From Wikipedia, the free encyclopedia
This is a list of pages in the scope of Wikipedia:WikiProject Cryptography along with pageviews.
To report bugs, please write on the Community tech bot talk page on Meta.
Period: 2025-05-01 to 2025-05-31
Total views: 6,035,307
Updated: 13:31, 6 June 2025 (UTC)
Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
WhatsApp
|
611,450
|
19,724
|
B
|
High
|
2
|
Telegram (software)
|
348,226
|
11,233
|
B
|
Mid
|
3
|
Alan Turing
|
206,671
|
6,666
|
GA
|
Top
|
4
|
Bitcoin
|
190,779
|
6,154
|
B
|
High
|
5
|
Voynich manuscript
|
106,739
|
3,443
|
B
|
Low
|
6
|
Cryptocurrency
|
99,136
|
3,197
|
C
|
High
|
7
|
History of bitcoin
|
81,161
|
2,618
|
B
|
Low
|
8
|
The Imitation Game
|
79,373
|
2,560
|
C
|
Mid
|
9
|
WikiLeaks
|
76,564
|
2,469
|
B
|
Low
|
10
|
Tor (network)
|
76,075
|
2,454
|
B
|
Mid
|
11
|
$Trump
|
73,840
|
2,381
|
C
|
Low
|
12
|
Transport Layer Security
|
68,154
|
2,198
|
B
|
Top
|
13
|
National Security Agency
|
63,451
|
2,046
|
C
|
High
|
14
|
Blockchain
|
63,177
|
2,037
|
B
|
High
|
15
|
Signal (software)
|
51,740
|
1,669
|
C
|
Mid
|
16
|
Enigma machine
|
50,275
|
1,621
|
C
|
High
|
17
|
HTTP Strict Transport Security
|
49,575
|
1,599
|
C
|
Low
|
18
|
HTTPS
|
46,883
|
1,512
|
C
|
High
|
19
|
Darknet market
|
42,696
|
1,377
|
B
|
Mid
|
20
|
RSA cryptosystem
|
42,651
|
1,375
|
C
|
Top
|
21
|
Cryptography
|
40,370
|
1,302
|
C
|
Top
|
22
|
Secure Shell
|
39,633
|
1,278
|
C
|
High
|
23
|
Advanced Encryption Standard
|
39,189
|
1,264
|
B
|
Top
|
24
|
Diffie–Hellman key exchange
|
38,991
|
1,257
|
C
|
Top
|
25
|
Dogecoin
|
36,288
|
1,170
|
C
|
Low
|
26
|
Virtual private network
|
34,812
|
1,122
|
C
|
Mid
|
27
|
SHA-2
|
34,240
|
1,104
|
C
|
Top
|
28
|
Changpeng Zhao
|
30,865
|
995
|
Start
|
Low
|
29
|
Claude Shannon
|
29,287
|
944
|
C
|
Top
|
30
|
Public-key cryptography
|
29,123
|
939
|
C
|
Top
|
31
|
Letter frequency
|
28,834
|
930
|
B
|
Low
|
32
|
Information theory
|
28,104
|
906
|
B
|
Top
|
33
|
Grover's algorithm
|
27,200
|
877
|
C
|
Mid
|
34
|
Man-in-the-middle attack
|
26,326
|
849
|
C
|
Mid
|
35
|
Caesar cipher
|
26,279
|
847
|
FA
|
High
|
36
|
Block cipher mode of operation
|
26,075
|
841
|
C
|
Top
|
37
|
Vitalik Buterin
|
25,495
|
822
|
C
|
Low
|
38
|
Phone hacking
|
25,051
|
808
|
Start
|
Mid
|
39
|
Post-quantum cryptography
|
24,603
|
793
|
C
|
High
|
40
|
Bletchley Park
|
24,513
|
790
|
B
|
High
|
41
|
Zimmermann telegram
|
23,981
|
773
|
B
|
High
|
42
|
Vigenère cipher
|
23,936
|
772
|
B
|
Low
|
43
|
Proton Mail
|
23,816
|
768
|
C
|
Low
|
44
|
Joan Clarke
|
23,600
|
761
|
C
|
Mid
|
45
|
Digital signature
|
22,904
|
738
|
C
|
Top
|
46
|
Zero-knowledge proof
|
22,427
|
723
|
C
|
Top
|
47
|
Merkle tree
|
21,023
|
678
|
C
|
Mid
|
48
|
ROT13
|
20,864
|
673
|
C
|
Mid
|
49
|
Pretty Good Privacy
|
20,774
|
670
|
B
|
High
|
50
|
Password
|
20,426
|
658
|
C
|
Top
|
51
|
MD5
|
20,387
|
657
|
C
|
Top
|
52
|
Steganography
|
20,245
|
653
|
C
|
High
|
53
|
Encryption
|
20,160
|
650
|
C
|
Top
|
54
|
Cryptographic hash function
|
19,820
|
639
|
C
|
Top
|
55
|
HMAC
|
19,492
|
628
|
C
|
High
|
56
|
Knapsack problem
|
19,423
|
626
|
C
|
Mid
|
57
|
Code talker
|
19,165
|
618
|
B
|
Low
|
58
|
Public key certificate
|
18,993
|
612
|
C
|
Top
|
59
|
One-time pad
|
18,555
|
598
|
C
|
Top
|
60
|
Elliptic-curve cryptography
|
18,486
|
596
|
