Rank
|
Page title
|
Views
|
Daily average
|
Assessment
|
Importance
|
1
|
WhatsApp
|
707,906
|
22,835
|
B
|
High
|
2
|
Telegram (software)
|
564,388
|
18,206
|
B
|
Mid
|
3
|
Alan Turing
|
158,500
|
5,112
|
GA
|
Top
|
4
|
Bitcoin
|
147,997
|
4,774
|
B
|
High
|
5
|
WikiLeaks
|
114,577
|
3,696
|
B
|
Low
|
6
|
Cryptocurrency
|
110,226
|
3,555
|
C
|
High
|
7
|
Voynich manuscript
|
109,855
|
3,543
|
B
|
Low
|
8
|
Tor (network)
|
97,334
|
3,139
|
B
|
Mid
|
9
|
The Imitation Game
|
86,793
|
2,799
|
C
|
Mid
|
10
|
Signal (software)
|
72,022
|
2,323
|
C
|
Mid
|
11
|
Transport Layer Security
|
65,787
|
2,122
|
B
|
Top
|
12
|
Blockchain
|
61,977
|
1,999
|
B
|
High
|
13
|
National Security Agency
|
59,962
|
1,934
|
C
|
High
|
14
|
HTTPS
|
56,257
|
1,814
|
C
|
High
|
15
|
Enigma machine
|
46,516
|
1,500
|
C
|
High
|
16
|
Virtual private network
|
45,920
|
1,481
|
C
|
Mid
|
17
|
RSA (cryptosystem)
|
42,134
|
1,359
|
C
|
Top
|
18
|
HTTP Strict Transport Security
|
41,841
|
1,349
|
C
|
Low
|
19
|
Changpeng Zhao
|
41,743
|
1,346
|
Start
|
Low
|
20
|
Advanced Encryption Standard
|
38,917
|
1,255
|
B
|
Top
|
21
|
Diffie–Hellman key exchange
|
38,273
|
1,234
|
C
|
Top
|
22
|
Cryptography
|
37,125
|
1,197
|
C
|
Top
|
23
|
Secure Shell
|
36,140
|
1,165
|
C
|
High
|
24
|
Caesar cipher
|
35,650
|
1,150
|
FA
|
High
|
25
|
SHA-2
|
35,328
|
1,139
|
C
|
Top
|
26
|
History of bitcoin
|
34,260
|
1,105
|
C
|
Low
|
27
|
Darknet market
|
31,237
|
1,007
|
B
|
Mid
|
28
|
Public-key cryptography
|
30,753
|
992
|
C
|
Top
|
29
|
Vigenère cipher
|
30,170
|
973
|
B
|
Low
|
30
|
Dogecoin
|
29,055
|
937
|
C
|
Low
|
31
|
Vitalik Buterin
|
26,512
|
855
|
C
|
Low
|
32
|
Block cipher mode of operation
|
26,141
|
843
|
C
|
Top
|
33
|
MD5
|
26,080
|
841
|
C
|
Top
|
34
|
Man-in-the-middle attack
|
25,586
|
825
|
C
|
Mid
|
35
|
Joan Clarke
|
25,343
|
817
|
C
|
Mid
|
36
|
Alice and Bob
|
24,911
|
803
|
Start
|
High
|
37
|
Keychain (software)
|
24,323
|
784
|
Start
|
Unknown
|
38
|
Vault 7
|
24,080
|
776
|
C
|
Mid
|
39
|
Steganography
|
23,963
|
773
|
B
|
High
|
40
|
Zimmermann telegram
|
23,766
|
766
|
B
|
High
|
41
|
GCHQ
|
23,669
|
763
|
B
|
Low
|
42
|
Password
|
22,823
|
736
|
C
|
Top
|
43
|
Information theory
|
22,686
|
731
|
B
|
Top
|
44
|
Proton Mail
|
22,482
|
725
|
C
|
Low
|
45
|
HMAC
|
22,458
|
724
|
C
|
High
|
46
|
Claude Shannon
|
22,224
|
716
|
C
|
Top
|
47
|
Digital signature
|
22,133
|
713
|
C
|
Top
|
48
|
Active Directory
|
21,574
|
695
|
C
|
Low
|
49
|
Cryptographic hash function
|
21,098
|
680
|
C
|
Top
|
50
|
Pretty Good Privacy
|
21,018
|
678
|
B
|
High
|
51
|
NordVPN
|
20,261
|
653
|
C
|
Mid
|
52
|
Bletchley Park
|
19,088
|
615
|
B
|
High
|
53
|
Sator Square
|
18,953
|
611
|
B
|
Low
|
54
|
Trusted Platform Module
|
18,578
|
599
|
C
|
Mid
|
55
|
Cipher
|
18,331
|
591
|
C
|
Top
|
56
|
ROT13
|
18,253
|
588
|
C
|
Mid
|
57
|
Knapsack problem
|
18,007
|
580
|
C
|
Mid
|
58
|
Kryptos
|
17,789
|
573
|
C
|
Low
|
59
|
SHA-1
|
17,758
|
572
|
C
|
Top
|
60
|
Certificate authority
|
17,690
|
570
|
C
|
High
|
61
|
Information security
|
17,440
|
562
|
B
|
Top
|
62
|
