards curve
|
1,362
|
43
|
C
|
Low
|
465
|
Secure cryptoprocessor
|
1,357
|
43
|
C
|
Mid
|
466
|
Rotor machine
|
1,348
|
43
|
Unknown
|
Unknown
|
467
|
Max Newman
|
1,332
|
42
|
B
|
Low
|
468
|
Steganographia
|
1,330
|
42
|
Start
|
Low
|
469
|
Proof of space
|
1,330
|
42
|
Start
|
Low
|
470
|
SYN cookies
|
1,321
|
42
|
Start
|
Unknown
|
471
|
Codebook
|
1,320
|
42
|
Stub
|
Unknown
|
472
|
Word square
|
1,315
|
42
|
C
|
Low
|
473
|
Integer factorization records
|
1,312
|
42
|
Start
|
Unknown
|
474
|
RIPEMD
|
1,309
|
42
|
C
|
Unknown
|
475
|
Power analysis
|
1,303
|
42
|
Unknown
|
Unknown
|
476
|
ElGamal signature scheme
|
1,300
|
41
|
Start
|
Top
|
477
|
Zooko's triangle
|
1,299
|
41
|
Start
|
Low
|
478
|
Random oracle
|
1,290
|
41
|
Start
|
Low
|
479
|
Always-on DRM
|
1,288
|
41
|
Start
|
Low
|
480
|
Keybase
|
1,286
|
41
|
Start
|
Low
|
481
|
Kasiski examination
|
1,284
|
41
|
Unknown
|
Unknown
|
482
|
LibreSSL
|
1,279
|
41
|
C
|
High
|
483
|
Texas Instruments signing key controversy
|
1,277
|
41
|
C
|
Low
|
484
|
Music cipher
|
1,267
|
40
|
Unknown
|
Unknown
|
485
|
CableCARD
|
1,266
|
40
|
B
|
Unknown
|
486
|
Beaufort cipher
|
1,262
|
40
|
Start
|
Low
|
487
|
Cipher runes
|
1,258
|
40
|
Start
|
Unknown
|
488
|
One-key MAC
|
1,257
|
40
|
Start
|
Low
|
489
|
Simultaneous Authentication of Equals
|
1,247
|
40
|
Start
|
High
|
490
|
GNUnet
|
1,245
|
40
|
B
|
Low
|
491
|
Supersingular isogeny key exchange
|
1,237
|
39
|
Start
|
Low
|
492
|
Jim Bell
|
1,231
|
39
|
GA
|
Low
|
493
|
Red/black concept
|
1,230
|
39
|
Stub
|
Unknown
|
494
|
Cipher Bureau (Poland)
|
1,229
|
39
|
GA
|
Low
|
495
|
Visual cryptography
|
1,223
|
39
|
Unknown
|
Unknown
|
496
|
Banburismus
|
1,221
|
39
|
C
|
Low
|
497
|
Blaise de Vigenère
|
1,217
|
39
|
Start
|
Unknown
|
498
|
Jefferson disk
|
1,217
|
39
|
Start
|
Unknown
|
499
|
Typex
|
1,213
|
39
|
Start
|
Unknown
|
500
|
Interactive proof system
|
1,208
|
38
|
Start
|
High
|