C
|
High
|
61
|
Integer factorization
|
17,978
|
579
|
B
|
Mid
|
62
|
Cipher
|
17,961
|
579
|
C
|
Top
|
63
|
GCHQ
|
17,866
|
576
|
B
|
Low
|
64
|
Digital rights management
|
17,750
|
572
|
C
|
High
|
65
|
Sator Square
|
17,609
|
568
|
B
|
Low
|
66
|
NordVPN
|
17,356
|
559
|
C
|
Mid
|
67
|
SHA-1
|
16,977
|
547
|
C
|
Top
|
68
|
Rainbow table
|
16,659
|
537
|
C
|
High
|
69
|
Trusted Platform Module
|
16,483
|
531
|
C
|
Mid
|
70
|
Hashcash
|
15,830
|
510
|
Start
|
Unknown
|
71
|
Information security
|
15,731
|
507
|
B
|
Top
|
72
|
Lavarand
|
15,031
|
484
|
Start
|
Mid
|
73
|
Kryptos
|
14,880
|
480
|
C
|
Low
|
74
|
One-time password
|
14,710
|
474
|
B
|
Mid
|
75
|
Kerberos (protocol)
|
14,598
|
470
|
C
|
High
|
76
|
Cryptanalysis of the Enigma
|
14,113
|
455
|
C
|
Mid
|
77
|
Certificate authority
|
14,101
|
454
|
C
|
High
|
78
|
Wi-Fi Protected Access
|
13,978
|
450
|
C
|
Mid
|
79
|
Salt (cryptography)
|
13,952
|
450
|
Start
|
High
|
80
|
Active Directory
|
13,551
|
437
|
C
|
Low
|
81
|
Automatic Certificate Management Environment
|
13,526
|
436
|
Start
|
Low
|
82
|
Keychain (software)
|
13,488
|
435
|
Start
|
Unknown
|
83
|
Pay television
|
13,417
|
432
|
Start
|
Unknown
|
84
|
Babington Plot
|
13,010
|
419
|
C
|
Low
|
85
|
Mullvad
|
12,891
|
415
|
Start
|
Low
|
86
|
Authentication
|
12,886
|
415
|
C
|
High
|
87
|
Brute-force attack
|
12,452
|
401
|
C
|
High
|
88
|
Bombe
|
12,299
|
396
|
B
|
Mid
|
89
|
Public key infrastructure
|
12,297
|
396
|
C
|
Top
|
90
|
.onion
|
12,276
|
396
|
C
|
Low
|
91
|
VeraCrypt
|
12,129
|
391
|
C
|
Mid
|
92
|
Galois/Counter Mode
|
11,872
|
382
|
C
|
Mid
|
93
|
Ultra (cryptography)
|
11,687
|
377
|
C
|
High
|
94
|
OpenVPN
|
11,540
|
372
|
C
|
Mid
|
95
|
Password manager
|
11,473
|
370
|
C
|
Low
|
96
|
Tails (operating system)
|
11,389
|
367
|
Start
|
Low
|
97
|
Mersenne Twister
|
11,280
|
363
|
C
|
Low
|
98
|
Bcrypt
|
11,233
|
362
|
C
|
Mid
|
99
|
Alice and Bob
|
11,104
|
358
|
Start
|
High
|
100
|
Symmetric-key algorithm
|
10,788
|
348
|
Start
|
Top
|
101
|
OpenSSL
|
10,665
|
344
|
B
|
High
|
102
|
SHA-3
|
10,639
|
343
|
Start
|
Mid
|
103
|
Substitution cipher
|
10,577
|
341
|
Unknown
|
Unknown
|
104
|
Elliptic Curve Digital Signature Algorithm
|
10,527
|
339
|
C
|
High
|
105
|
Vault 7
|
10,170
|
328
|
C
|
Mid
|
106
|
Quantum key distribution
|
10,085
|
325
|
B
|
Mid
|
107
|
Theoretical computer science
|
9,936
|
320
|
B
|
Low
|
108
|
Link 16
|
9,922
|
320
|
Start
|
Low
|
109
|
Bitwarden
|
9,832
|
317
|
C
|
Low
|
110
|
Shiba Inu (cryptocurrency)
|
9,832
|
317
|
Start
|
Low
|
111
|
IMSI-catcher
|
9,751
|
314
|
Start
|
Mid
|
112
|
Cryptanalysis
|
9,681
|
312
|
C
|
High
|
113
|
Colossus computer
|
9,649
|
311
|
B
|
Mid
|
114
|
Adam Back
|
9,618
|
310
|
C
|
Low
|
115
|
Cryptonomicon
|
9,577
|
308
|
C
|
Low
|
116
|
Homomorphic encryption
|
9,533
|
307
|
C
|
High
|
117
|
Birthday attack
|
9,474
|
305
|
C
|
High
|
118
|
Secure Hash Algorithms
|
9,474
|
305
|
Start
|
High
|
119
|
Forward secrecy
|
9,408
|
303
|
C
|
High
|
120
|
Decentralized finance
|
9,338
|
301
|
Start
|
Low
|
121
|
Shamir's secret sharing
|
9,241
|
298
|
C
|
High
|
122
|
SSH File Transfer Protocol
|
9,214
|
297
|
C
|
Low
|
123
|
Cryptographic nonce
|
8,964
|
289
|
Start
|
High
|
124
|
Proof of stake
|
8,916
|
287
|
C
|
Low
|
125
|
I2P
|
8,875
|
286
|
B
|
Low
|
126
|