Public key certificate
|
17,425
|
562
|
C
|
Top
|
63
|
Wi-Fi Protected Access
|
17,219
|
555
|
C
|
Mid
|
64
|
Encryption
|
17,065
|
550
|
C
|
Top
|
65
|
Elliptic-curve cryptography
|
17,022
|
549
|
C
|
High
|
66
|
Letter frequency
|
16,813
|
542
|
B
|
Low
|
67
|
Merkle tree
|
16,521
|
532
|
C
|
Mid
|
68
|
Post-quantum cryptography
|
16,434
|
530
|
C
|
High
|
69
|
Zero-knowledge proof
|
15,839
|
510
|
C
|
Top
|
70
|
Rainbow table
|
15,692
|
506
|
C
|
High
|
71
|
One-time password
|
15,502
|
500
|
C
|
Mid
|
72
|
Phone hacking
|
15,251
|
491
|
Start
|
Mid
|
73
|
Kerberos (protocol)
|
15,054
|
485
|
C
|
High
|
74
|
Digital rights management
|
15,037
|
485
|
B
|
High
|
75
|
Utah Data Center
|
14,533
|
468
|
C
|
Mid
|
76
|
Code talker
|
14,380
|
463
|
B
|
Low
|
77
|
Charlie Lee (computer scientist)
|
14,189
|
457
|
Start
|
Low
|
78
|
One-time pad
|
14,067
|
453
|
C
|
Top
|
79
|
Beale ciphers
|
13,956
|
450
|
B
|
Low
|
80
|
OpenVPN
|
13,774
|
444
|
C
|
Mid
|
81
|
Public key infrastructure
|
13,322
|
429
|
C
|
Top
|
82
|
Salt (cryptography)
|
13,077
|
421
|
Start
|
High
|
83
|
Bcrypt
|
12,476
|
402
|
C
|
Mid
|
84
|
Elliptic Curve Digital Signature Algorithm
|
12,297
|
396
|
C
|
High
|
85
|
.onion
|
12,036
|
388
|
C
|
Low
|
86
|
Tails (operating system)
|
12,032
|
388
|
Start
|
Low
|
87
|
Cryptanalysis of the Enigma
|
11,804
|
380
|
C
|
Mid
|
88
|
Apple–FBI encryption dispute
|
11,757
|
379
|
C
|
Low
|
89
|
Homomorphic encryption
|
11,701
|
377
|
C
|
High
|
90
|
SSH File Transfer Protocol
|
11,642
|
375
|
Start
|
Unknown
|
91
|
Authentication
|
11,581
|
373
|
C
|
High
|
92
|
OpenSSL
|
11,502
|
371
|
B
|
High
|
93
|
Secure Hash Algorithms
|
11,161
|
360
|
Start
|
High
|
94
|
Brute-force attack
|
11,151
|
359
|
C
|
High
|
95
|
I2P
|
11,127
|
358
|
B
|
Low
|
96
|
Galois/Counter Mode
|
10,982
|
354
|
C
|
Mid
|
97
|
Bombe
|
10,954
|
353
|
B
|
Mid
|
98
|
Shiba Inu (cryptocurrency)
|
10,758
|
347
|
Start
|
Low
|
99
|
Comparison of BitTorrent clients
|
10,690
|
344
|
List
|
Low
|
100
|
SHA-3
|
10,523
|
339
|
Start
|
Mid
|
101
|
Cryptonomicon
|
10,448
|
337
|
C
|
Low
|
102
|
Substitution cipher
|
10,392
|
335
|
Unknown
|
Unknown
|
103
|
Integer factorization
|
10,370
|
334
|
B
|
Mid
|
104
|
The Tor Project
|
10,060
|
324
|
C
|
Mid
|
105
|
Ultra (cryptography)
|
10,045
|
324
|
C
|
High
|
106
|
Link 16
|
9,887
|
318
|
Start
|
Low
|
107
|
Mullvad
|
9,735
|
314
|
Start
|
Low
|
108
|
Colossus computer
|
9,703
|
313
|
B
|
Mid
|
109
|
InterPlanetary File System
|
9,636
|
310
|
C
|
Low
|
110
|
Pay television
|
9,604
|
309
|
Start
|
Unknown
|
111
|
Symmetric-key algorithm
|
9,402
|
303
|
Start
|
Top
|
112
|
Forward secrecy
|
9,398
|
303
|
C
|
High
|
113
|
Theoretical computer science
|
9,368
|
302
|
B
|
Low
|
114
|
Data Encryption Standard
|
9,219
|
297
|
C
|
Top
|
115
|
Fort Meade
|
9,079
|
292
|
C
|
Low
|
116
|
Shamir's secret sharing
|
9,078
|
292
|
C
|
High
|
117
|
Bitcoin Cash
|
8,996
|
290
|
Start
|
Low
|
118
|
Cryptographic nonce
|
8,960
|
289
|
Start
|
High
|
119
|
Cypherpunk
|
8,902
|
287
|
C
|
Mid
|
120
|
Grover's algorithm
|
8,831
|
284
|
C
|
Mid
|
121
