<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-GB">
	<id>https://www.smithnet.org.uk/wiki/index.php?action=history&amp;feed=atom&amp;title=Cryptography_Design_and_Implementation</id>
	<title>Cryptography Design and Implementation - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.smithnet.org.uk/wiki/index.php?action=history&amp;feed=atom&amp;title=Cryptography_Design_and_Implementation"/>
	<link rel="alternate" type="text/html" href="https://www.smithnet.org.uk/wiki/index.php?title=Cryptography_Design_and_Implementation&amp;action=history"/>
	<updated>2026-04-08T10:35:15Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>https://www.smithnet.org.uk/wiki/index.php?title=Cryptography_Design_and_Implementation&amp;diff=21&amp;oldid=prev</id>
		<title>NickPGSmith: 2 revisions imported</title>
		<link rel="alternate" type="text/html" href="https://www.smithnet.org.uk/wiki/index.php?title=Cryptography_Design_and_Implementation&amp;diff=21&amp;oldid=prev"/>
		<updated>2024-05-08T04:53:32Z</updated>

		<summary type="html">&lt;p&gt;2 revisions imported&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en-GB&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 04:53, 8 May 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;4&quot; class=&quot;diff-notice&quot; lang=&quot;en-GB&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff cache key wiki-wiki-:diff:1.41:old-20:rev-21 --&gt;
&lt;/table&gt;</summary>
		<author><name>NickPGSmith</name></author>
	</entry>
	<entry>
		<id>https://www.smithnet.org.uk/wiki/index.php?title=Cryptography_Design_and_Implementation&amp;diff=20&amp;oldid=prev</id>
		<title>NickPGSmith: 1 revision imported</title>
		<link rel="alternate" type="text/html" href="https://www.smithnet.org.uk/wiki/index.php?title=Cryptography_Design_and_Implementation&amp;diff=20&amp;oldid=prev"/>
		<updated>2023-02-17T21:02:04Z</updated>

		<summary type="html">&lt;p&gt;1 revision imported&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en-GB&quot;&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:02, 17 February 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-notice&quot; lang=&quot;en-GB&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;</summary>
		<author><name>NickPGSmith</name></author>
	</entry>
	<entry>
		<id>https://www.smithnet.org.uk/wiki/index.php?title=Cryptography_Design_and_Implementation&amp;diff=19&amp;oldid=prev</id>
		<title>NickPGSmith: /* Elliptic-curve and quantum cryptography */</title>
		<link rel="alternate" type="text/html" href="https://www.smithnet.org.uk/wiki/index.php?title=Cryptography_Design_and_Implementation&amp;diff=19&amp;oldid=prev"/>
		<updated>2021-12-31T09:40:51Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Elliptic-curve and quantum cryptography&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Encryption ==&lt;br /&gt;
&lt;br /&gt;
=== Understanding encryption ===&lt;br /&gt;
&lt;br /&gt;
=== Symmetric and asymmetric encryption ===&lt;br /&gt;
&lt;br /&gt;
=== Goals of cryptography ===&lt;br /&gt;
&lt;br /&gt;
=== Codes and cyphers ===&lt;br /&gt;
&lt;br /&gt;
=== Cryptographic math ===&lt;br /&gt;
&lt;br /&gt;
=== Choosing encryption algorithms ===&lt;br /&gt;
&lt;br /&gt;
=== The perfect encryption algorithm ===&lt;br /&gt;
&lt;br /&gt;
=== The cryptographic lifecycle ===&lt;br /&gt;
&lt;br /&gt;
== Symmetric Cryptography ==&lt;br /&gt;
&lt;br /&gt;
=== Data Encryption Standard (DES) ===&lt;br /&gt;
&lt;br /&gt;
=== 3DES ===&lt;br /&gt;
&lt;br /&gt;
=== AES, blowfish, twofish ===&lt;br /&gt;
&lt;br /&gt;
=== RC4 ===&lt;br /&gt;
&lt;br /&gt;
=== Cypher modes ===&lt;br /&gt;
&lt;br /&gt;
=== Steganography ===&lt;br /&gt;
&lt;br /&gt;
== Asymmetric Cryptography ==&lt;br /&gt;
&lt;br /&gt;
=== Rivest, Shamir, Adelman (RSA) ===&lt;br /&gt;
&lt;br /&gt;
=== PGP and GnuPG ===&lt;br /&gt;
&lt;br /&gt;
=== Elliptic-curve and quantum cryptography ===&lt;br /&gt;
&lt;br /&gt;
== Key Management ==&lt;br /&gt;
&lt;br /&gt;
=== Key exchange ===&lt;br /&gt;
&lt;br /&gt;
=== Diffie-Hellman ===&lt;br /&gt;
&lt;br /&gt;
=== Key escrow ===&lt;br /&gt;
&lt;br /&gt;
=== Key stretching ===&lt;br /&gt;
&lt;br /&gt;
=== Hardware security modules ===&lt;br /&gt;
&lt;br /&gt;
== Public Key Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
=== Trust models ===&lt;br /&gt;
&lt;br /&gt;
=== PKI and digital certificates ===&lt;br /&gt;
&lt;br /&gt;
=== Hash functions ===&lt;br /&gt;
&lt;br /&gt;
=== Digital signatures ===&lt;br /&gt;
&lt;br /&gt;
=== Digital Signature standard ===&lt;br /&gt;
&lt;br /&gt;
=== Create a digital certificate ===&lt;br /&gt;
&lt;br /&gt;
=== Revoke a digital certificate ===&lt;br /&gt;
&lt;br /&gt;
=== Certificate stapling ===&lt;br /&gt;
&lt;br /&gt;
=== Certificate authorities ===&lt;br /&gt;
&lt;br /&gt;
=== Certificate subjects ===&lt;br /&gt;
&lt;br /&gt;
=== Certificate types ===&lt;br /&gt;
&lt;br /&gt;
=== Certificate formats ===&lt;br /&gt;
&lt;br /&gt;
== Cryptanalytic Attacks ==&lt;br /&gt;
&lt;br /&gt;
=== Brute force attacks ===&lt;br /&gt;
&lt;br /&gt;
=== Knowledge-based attacks ===&lt;br /&gt;
&lt;br /&gt;
=== Limitations of encryption algorithms ===&lt;br /&gt;
&lt;br /&gt;
== Cryptographic Applications ==&lt;br /&gt;
&lt;br /&gt;
=== TLS and SSL ===&lt;br /&gt;
&lt;br /&gt;
=== Information rights management ===&lt;br /&gt;
&lt;br /&gt;
=== Specialised use cases ===&lt;br /&gt;
&lt;br /&gt;
=== Blockchain ===&lt;/div&gt;</summary>
		<author><name>NickPGSmith</name></author>
	</entry>
</feed>