Message authentication code
|
8,820
|
284
|
C
|
Top
|
127
|
Elliptic-curve Diffie–Hellman
|
8,816
|
284
|
Start
|
Mid
|
128
|
Password strength
|
8,802
|
283
|
C
|
High
|
129
|
Password cracking
|
8,731
|
281
|
C
|
Mid
|
130
|
Fort Meade
|
8,709
|
280
|
C
|
Low
|
131
|
InterPlanetary File System
|
8,601
|
277
|
C
|
Low
|
132
|
Data Encryption Standard
|
8,586
|
276
|
C
|
Top
|
133
|
Authenticated encryption
|
8,565
|
276
|
C
|
Mid
|
134
|
Beale ciphers
|
8,174
|
263
|
B
|
Low
|
135
|
ChaCha20-Poly1305
|
8,139
|
262
|
C
|
Low
|
136
|
Comparison of BitTorrent clients
|
8,093
|
261
|
List
|
Low
|
137
|
PBKDF2
|
7,967
|
257
|
C
|
Low
|
138
|
KeePass
|
7,905
|
255
|
C
|
Low
|
139
|
Matrix (protocol)
|
7,649
|
246
|
Start
|
Unknown
|
140
|
Curve25519
|
7,605
|
245
|
C
|
High
|
141
|
EdDSA
|
7,575
|
244
|
C
|
High
|
142
|
Discrete logarithm
|
7,516
|
242
|
C
|
Mid
|
143
|
Playfair cipher
|
7,469
|
240
|
Unknown
|
Unknown
|
144
|
Litecoin
|
7,295
|
235
|
Start
|
Low
|
145
|
Argon2
|
7,279
|
234
|
C
|
Mid
|
146
|
Stream cipher
|
7,199
|
232
|
Start
|
Top
|
147
|
Quantum cryptography
|
7,106
|
229
|
C
|
High
|
148
|
Differential privacy
|
7,022
|
226
|
C
|
Mid
|
149
|
TrueCrypt
|
6,972
|
224
|
C
|
Mid
|
150
|
Deniable encryption
|
6,920
|
223
|
Start
|
High
|
151
|
Cryptographically secure pseudorandom number generator
|
6,806
|
219
|
C
|
Top
|
152
|
Side-channel attack
|
6,697
|
216
|
C
|
High
|
153
|
Signal Protocol
|
6,637
|
214
|
C
|
High
|
154
|
Hyphanet
|
6,593
|
212
|
B
|
Mid
|
155
|
Bitcoin Cash
|
6,575
|
212
|
Start
|
Low
|
156
|
Lorenz cipher
|
6,503
|
209
|
C
|
Top
|
157
|
Cypherpunk
|
6,489
|
209
|
C
|
Mid
|
158
|
Citizenfour
|
6,451
|
208
|
C
|
Low
|
159
|
Key derivation function
|
6,375
|
205
|
C
|
Low
|
160
|
The Tor Project
|
6,321
|
203
|
C
|
Mid
|
161
|
Digest access authentication
|
6,272
|
202
|
B
|
Low
|
162
|
Block cipher
|
6,222
|
200
|
C
|
Top
|
163
|
Qubes OS
|
6,176
|
199
|
C
|
Mid
|
164
|
Illegal number
|
6,107
|
197
|
C
|
Low
|
165
|
Units of information
|
5,939
|
191
|
C
|
Unknown
|
166
|
Apple–FBI encryption dispute
|
5,881
|
189
|
C
|
Low
|
167
|
Cipher suite
|
5,781
|
186
|
C
|
Top
|
168
|
Conel Hugh O'Donel Alexander
|
5,773
|
186
|
Start
|
Low
|
169
|
Shugborough inscription
|
5,768
|
186
|
Start
|
Low
|
170
|
Cryptogram
|
5,756
|
185
|
C
|
Mid
|
171
|
Quantum network
|
5,691
|
183
|
C
|
Low
|
172
|
Len Sassaman
|
5,669
|
182
|
Start
|
Unknown
|
173
|
XOR cipher
|
5,664
|
182
|
Stub
|
Mid
|
174
|
Certificate signing request
|
5,587
|
180
|
C
|
Low
|
175
|
Kerckhoffs's principle
|
5,525
|
178
|
Start
|
Mid
|
176
|
Transposition cipher
|
5,521
|
178
|
Unknown
|
Unknown
|
177
|
Mutual authentication
|
5,512
|
177
|
Stub
|
Low
|
178
|
Digital renminbi
|
5,506
|
177
|
B
|
High
|
179
|
ElGamal encryption
|
5,486
|
176
|
Start
|
Top
|
180
|
Known-plaintext attack
|
5,425
|
175
|
Start
|
High
|
181
|
Cold boot attack
|
5,413
|
174
|
C
|
Low
|
182
|
Challenge–response authentication
|
5,401
|
174
|
Start
|
Mid
|
183
|
Lattice-based cryptography
|
5,357
|
172
|
Start
|
Low
|
184
|
Triple DES
|
5,296
|
170
|
Start
|
Unknown
|
185
|
GNU Privacy Guard
|
5,266
|
169
|
C
|
Unknown
|
186
|
BLAKE (hash function)
|
5,265
|
169
|
C
|
Mid
|
187
|
Feistel cipher
|
5,251
|
169
|
Start
|
Unknown
|
188
|
RSA Security
|
5,250
|
169
|
C
|
Unknown
|
189
|
NSAKEY
|
5,244
|
169
|