|
PBKDF2
|
8,635
|
278
|
C
|
Low
|
122
|
Differential privacy
|
8,620
|
278
|
C
|
Mid
|
123
|
Password cracking
|
8,419
|
271
|
C
|
Mid
|
124
|
VeraCrypt
|
8,357
|
269
|
C
|
Mid
|
125
|
Signal Protocol
|
8,262
|
266
|
C
|
High
|
126
|
Units of information
|
8,183
|
263
|
C
|
Unknown
|
127
|
EdDSA
|
8,170
|
263
|
C
|
High
|
128
|
Authenticated encryption
|
8,115
|
261
|
C
|
Mid
|
129
|
ChaCha20-Poly1305
|
7,976
|
257
|
C
|
Low
|
130
|
Bitwarden
|
7,945
|
256
|
C
|
Low
|
131
|
3-D Secure
|
7,936
|
256
|
Start
|
Low
|
132
|
Cryptanalysis
|
7,848
|
253
|
C
|
High
|
133
|
Curve25519
|
7,772
|
250
|
C
|
High
|
134
|
Hyphanet
|
7,766
|
250
|
B
|
Mid
|
135
|
Message authentication code
|
7,766
|
250
|
C
|
Top
|
136
|
Proof of stake
|
7,712
|
248
|
Start
|
Low
|
137
|
Decentralized finance
|
7,678
|
247
|
Start
|
Low
|
138
|
Babington Plot
|
7,663
|
247
|
C
|
Low
|
139
|
Birthday attack
|
7,481
|
241
|
C
|
High
|
140
|
Matrix (protocol)
|
7,425
|
239
|
Start
|
Unknown
|
141
|
Cryptogram
|
7,402
|
238
|
C
|
Mid
|
142
|
Certificate signing request
|
7,107
|
229
|
C
|
Low
|
143
|
Side-channel attack
|
7,076
|
228
|
C
|
High
|
144
|
Quantum key distribution
|
7,046
|
227
|
B
|
Mid
|
145
|
Illegal number
|
6,985
|
225
|
C
|
Low
|
146
|
Litecoin
|
6,905
|
222
|
Start
|
Low
|
147
|
Password strength
|
6,890
|
222
|
C
|
High
|
148
|
Cryptographically secure pseudorandom number generator
|
6,795
|
219
|
C
|
Top
|
149
|
Password manager
|
6,793
|
219
|
C
|
Low
|
150
|
Argon2
|
6,735
|
217
|
C
|
Mid
|
151
|
Elliptic-curve Diffie–Hellman
|
6,598
|
212
|
Start
|
Mid
|
152
|
KeePass
|
6,490
|
209
|
C
|
Low
|
153
|
PKCS 12
|
6,429
|
207
|
Start
|
Unknown
|
154
|
Playfair cipher
|
6,388
|
206
|
Unknown
|
Unknown
|
155
|
Key derivation function
|
6,354
|
204
|
C
|
Low
|
156
|
Confidentiality
|
6,324
|
204
|
C
|
Low
|
157
|
Triple DES
|
6,215
|
200
|
Start
|
Unknown
|
158
|
Digest access authentication
|
6,160
|
198
|
B
|
Low
|
159
|
Self-signed certificate
|
6,138
|
198
|
Start
|
Unknown
|
160
|
IMSI-catcher
|
6,067
|
195
|
Start
|
Mid
|
161
|
Discrete logarithm
|
6,051
|
195
|
C
|
Mid
|
162
|
Qubes OS
|
5,989
|
193
|
C
|
Mid
|
163
|
FIPS 140-2
|
5,878
|
189
|
C
|
Mid
|
164
|
GNU Privacy Guard
|
5,867
|
189
|
C
|
Unknown
|
165
|
Bitconnect
|
5,841
|
188
|
C
|
Low
|
166
|
RC4
|
5,756
|
185
|
B
|
Top
|
167
|
Citizenfour
|
5,723
|
184
|
C
|
Low
|
168
|
DNS-based Authentication of Named Entities
|
5,683
|
183
|
C
|
Mid
|
169
|
Tap code
|
5,606
|
180
|
Start
|
Low
|
170
|
Lorenz cipher
|
5,588
|
180
|
C
|
Top
|
171
|
Richard Teng
|
5,584
|
180
|
Start
|
Low
|
172
|
Quantum cryptography
|
5,536
|
178
|
C
|
High
|
173
|
Cipher suite
|
5,510
|
177
|
C
|
Top
|
174
|
Mutual authentication
|
5,456
|
176
|
Stub
|
Low
|
175
|
Deniable encryption
|
5,427
|
175
|
Start
|
High
|
176
|
OpenSSH
|
5,385
|
173
|
C
|
High
|
177
|
Kerckhoffs's principle
|
5,373
|
173
|
Start
|
Mid
|
178
|
RSA Security
|
5,340
|
172
|
C
|
Unknown
|
179
|
Conel Hugh O'Donel Alexander
|
5,315
|
171
|
Start
|
Low
|
180
|
Salsa20
|
5,295
|
170
|
C
|
Top
|
181
|
Digital Signature Algorithm
|
5,236
|
