Cryptography for the Internet

At the bottom of every page are links to the pages that most obviously follow the current page. Clicking on 'Forward' each time is recommended - this takes you on a chronological tour of cryptography. There are also some links in the text on some pages - some of these are a way of jumping the normal order of pages; others are effectively appendices and can be viewed if you wish.

Every page is linked to by this contents page, and you can return here by clicking on the link in the top right-hand corner of every page.

Contents

The Past:

The Start of Cryptography, and the Start of the Problems of Secrecy
Transposition
Substitution
The Vigenère Cypher
Enigma

The Present

The Present
Modern Cryptography
Symmetric Cyphers
  • DES
  • 3DES
  • IDEA
  • 3IDEA
  • Other Symmetric Cyphers
    Asymmetric Cyphers
  • Diffie-Hellman
  • RSA
  • Other Asymmetric Cyphers
  • Modular Arithmetic
  • Factoring Into Prime Numbers
    Pretty Good Privacy (PGP)
  • Who Should Use Cryptography?

    The Future

    Quantum Cryptography

    Problems

    Summary

    References




    Back to the town of Wurck
    Forward - Stenography