C
|
High
|
190
|
Adi Shamir
|
5,223
|
168
|
C
|
Unknown
|
191
|
Polkadot (blockchain platform)
|
5,223
|
168
|
Start
|
Low
|
192
|
Salsa20
|
5,169
|
166
|
C
|
Top
|
193
|
KeePassXC
|
5,162
|
166
|
Start
|
Low
|
194
|
Session (software)
|
5,149
|
166
|
Start
|
Low
|
195
|
NIST SP 800-90A
|
5,138
|
165
|
C
|
Mid
|
196
|
Padding (cryptography)
|
5,089
|
164
|
Start
|
Unknown
|
197
|
Tap code
|
5,065
|
163
|
Start
|
Low
|
198
|
Bitconnect
|
5,056
|
163
|
C
|
Low
|
199
|
Threema
|
5,020
|
161
|
C
|
Unknown
|
200
|
RC4
|
4,997
|
161
|
B
|
Top
|
201
|
Secure multi-party computation
|
4,987
|
160
|
Start
|
High
|
202
|
Utah Data Center
|
4,980
|
160
|
C
|
Mid
|
203
|
PKCS 12
|
4,920
|
158
|
Start
|
Low
|
204
|
Digital Signature Algorithm
|
4,867
|
157
|
C
|
Top
|
205
|
Key (cryptography)
|
4,840
|
156
|
Start
|
Unknown
|
206
|
Plaintext
|
4,821
|
155
|
Start
|
High
|
207
|
FIPS 140-2
|
4,732
|
152
|
C
|
Mid
|
208
|
Wired Equivalent Privacy
|
4,671
|
150
|
C
|
Mid
|
209
|
Ricky McCormick's encrypted notes
|
4,652
|
150
|
B
|
Low
|
210
|
Replay attack
|
4,651
|
150
|
C
|
Top
|
211
|
Privacy-Enhanced Mail
|
4,625
|
149
|
Start
|
Low
|
212
|
Frequency analysis
|
4,614
|
148
|
C
|
High
|
213
|
Collision attack
|
4,526
|
146
|
Start
|
High
|
214
|
Key size
|
4,489
|
144
|
C
|
High
|
215
|
Crypto-anarchy
|
4,462
|
143
|
Start
|
High
|
216
|
Self-signed certificate
|
4,459
|
143
|
Start
|
Unknown
|
217
|
OpenSSH
|
4,452
|
143
|
C
|
High
|
218
|
Datagram Transport Layer Security
|
4,431
|
142
|
C
|
Mid
|
219
|
One-way function
|
4,414
|
142
|
Start
|
Top
|
220
|
Electronic signature
|
4,384
|
141
|
C
|
Low
|
221
|
11B-X-1371
|
4,384
|
141
|
GA
|
Low
|
222
|
Padding oracle attack
|
4,383
|
141
|
Start
|
Low
|
223
|
Ciphertext
|
4,350
|
140
|
Start
|
High
|
224
|
Lenstra elliptic-curve factorization
|
4,335
|
139
|
C
|
Low
|
225
|
Timing attack
|
4,297
|
138
|
C
|
High
|
226
|
Fork (blockchain)
|
4,293
|
138
|
Start
|
Mid
|
227
|
Key exchange
|
4,249
|
137
|
Start
|
Unknown
|
228
|
AES instruction set
|
4,209
|
135
|
C
|
Low
|
229
|
Marian Rejewski
|
4,180
|
134
|
FA
|
Mid
|
230
|
Disk encryption
|
4,135
|
133
|
C
|
High
|
231
|
Initialization vector
|
4,105
|
132
|
C
|
High
|
232
|
Harvest now, decrypt later
|
4,100
|
132
|
Start
|
Low
|
233
|
Commitment scheme
|
4,074
|
131
|
C
|
High
|
234
|
Polybius square
|
4,056
|
130
|
Start
|
Mid
|
235
|
Keygen
|
4,041
|
130
|
C
|
Low
|
236
|
Root certificate
|
4,037
|
130
|
Start
|
Low
|
237
|
Bruce Schneier
|
4,023
|
129
|
Start
|
High
|
238
|
Dictionary attack
|
4,016
|
129
|
C
|
Unknown
|
239
|
Digital watermarking
|
4,005
|
129
|
B
|
Mid
|
240
|
Diplomatic bag
|
4,002
|
129
|
Start
|
Low
|
241
|
Confidentiality
|
4,001
|
129
|
C
|
Low
|
242
|
Peter Todd (programmer)
|
3,991
|
128
|
Start
|
Unknown
|
243
|
Type B Cipher Machine
|
3,963
|
127
|
Start
|
Low
|
244
|
Blowfish (cipher)
|
3,961
|
127
|
B
|
High
|
245
|
Web of trust
|
3,939
|
127
|
C
|
High
|
246
|
Length extension attack
|
3,909
|
126
|
Start
|
Unknown
|
247
|
Preimage attack
|
3,882
|
125
|
Stub
|
Unknown
|
248
|
Book cipher
|
3,853
|
124
|
C
|
Low
|
249
|
Code signing
|
3,843
|
123
|
C
|
Low
|
250
|
Rijndael S-box
|
3,836
|
123
|
Start
|
Low
|
251
|
David Chaum
|
3,771
|
121
|
C
|
Low
|
252
|
NIST Post-Quantum Cryptography Standardization
|
3,726
|
120
|
C
|
Mid
|
253
|