168
|
C
|
Top
|
182
|
Ricky McCormick's encrypted notes
|
5,195
|
167
|
B
|
Low
|
183
|
KeePassXC
|
5,077
|
163
|
Start
|
Low
|
184
|
Root certificate
|
5,070
|
163
|
Start
|
Low
|
185
|
Dual EC DRBG
|
5,065
|
163
|
C
|
High
|
186
|
Lavarand
|
5,063
|
163
|
Start
|
Mid
|
187
|
Atbash
|
5,058
|
163
|
Stub
|
Low
|
188
|
Session (software)
|
5,040
|
162
|
Start
|
Low
|
189
|
Lattice-based cryptography
|
5,018
|
161
|
Start
|
Low
|
190
|
Automatic Certificate Management Environment
|
4,964
|
160
|
Start
|
Low
|
191
|
Blowfish (cipher)
|
4,962
|
160
|
B
|
High
|
192
|
Datagram Transport Layer Security
|
4,947
|
159
|
Start
|
Mid
|
193
|
Block cipher
|
4,930
|
159
|
C
|
Top
|
194
|
BLAKE (hash function)
|
4,839
|
156
|
C
|
Mid
|
195
|
Certificate revocation list
|
4,828
|
155
|
C
|
Low
|
196
|
Polkadot (cryptocurrency)
|
4,814
|
155
|
Start
|
Low
|
197
|
11B-X-1371
|
4,744
|
153
|
GA
|
Low
|
198
|
Pepper (cryptography)
|
4,742
|
152
|
Start
|
Low
|
199
|
Fork (blockchain)
|
4,608
|
148
|
Start
|
Mid
|
200
|
Threema
|
4,580
|
147
|
C
|
Unknown
|
201
|
Wired Equivalent Privacy
|
4,491
|
144
|
C
|
Mid
|
202
|
Transposition cipher
|
4,485
|
144
|
Unknown
|
Unknown
|
203
|
Bitcoin Core
|
4,385
|
141
|
Start
|
Low
|
204
|
Web of trust
|
4,362
|
140
|
C
|
High
|
205
|
Key (cryptography)
|
4,357
|
140
|
Start
|
Unknown
|
206
|
Gordon Welchman
|
4,350
|
140
|
C
|
Low
|
207
|
AES instruction set
|
4,290
|
138
|
C
|
Low
|
208
|
Privacy-Enhanced Mail
|
4,260
|
137
|
Start
|
Low
|
209
|
Secure multi-party computation
|
4,256
|
137
|
Start
|
High
|
210
|
TrueCrypt
|
4,214
|
135
|
C
|
Mid
|
211
|
Initialization vector
|
4,206
|
135
|
C
|
High
|
212
|
Reception and criticism of WhatsApp security and privacy features
|
4,202
|
135
|
C
|
Low
|
213
|
Stream cipher
|
4,140
|
133
|
Start
|
Top
|
214
|
Rijndael S-box
|
4,100
|
132
|
Start
|
Low
|
215
|
Electronic signature
|
4,094
|
132
|
C
|
Low
|
216
|
RSA SecurID
|
4,072
|
131
|
Unknown
|
Unknown
|
217
|
Adam Back
|
4,021
|
129
|
Start
|
Low
|
218
|
Polybius square
|
4,002
|
129
|
Start
|
Mid
|
219
|
Marian Rejewski
|
3,968
|
128
|
FA
|
Mid
|
220
|
Elizebeth Smith Friedman
|
3,928
|
126
|
C
|
Mid
|
221
|
Diplomatic bag
|
3,925
|
126
|
Start
|
Low
|
222
|
The Doughnut
|
3,924
|
126
|
GA
|
High
|
223
|
XOR cipher
|
3,914
|
126
|
Stub
|
Mid
|
224
|
Replay attack
|
3,898
|
125
|
C
|
Top
|
225
|
Directory service
|
3,895
|
125
|
Start
|
Mid
|
226
|
Commitment scheme
|
3,853
|
124
|
C
|
High
|
227
|
Communications Security Establishment
|
3,839
|
123
|
C
|
Mid
|
228
|
PKCS
|
3,837
|
123
|
List
|
High
|
229
|
Adi Shamir
|
3,836
|
123
|
Start
|
Unknown
|
230
|
Cold boot attack
|
3,820
|
123
|
C
|
Low
|
231
|
Challenge–response authentication
|
3,818
|
123
|
Start
|
Mid
|
232
|
Blockchain game
|
3,791
|
122
|
Start
|
Low
|
233
|
Bacon's cipher
|
3,741
|
120
|
Start
|
Low
|
234
|
Frequency analysis
|
3,740
|
120
|
C
|
High
|
235
|
Ciphertext
|
3,684
|
118
|
Start
|
High
|
236
|
Crypto-anarchy
|
3,643
|
117
|
Start
|
High
|
237
|
Boolean function
|
3,622
|
116
|
Start
|
Mid
|
238
|
Padding (cryptography)
|
3,611
|
116
|
Start
|
Unknown
|
239
|
List of ciphertexts
|
3,606
|
116
|
List
|
Low
|
240
|
ElGamal encryption
|
3,596
|
116
|
Start
|
Top
|
241
|
Book cipher
|
3,581
|
115
|
C
|
Low
|
242
|
History of cryptography
|
3,574
|
115
|
Start
|
High
|
243
|
Rail fence cipher
|
3,543
|
114
|
Start
|
Low
|
244
|
Bruce Schneier
|
3,531
|
113
|
Start
|
High
|
245
|
Daniel J. Bernstein
|
3,509
|
113
|
C
|
Mid
|
246
|
Special Collection Service
|
3,496
|
112
|
C
|
Low
|
247
|
Harvest now, decrypt later
|
3,491
|
112
|
Start
|
Low
|
248
|
Cryptocurrency tumbler
|
3,476
|
112
|
Start
|
Unknown
|
249
|
NIST Post-Quantum Cryptography Standardization
|
3,462
|
111
|
C
|
Mid
|
250
|
William Binney (intelligence official)
|
3,413
|
110
|
Start
|
Mid
|
251
|
SipHash
|
3,399
|
109
|
Start
|
Low
|
252
|
David Chaum
|
3,356
|
108
|
C
|
Low
|
253
|
Crypto AG
|
3,353
|
108
|
C
|
High
|
254
|
Hashcash
|
3,336
|
107
|
Start
|
Unknown
|
255
|
One-way function
|
3,333
|
107
|
Start
|
Top
|
256
|
Australian Signals Directorate
|
3,307
|
106
|
C
|
Low
|
257
|
Briar (software)
|
3,283
|
105
|
Start
|
Low
|
258
|
Type B Cipher Machine
|
3,256
|
105
|
Start
|
Low
|
259
|
PKCS 7
|
3,244
|
104
|
Start
|
Low
|
260
|
Len Sassaman
|
3,225
|
104
|
Start
|
Unknown
|
261
|
List of bitcoin forks
|
3,154
|
101
|
List
|
Low
|
262
|
Non-repudiation
|
3,109
|
100
|
Start
|
Mid
|
263
|
Disk encryption
|
3,101
|
100
|
C
|
High
|
264
|
Key disclosure law
|
3,099
|
99
|
C
|
Low
|
265
|
PKCS 11
|
3,097
|
99
|
Unknown
|
Unknown
|
266
|
Known-plaintext attack
|
3,077
|
99
|
Start
|
High
|
267
|
Whonix
|
3,044
|
98
|
Start
|
Mid
|
268
|
Padding oracle attack
|
3,036
|
97
|
Start
|
Low
|
269
|
Key size
|
3,023
|
97
|
C
|
High
|
270
|
Polyalphabetic cipher
|
3,007
|
97
|
Start
|
Unknown
|
271
|
Feistel cipher
|
3,003
|
96
|
Start
|
Unknown
|
272
|
Disk encryption theory
|
2,969
|
95
|
C
|
Unknown
|
273
|
Timing attack
|
2,955
|
95
|
C
|
High
|
274
|
Digital watermarking
|
2,947
|
95
|
B
|
Mid
|
275
|
Supply chain attack
|
2,942
|
94
|
C
|
Low
|
276
|
Entrust
|
2,936
|
94
|
Start
|
Low
|
277
|
Criticism of Dropbox
|
2,926
|
94
|
B
|
Low
|
278
|
Plaintext
|
2,917
|
94
|
Start
|
High
|
279
|
Open Whisper Systems
|
2,905
|
93
|
B
|
Unknown
|
280
|
PKCS 1
|
2,880
|
92
|
C
|
Mid
|
281
|
Dictionary attack
|
2,876
|
92
|
C
|
Unknown
|
282
|
Key exchange
|
2,876
|
92
|
Start
|
Unknown
|
283
|
Double Ratchet Algorithm
|
2,876
|
92
|
Start
|
Low
|
284
|
Authenticator
|
2,871
|
92
|
Start
|
Unknown
|
285
|
Zcash
|
2,833
|
91
|
Start
|
Low
|
286
|
Hill cipher
|
2,829
|
91
|
Unknown
|
Unknown
|
287
|
Phil Zimmermann
|
2,820
|
90
|
Start
|
Mid
|
288
|
Cryptanalysis of the Lorenz cipher
|
2,774
|
89
|
C
|
High
|
289
|
Export of cryptography from the United States
|
2,760
|
89
|
C
|
Unknown
|
290
|
Cryptographic protocol
|
2,749
|
88
|
Start
|
High
|
291
|
Bomba (cryptography)
|
2,747
|
88
|
Start
|
Low
|
292
|
Keygen
|
2,733
|
88
|
C
|
Low
|
293
|
Bitcoin scalability problem
|
2,732
|
88
|
C
|
Low
|
294
|
Quantum network
|
2,726
|
87
|
C
|
Low
|
295
|
Scrambler
|
2,720
|
87
|
C
|
Unknown
|
296
|
K-anonymity