Disk encryption theory
|
3,716
|
119
|
C
|
Unknown
|
254
|
Bomba (cryptography)
|
3,713
|
119
|
Start
|
Low
|
255
|
Polyalphabetic cipher
|
3,706
|
119
|
Start
|
Unknown
|
256
|
Non-interactive zero-knowledge proof
|
3,670
|
118
|
Start
|
Low
|
257
|
Clipper chip
|
3,656
|
117
|
C
|
High
|
258
|
SipHash
|
3,649
|
117
|
Start
|
Low
|
259
|
Bacon's cipher
|
3,640
|
117
|
Start
|
Low
|
260
|
History of cryptography
|
3,634
|
117
|
C
|
High
|
261
|
Magic (cryptography)
|
3,623
|
116
|
Start
|
Unknown
|
262
|
Cryptocurrency tumbler
|
3,618
|
116
|
Start
|
Unknown
|
263
|
Communications Security Establishment
|
3,610
|
116
|
C
|
Mid
|
264
|
Merkle–Damgård construction
|
3,609
|
116
|
C
|
Unknown
|
265
|
Boolean function
|
3,596
|
116
|
Start
|
Mid
|
266
|
RSA SecurID
|
3,582
|
115
|
C
|
Low
|
267
|
Dual EC DRBG
|
3,579
|
115
|
C
|
High
|
268
|
The Doughnut
|
3,576
|
115
|
GA
|
High
|
269
|
RSA Factoring Challenge
|
3,538
|
114
|
Start
|
Low
|
270
|
BB84
|
3,517
|
113
|
Start
|
Low
|
271
|
Elliptic curve point multiplication
|
3,483
|
112
|
C
|
Mid
|
272
|
Elizebeth Smith Friedman
|
3,471
|
111
|
C
|
Mid
|
273
|
PKCS
|
3,461
|
111
|
List
|
High
|
274
|
3-D Secure
|
3,433
|
110
|
Start
|
Low
|
275
|
Atbash
|
3,432
|
110
|
Stub
|
Low
|
276
|
Certificate revocation list
|
3,416
|
110
|
C
|
Low
|
277
|
Key stretching
|
3,410
|
110
|
Start
|
Unknown
|
278
|
Trusted Computing
|
3,403
|
109
|
C
|
Mid
|
279
|
List of ciphertexts
|
3,346
|
107
|
List
|
Low
|
280
|
Directory service
|
3,344
|
107
|
Start
|
Mid
|
281
|
Hill cipher
|
3,326
|
107
|
Unknown
|
Unknown
|
282
|
Daniel J. Bernstein
|
3,324
|
107
|
C
|
Mid
|
283
|
List of bitcoin forks
|
3,303
|
106
|
List
|
Low
|
284
|
Dilly Knox
|
3,280
|
105
|
B
|
Unknown
|
285
|
Encryption software
|
3,266
|
105
|
Start
|
Top
|
286
|
Richard Teng
|
3,266
|
105
|
Start
|
Low
|
287
|
Australian Signals Directorate
|
3,254
|
104
|
C
|
Low
|
288
|
Bitcoin Core
|
3,243
|
104
|
Start
|
Low
|
289
|
S-box
|
3,216
|
103
|
Start
|
Top
|
290
|
Integer factorization records
|
3,209
|
103
|
Start
|
Unknown
|
291
|
Scrambler
|
3,201
|
103
|
C
|
Unknown
|
292
|
Blockchain game
|
3,194
|
103
|
Start
|
Low
|
293
|
Affine cipher
|
3,173
|
102
|
C
|
Low
|
294
|
Crypto AG
|
3,160
|
101
|
C
|
High
|
295
|
Double Ratchet Algorithm
|
3,130
|
100
|
Start
|
Low
|
296
|
Bitcoin scalability problem
|
3,113
|
100
|
C
|
Low
|
297
|
Rail fence cipher
|
3,110
|
100
|
Start
|
Low
|
298
|
HKDF
|
3,102
|
100
|
Start
|
Unknown
|
299
|
XiaoFeng Wang (computer scientist)
|
3,089
|
99
|
C
|
Unknown
|
300
|
Non-repudiation
|
3,062
|
98
|
Start
|
Mid
|
301
|
Pepper (cryptography)
|
3,058
|
98
|
Start
|
Low
|
302
|
Algorand
|
3,041
|
98
|
B
|
Low
|
303
|
PKCS 11
|
3,033
|
97
|
Unknown
|
Unknown
|
304
|
DNS Certification Authority Authorization
|
3,011
|
97
|
GA
|
Low
|
305
|
Code (cryptography)
|
2,998
|
96
|
Start
|
Top
|
306
|
Avalanche effect
|
2,950
|
95
|
Start
|
High
|
307
|
Classical cipher
|
2,937
|
94
|
Start
|
Top
|
308
|
Whonix
|
2,920
|
94
|
Start
|
Mid
|
309
|
SegWit
|
2,899
|
93
|
Start
|
Low
|
310
|
Physical unclonable function
|
2,896
|
93
|
Start
|
Unknown
|
311
|
W. T. Tutte
|
2,869
|
92
|
C
|
Mid
|
312
|
Export of cryptography from the United States
|
2,862
|
92
|
C
|
Unknown
|
313
|
Hash chain
|
2,862
|
92
|
Start
|
Unknown
|
314
|
Phil Zimmermann
|
2,861
|
92