|
2,704
|
87
|
Start
|
Mid
|
297
|
Pre-shared key
|
2,691
|
86
|
Start
|
Mid
|
298
|
Comparison of SSH clients
|
2,678
|
86
|
List
|
Low
|
299
|
Certificate Transparency
|
2,652
|
85
|
C
|
High
|
300
|
Schnorr signature
|
2,635
|
85
|
C
|
High
|
301
|
Length extension attack
|
2,631
|
84
|
Start
|
Unknown
|
302
|
PKCS 8
|
2,619
|
84
|
Stub
|
Unknown
|
303
|
Avalanche effect
|
2,616
|
84
|
Start
|
High
|
304
|
Elliptic curve point multiplication
|
2,607
|
84
|
C
|
Mid
|
305
|
Clipper chip
|
2,565
|
82
|
C
|
High
|
306
|
HTTP Public Key Pinning
|
2,563
|
82
|
C
|
Mid
|
307
|
Whitfield Diffie
|
2,538
|
81
|
B
|
High
|
308
|
Dilly Knox
|
2,533
|
81
|
B
|
Unknown
|
309
|
Tox (protocol)
|
2,532
|
81
|
C
|
Low
|
310
|
Digital renminbi
|
2,529
|
81
|
B
|
High
|
311
|
Collision attack
|
2,509
|
80
|
Start
|
High
|
312
|
Filecoin
|
2,482
|
80
|
Stub
|
Low
|
313
|
Off-the-record messaging
|
2,466
|
79
|
Start
|
Unknown
|
314
|
Merkle–Damgård construction
|
2,462
|
79
|
C
|
Unknown
|
315
|
William F. Friedman
|
2,408
|
77
|
C
|
Unknown
|
316
|
Algorand
|
2,406
|
77
|
B
|
Low
|
317
|
Communications security
|
2,393
|
77
|
Start
|
Mid
|
318
|
AES key schedule
|
2,382
|
76
|
Start
|
Low
|
319
|
HKDF
|
2,360
|
76
|
Start
|
Unknown
|
320
|
Code signing
|
2,346
|
75
|
C
|
Low
|
321
|
Affine cipher
|
2,314
|
74
|
C
|
Low
|
322
|
DNS Certification Authority Authorization
|
2,301
|
74
|
GA
|
Low
|
323
|
Encryption software
|
2,290
|
73
|
Start
|
Top
|
324
|
Optimal asymmetric encryption padding
|
2,283
|
73
|
Start
|
High
|
325
|
Twofish
|
2,269
|
73
|
Start
|
High
|
326
|
Magic (cryptography)
|
2,259
|
72
|
Start
|
Unknown
|
327
|
Data anonymization
|
2,256
|
72
|
Start
|
Mid
|
328
|
Preimage attack
|
2,230
|
71
|
Stub
|
Unknown
|
329
|
Comparison of disk encryption software
|
2,221
|
71
|
List
|
High
|
330
|
Data at rest
|
2,213
|
71
|
C
|
Mid
|
331
|
FIPS 140
|
2,208
|
71
|
Start
|
Mid
|
332
|
Alastair Denniston
|
2,188
|
70
|
Start
|
Unknown
|
333
|
RSA Factoring Challenge
|
2,173
|
70
|
Start
|
Low
|
334
|
Key management
|
2,150
|
69
|
Unknown
|
Unknown
|
335
|
Trusted timestamping
|
2,136
|
68
|
Start
|
Unknown
|
336
|
Dm-crypt
|
2,133
|
68
|
Start
|
Low
|
337
|
Copiale cipher
|
2,133
|
68
|
Start
|
Low
|
338
|
Key encapsulation mechanism
|
2,118
|
68
|
Start
|
High
|
339
|
Bullrun (decryption program)
|
2,098
|
67
|
B
|
Low
|
340
|
FIPS 140-3
|
2,073
|
66
|
C
|
Low
|
341
|
Leo Marks
|
2,069
|
66
|
B
|
Unknown
|
342
|
Classical cipher
|
2,068
|
66
|
Start
|
Top
|
343
|
Trusted Computing
|
2,067
|
66
|
C
|
Mid
|
344
|
I. J. Good
|
2,050
|
66
|
C
|
Low
|
345
|
WebTorrent
|
2,049
|
66
|
Start
|
Unknown
|
346
|
Crypto Wars
|
2,043
|
65
|
Start
|
High
|
347
|
Encrypting File System
|
2,042
|
65
|
B
|
Unknown
|
348
|
Non-interactive zero-knowledge proof
|
2,029
|
65
|
Start
|
Low
|
349
|
CCM mode
|
2,027
|
65
|
Start
|
High
|
350
|
Ralph Merkle
|
2,013
|
64
|
C
|
High
|
351
|
BB84
|
2,009
|
64
|
Start
|
Low
|
352
|
Proof of authority
|
1,999
|
64
|
Start
|
Low
|
353
|
Hash chain
|
1,991
|
64
|
Start
|
Unknown
|
354
|
IEEE 802.11i-2004
|
1,985
|
64
|
C
|
Mid
|
355
|
Physical unclonable function
|
1,983
|
63
|
Start
|
Unknown
|
356
|
S-box
|
1,979
|
63
|
Start
|
Top
|
357
|
Opportunistic TLS
|
1,968
|
63
|
Start
|
Mid
|
358
|
Cryptography law
|
1,965
|
63
|
C
|
Mid
|
359
|
Martin Hellman
|
1,958
|
63
|
Start
|
High
|
360
|
Bouncy Castle (cryptography)
|
1,924
|
62
|
Start
|
Unknown
|
361
|
Generic Security Services Application Program Interface
|
1,913
|
61
|
Start
|
Low
|
362
|
FileVault
|
1,907
|
61
|
C
|
Mid
|
363
|
Tor2web
|
1,900
|
61
|
Start
|
Low
|
364
|
Tiny Encryption Algorithm
|
1,898
|
61
|
Unknown
|
Unknown
|
365
|
Comparison of cryptography libraries
|
1,869
|
60
|
List
|
Unknown
|
366
|
Orbot
|
1,867
|
60
|
Stub
|
Low
|
367
|
SegWit
|
1,853
|
59
|
Start
|
Low
|
368
|
Jami (software)
|
1,847
|
59
|
Start
|
Unknown
|
369
|
Comparison of TLS implementations
|
1,840
|
59
|
List
|
High
|
370
|
CableCARD
|
1,811
|
58
|
B
|
Unknown
|
371
|
Crypt (C)
|
1,801
|
58
|
C
|
High
|
372
|
Clock drift
|
1,779
|
57
|
C
|
Low
|
373
|
Shugborough inscription
|
1,778
|
57
|
Start
|
Low
|
374
|
SIGSALY
|
1,774
|
57
|
C
|
Low
|
375
|
Secret sharing
|
1,769
|
57
|
B
|
High
|
376
|
Mumble (software)
|
1,765
|
56
|
C
|
Unknown
|
377
|
Key stretching
|
1,760
|
56
|
Start
|
Unknown
|
378
|
Anonymous P2P
|
1,743
|
56
|
C
|
Low
|
379
|
Advanced Access Content System
|
1,738
|
56
|
C
|
Mid
|
380
|
Autokey cipher
|
1,730
|
55
|
C
|
Mid
|
381
|
Ciphertext indistinguishability
|
1,718
|
55
|
C
|
High
|
382
|
Content Authenticity Initiative
|
1,717
|
55
|
C
|
Low
|
383
|
DeCSS
|
1,713
|
55
|
C
|
Mid
|
384
|
Trapdoor function
|
1,710
|
55
|
Start
|
High
|
385
|
Government Communications Security Bureau
|
1,709
|
55
|
B
|
Low
|
386
|
Always-on DRM
|
1,695
|
54
|
Start
|
Low
|
387
|
MD4
|
1,679
|
54
|
Start
|
Low
|
388
|
Baby-step giant-step
|
1,673
|
53
|
C
|
Unknown
|
389
|
BTCC (company)
|
1,668
|
53
|
Start
|
Low
|
390
|
Cryptographic primitive
|
1,667
|
53
|
Start
|
Top
|
391
|
UltraViolet (website)
|
1,646
|
53
|
C
|
Low
|
392
|
W. T. Tutte
|
1,644
|
53
|
C
|
Mid
|
393
|
Black Chamber
|
1,639
|
52
|
Unknown
|
Unknown
|
394
|
Poly1305
|
1,633
|
52
|
Start
|
Top
|
395
|
Differential cryptanalysis
|
1,627
|
52
|
B
|
High
|
396
|
Bitcoin Gold
|
1,626
|
52
|
Start
|
Low
|
397
|
Red/black concept
|
1,623
|
52
|
Stub
|
Unknown
|
398
|
Security level
|
1,619
|
52
|
Stub
|
Mid
|
399
|
List of cryptographers
|
1,618
|
52
|
List
|
Low
|
400
|
ADFGVX cipher
|
1,609
|
51
|
Unknown
|
Unknown
|
401
|
Chosen-plaintext attack
|
1,601
|
51
|
Stub
|
Unknown
|
402
|
SecureDrop
|
1,595
|
51
|
Start
|
Mid
|
403
|
Content Scramble System
|
1,584
|
51
|
Start
|
Mid
|
404
|
Roger Dingledine
|
1,584
|
51
|
Start
|
Unknown
|
405
|
Pollard's kangaroo algorithm
|
1,571
|
50
|
C
|
Low
|
406
|
ZeroNet
|
1,565
|
50
|
Start
|
Low
|
407
|
Strong cryptography
|
1,561
|
50
|
Unknown
|
Unknown
|
408
|
Enigma rotor details
|
1,560
|
50
|
Start
|
Mid
|
409
|
Proof of space
|
1,554
|
50
|
Start
|
Low
|
410
|
Comparison of cryptographic hash functions
|
1,537
|
49
|
List
|
Low
|
411
|
National Cryptologic Museum
|
1,532
|
49
|
C