|
Start
|
Mid
|
315
|
Special Collection Service
|
2,854
|
92
|
C
|
Low
|
316
|
Secret sharing
|
2,840
|
91
|
C
|
High
|
317
|
Random oracle
|
2,826
|
91
|
Start
|
Low
|
318
|
K-anonymity
|
2,814
|
90
|
Start
|
Mid
|
319
|
Tor2web
|
2,813
|
90
|
Start
|
Low
|
320
|
Key encapsulation mechanism
|
2,797
|
90
|
Start
|
High
|
321
|
Clock drift
|
2,792
|
90
|
C
|
Low
|
322
|
Supply chain attack
|
2,784
|
89
|
C
|
Low
|
323
|
Gordon Welchman
|
2,769
|
89
|
C
|
Low
|
324
|
McEliece cryptosystem
|
2,755
|
88
|
C
|
High
|
325
|
Certificate Transparency
|
2,748
|
88
|
C
|
High
|
326
|
AES key schedule
|
2,741
|
88
|
Start
|
Low
|
327
|
Comparison of cryptography libraries
|
2,721
|
87
|
List
|
Unknown
|
328
|
Whitfield Diffie
|
2,720
|
87
|
B
|
High
|
329
|
I. J. Good
|
2,669
|
86
|
C
|
Low
|
330
|
Zcash
|
2,656
|
85
|
Start
|
Low
|
331
|
Schnorr signature
|
2,651
|
85
|
C
|
High
|
332
|
Alastair Denniston
|
2,649
|
85
|
Start
|
Unknown
|
333
|
PKCS 1
|
2,639
|
85
|
C
|
Mid
|
334
|
Security level
|
2,635
|
85
|
Stub
|
Mid
|
335
|
Rotor machine
|
2,623
|
84
|
Unknown
|
Unknown
|
336
|
Interactive proof system
|
2,621
|
84
|
Start
|
High
|
337
|
Trapdoor function
|
2,589
|
83
|
Start
|
High
|
338
|
Jami (software)
|
2,584
|
83
|
Start
|
Unknown
|
339
|
Crypt (C)
|
2,570
|
82
|
C
|
High
|
340
|
Cryptographic protocol
|
2,564
|
82
|
Start
|
High
|
341
|
Autokey cipher
|
2,563
|
82
|
C
|
Mid
|
342
|
Mumble (software)
|
2,556
|
82
|
C
|
Unknown
|
343
|
Key disclosure law
|
2,554
|
82
|
C
|
Low
|
344
|
PKCS 7
|
2,550
|
82
|
Start
|
Low
|
345
|
SM4 (cipher)
|
2,534
|
81
|
Start
|
Low
|
346
|
Off-the-record messaging
|
2,514
|
81
|
Start
|
Unknown
|
347
|
Mix network
|
2,441
|
78
|
C
|
Low
|
348
|
Chosen-plaintext attack
|
2,430
|
78
|
Stub
|
Unknown
|
349
|
Confusion and diffusion
|
2,429
|
78
|
Start
|
Mid
|
350
|
Jefferson disk
|
2,419
|
78
|
Start
|
Unknown
|
351
|
Proof of authority
|
2,409
|
77
|
Start
|
Low
|
352
|
Nothing-up-my-sleeve number
|
2,393
|
77
|
C
|
Low
|
353
|
Authenticator
|
2,348
|
75
|
B
|
Low
|
354
|
Optimal asymmetric encryption padding
|
2,346
|
75
|
Start
|
High
|
355
|
SecureDrop
|
2,346
|
75
|
Start
|
Mid
|
356
|
Cryptographic primitive
|
2,334
|
75
|
Start
|
Top
|
357
|
FIPS 140
|
2,333
|
75
|
Start
|
Mid
|
358
|
Copiale cipher
|
2,308
|
74
|
Start
|
Low
|
359
|
ADFGVX cipher
|
2,303
|
74
|
Unknown
|
Unknown
|
360
|
Collision resistance
|
2,302
|
74
|
Start
|
High
|
361
|
PKCS 8
|
2,302
|
74
|
Stub
|
Unknown
|
362
|
One-way compression function
|
2,295
|
74
|
C
|
Top
|
363
|
Proof of space
|
2,255
|
72
|
Start
|
Low
|
364
|
Multiple encryption
|
2,243
|
72
|
Unknown
|
Unknown
|
365
|
Opportunistic TLS
|
2,236
|
72
|
Start
|
Mid
|
366
|
Charlie Lee (computer scientist)
|
2,212
|
71
|
Start
|
Low
|
367
|
Hidden message
|
2,203
|
71
|
Start
|
Low
|
368
|
Proton Drive
|
2,200
|
70
|
Start
|
Low
|
369
|
William Binney (intelligence official)
|
2,199
|
70
|
C
|
Mid
|
370
|
IEEE 802.11i-2004
|
2,197
|
70
|
C
|
Mid
|
371
|
VIC cipher
|
2,187
|
70
|
C
|
Low
|
372
|
Tox (protocol)
|
2,185
|
70
|
C
|
Low
|
373
|
Ralph Merkle
|
2,181
|
70
|
C
|
High
|
374
|
Pseudorandom function family
|
2,175
|
70
|
Start
|
Low
|
375
|
Blind signature
|
2,167
|
69
|
C
|
Mid
|
376
|
FIPS 140-3
|
2,156
|
69
|
C
|
Low
|
377
|
Tabula recta
|
2,154
|
69
|
Unknown
|
Unknown
|
378
|
Filecoin
|
2,147
|
69
|
Start
|
Low
|
379
|
Public key fingerprint
|
2,131
|
68
|
Start
|
Mid
|
380
|
Entrust
|
2,130
|
68
|
Start
|
Low
|
381
|
CCM mode
|
2,120
|
68
|
Start
|
High
|
382
|
Baby-step giant-step
|
2,116
|
68
|
C
|
Unknown
|
383
|
Leo Marks
|
2,115
|
68
|
B
|
Unknown
|
384
|
Diehard tests
|
2,111
|
68
|
C
|
Low
|
385
|
Information-theoretic security
|
2,108
|
68
|
Start
|
Top
|
386
|
William F. Friedman
|
2,105
|
67
|
C
|
Unknown
|
387
|
Four-square cipher
|
2,105
|
67
|
C
|
Unknown
|
388
|
Cryptome
|
2,089
|
67
|
C
|
Low
|
389
|
Format-preserving encryption
|
2,081
|
67
|
Start
|
High
|
390
|
Ciphertext indistinguishability
|
2,079
|
67
|
C
|
High
|
391
|
Communications security
|
2,076
|
66
|
Start
|
Mid
|
392
|
Martin Hellman
|
2,073
|
66
|
Start
|
High
|
393
|
Comparison of SSH clients
|
2,072
|
66
|
List
|
Low
|
394
|
Dm-crypt
|
2,071
|
66
|
Start
|
Low
|
395
|
Key server (cryptographic)
|
2,063
|
66
|
Start
|
Mid
|
396
|
Kasiski examination
|
2,055
|
66
|
Unknown
|
Unknown
|
397
|
DNS-based Authentication of Named Entities
|
2,041
|
65
|
C
|
Mid
|
398
|
Supersingular isogeny key exchange
|
2,025
|
65
|
Start
|
Low
|
399
|
Shared secret
|
2,023
|
65
|
Stub
|
High
|
400
|
Briar (software)
|
2,020
|
65
|
Start
|
Low
|
401
|
BusKill
|
2,014
|
64
|
Start
|
Low
|
402
|
Twofish
|
2,010
|
64
|
Start
|
High
|
403
|
Comparison of disk encryption software
|
1,996
|
64
|
List
|
High
|
404
|
Wildcard certificate
|
1,994
|
64
|
Redirect
|
NA
|
405
|
CBC-MAC
|
1,986
|
64
|
C
|
High
|
406
|
Cryptanalysis of the Lorenz cipher
|
1,983
|
63
|
C
|
High
|
407
|
Trusted timestamping
|
1,977
|
63
|
Start
|
Unknown
|
408
|
Data anonymization
|
1,974
|
63
|
Start
|
Mid
|
409
|
Data at rest
|
1,969
|
63
|
C
|
Mid
|
410
|
National Cryptologic Museum
|
1,964
|
63
|
C
|
Mid
|
411
|
Bouncy Castle (cryptography)
|
1,959
|
63
|
Start
|
Unknown
|
412
|
Berlekamp–Massey algorithm
|
1,952
|
62
|
Start
|
Unknown
|
413
|
Black Chamber
|
1,940
|
62
|
Unknown
|
Unknown
|
414
|
Pre-shared key
|
1,928
|
62
|
Start
|
Mid
|
415
|
Banburismus
|
1,923
|
62
|
C
|
Low
|
416
|
Bullrun (decryption program)
|
1,916
|
61
|
B
|
Low
|
417
|
Sponge function
|
1,907
|
61
|
Unknown
|
Unknown
|
418
|
Patricia Davies (codebreaker)
|
1,901
|
61
|
B
|
Unknown
|
419
|
DeCSS
|
1,874
|
60
|
C
|
Mid
|
420
|
Hybrid cryptosystem
|
1,873
|
60
|
Start
|
High
|
421
|
Always-on DRM
|
1,873
|
60
|
Start
|
Low
|
422
|
Musical cryptogram
|
1,869
|
60
|
C
|
Low
|
423
|
SIGSALY
|
1,864
|
60
|
C
|
Low
|
424
|
Reception and criticism of WhatsApp security and privacy features
|
1,863
|
60
|
C
|
Low
|
425
|
Great Cipher
|
1,855
|
59
|
Start
|
Mid
|
426
|
Cipher Bureau (Poland)
|
1,843
|
59
|
GA
|
Low
|
427
|
UltraViolet (website)
|
1,843
|
59
|
C
|
Low
|
428
|
Email privacy
|
1,835
|
59
|
C
|
Low
|
429
|
Bitcoin Gold
|
1,834
|
59
|
Start
|
Low
|
430
|
SIGABA
|
1,831
|
59
|
C
|
High
|
431
|
Alberti cipher
|
1,822
|
58
|
C
|
Low
|
432
|
Secure cryptoprocessor
|
1,813
|
58
|
C
|
Mid
|
433
|
Codebook
|
1,804
|
58
|
Stub
|
Unknown
|
434
|
David Wheeler (computer scientist)
|
1,803
|
58
|
C
|
Low
|
435
|
Paillier cryptosystem
|
1,799
|
58
|
Start
|
High
|
436
|
Poly1305
|
1,799
|
58
|
Start
|
Top
|
437
|
Rubber-hose cryptanalysis
|
1,790
|
57
|
Redirect
|
Low
|
438
|
A5/1
|
1,786
|
57
|
B
|
High
|
439
|
Beaufort cipher
|
1,778
|
57
|
Start
|
Low
|
440
|
Comparison of TLS implementations
|
1,778
|
57
|
List
|
High
|
441
|
HTTP Public Key Pinning
|
1,773
|
57
|
C
|
Mid
|
442
|
Crypto Wars
|
1,765
|
56
|
Start
|
High
|
443
|
Crypto-shredding
|
1,750
|
56
|
Start
|
Unknown
|
444
|
Null cipher
|
1,747
|
56
|
Stub
|
Low
|
445
|
Arthur Scherbius
|
1,742
|
56
|
Start
|
Mid
|
446
|
Strong cryptography
|
1,741
|
56
|
Unknown
|
Unknown
|
447
|
Lamport signature
|
1,728
|
55
|
Start
|
High
|
448
|
BLS digital signature
|
1,727
|
55
|
Start
|
Mid
|
449
|
Government Communications Security Bureau
|
1,722
|
55
|
B
|
Low
|
450
|
Random number generator attack
|
1,712
|
55
|
C
|
Unknown
|
451
|
Differential cryptanalysis
|
1,704
|
54
|
B
|
High
|
452
|
Jim Bell
|
1,694
|
54
|
GA
|
Low
|
453
|
Downgrade attack
|
1,687
|
54
|
Start
|
Mid
|
454
|
Anonymous P2P
|
1,684
|
54
|
C
|
Low
|
455
|
Snake oil (cryptography)
|
1,679
|
54
|
Unknown
|
Unknown
|
456
|
Encrypting File System
|
1,675
|
54
|
B
|
Unknown
|
457
|
Advanced Access Content System
|
1,658
|
53
|
C
|
Mid
|
458
|
PGP word list
|
1,653
|
53
|
Start
|
Low
|
459
|
Taher Elgamal
|
1,647
|
53
|
C
|
Unknown
|
460
|
Typex
|
1,636
|
52
|
Start
|
Unknown
|
461
|
Dorabella Cipher
|
1,624
|
52
|
Unknown
|
Unknown
|
462
|
Whirlpool (hash function)
|
1,622
|
52
|
Start
|
Low
|
463
|
Visual cryptography
|
1,605
|
51
|
Unknown
|
Unknown
|
464
|
Kleptography
|
1,602
|
51
|
Start
|
Low
|
465
|
Enigma rotor details
|
1,589
|
51
|
Start
|
Mid
|
466
|
Open Whisper Systems
|
1,587
|
51
|
B
|
Unknown
|
467
|
The Alphabet Cipher
|
1,584
|
51
|
Unknown
|
Unknown
|
468
|
MD4
|
1,567
|
50
|
Start
|
Low
|
469
|
Rijndael MixColumns
|
1,560
|
50
|
Start
|
Low
|
470
|
Power analysis
|
1,558
|
50
|
Unknown
|
Unknown
|
471
|
Meet-in-the-middle attack
|
1,554
|
50
|
C
|
High
|
472
|
WebTorrent
|
1,547
|
49
|
Start
|
Unknown
|
473
|
NSA encryption systems
|
1,545
|
49
|
C
|
Mid
|
474
|
Nyctography
|
1,543
|
49
|
Unknown
|
Unknown
|
475
|
Station HYPO
|
1,542
|
49
|
Start
|
Low
|
476
|
Tiny Encryption Algorithm
|
1,539
|
49
|
Unknown
|
Unknown
|
477
|
Network Security Services
|
1,534
|
49
|
C
|
High
|
478
|
BTCC (company)
|
1,533
|
49
|
Start
|
Low
|
479
|
Michael O. Rabin
|
1,522
|
49
|
C
|
Low
|
480
|
Word square
|
1,515
|
48
|
C
|
Low
|
481
|
Red/black concept
|
1,514
|
48
|
Stub
|
Unknown
|
482
|
Keybase
|
1,510
|
48
|
Start
|
Low
|
483
|
M-209
|
1,508
|
48
|
Start
|
Unknown
|
484
|
CableCARD
|
1,503
|
48
|
B
|
Unknown
|
485
|
Clifford Cocks
|
1,500
|
48
|
C
|
High
|
486
|
Pollard's kangaroo algorithm
|
1,493
|
48
|
C
|
Low
|
487
|
Ross J. Anderson
|
1,490
|
48
|
C
|
Mid
|
488
|
GNUnet
|
1,482
|
47
|
B
|
Low
|
489
|
FreeOTP
|
1,472
|
47
|
Start
|
Low
|
490
|
Coppersmith's attack
|
1,468
|
47
|
B
|
High
|
491
|
Cryptovirology
|
1,464
|
47
|
Start
|
Mid
|
492
|
Coinye
|
1,459
|
47
|
Start
|
Low
|
493
|
Hardware-based full disk encryption
|
1,456
|
46
|
Start
|
Mid
|
494
|
Grille (cryptography)
|
1,455
|
46
|
C
|
Mid
|
495
|
Disk encryption software
|
1,441
|
46
|
C
|
Mid
|
496
|
Secret decoder ring
|
1,437
|
46
|
Start
|
Low
|
497
|
Comparison of cryptographic hash functions
|
1,421
|
45
|
List
|
Low
|
498
|
Needham–Schroeder protocol
|
1,420
|
45
|
Start
|
Mid
|
499
|
Key management
|
1,409
|
45
|
Unknown
|
Unknown
|
500
|
Robert Morris (cryptographer)
|
1,407
|
45
|
Stub
|
Low
|