|
Mid
|
412
|
Banburismus
|
1,531
|
49
|
C
|
Low
|
413
|
Operations Support Branch
|
1,529
|
49
|
Start
|
Mid
|
414
|
FreeOTP
|
1,513
|
48
|
Start
|
Low
|
415
|
Null cipher
|
1,510
|
48
|
Stub
|
Low
|
416
|
Four-square cipher
|
1,505
|
48
|
C
|
Unknown
|
417
|
Format-preserving encryption
|
1,499
|
48
|
Start
|
High
|
418
|
Nothing-up-my-sleeve number
|
1,493
|
48
|
C
|
Low
|
419
|
Secret decoder ring
|
1,482
|
47
|
Start
|
Low
|
420
|
Integrated Encryption Scheme
|
1,468
|
47
|
Start
|
Low
|
421
|
Grille (cryptography)
|
1,462
|
47
|
C
|
Mid
|
422
|
Information-theoretic security
|
1,451
|
46
|
Start
|
Top
|
423
|
Challenge-Handshake Authentication Protocol
|
1,449
|
46
|
Start
|
Low
|
424
|
Lenstra elliptic-curve factorization
|
1,449
|
46
|
C
|
Low
|
425
|
Downgrade attack
|
1,446
|
46
|
Start
|
Mid
|
426
|
GNUnet
|
1,441
|
46
|
B
|
Low
|
427
|
Key server (cryptographic)
|
1,438
|
46
|
Start
|
Mid
|
428
|
Temporal Key Integrity Protocol
|
1,434
|
46
|
C
|
Low
|
429
|
Tabula recta
|
1,430
|
46
|
Unknown
|
Unknown
|
430
|
Cryptovirology
|
1,427
|
46
|
Start
|
Mid
|
431
|
BLS digital signature
|
1,423
|
45
|
Start
|
Mid
|
432
|
AES implementations
|
1,417
|
45
|
List
|
Low
|
433
|
Paillier cryptosystem
|
1,416
|
45
|
Start
|
High
|
434
|
Confusion and diffusion
|
1,414
|
45
|
Start
|
Mid
|
435
|
Code (cryptography)
|
1,409
|
45
|
Start
|
Top
|
436
|
International Data Encryption Algorithm
|
1,400
|
45
|
C
|
Unknown
|
437
|
Blind signature
|
1,398
|
45
|
C
|
Mid
|
438
|
Meet-in-the-middle attack
|
1,394
|
44
|
C
|
High
|
439
|
Open Technology Fund
|
1,388
|
44
|
Start
|
Unknown
|
440
|
Codebook
|
1,383
|
44
|
Stub
|
Unknown
|
441
|
Simultaneous Authentication of Equals
|
1,379
|
44
|
Start
|
High
|
442
|
Advanced Encryption Standard process
|
1,378
|
44
|
C
|
Mid
|
443
|
LibreSSL
|
1,374
|
44
|
Start
|
High
|
444
|
Serpent (cipher)
|
1,373
|
44
|
C
|
Low
|
445
|
Quahl
|
1,362
|
43
|
C
|
Low
|
446
|
Public key fingerprint
|
1,361
|
43
|
Start
|
Mid
|
447
|
Wildcard certificate
|
1,350
|
43
|
Redirect
|
NA
|
448
|
Two-square cipher
|
1,346
|
43
|
Unknown
|
Unknown
|
449
|
One-key MAC
|
1,345
|
43
|
Start
|
Low
|
450
|
Dorabella Cipher
|
1,342
|
43
|
Unknown
|
Unknown
|
451
|
McEliece cryptosystem
|
1,341
|
43
|
C
|
High
|
452
|
NTRU
|
1,337
|
43
|
C
|
Low
|
453
|
Key-agreement protocol
|
1,334
|
43
|
Start
|
Top
|
454
|
Keybase
|
1,328
|
42
|
Start
|
Low
|
455
|
Word square
|
1,320
|
42
|
C
|
Low
|
456
|
RSA problem
|
1,314
|
42
|
Start
|
Top
|
457
|
Alberti cipher
|
1,312
|
42
|
C
|
Low
|
458
|
Secure cryptoprocessor
|
1,306
|
42
|
C
|
Mid
|
459
|
CBC-MAC
|
1,302
|
42
|
C
|
High
|
460
|
Cipher runes
|
1,301
|
41
|
Start
|
Unknown
|
461
|
NEO (cryptocurrency)
|
1,299
|
41
|
Start
|
Low
|
462
|
SIGABA
|
1,295
|
41
|
C
|
High
|
463
|
Random oracle
|
1,290
|
41
|
Start
|
Low
|
464
|
Fuzzy hashing
|
1,283
|
41
|
C
|
Low
|
465
|
Coppersmith's attack
|
1,282
|
41
|
B
|
High
|
466
|
Privacy and blockchain
|
1,276
|
41
|
C
|
Low
|
467
|
Hidden message
|
1,274
|
41
|
Start
|
Low
|
468
|
Snowflake (software)
|
1,272
|
41
|
Start
|
Low
|
469
|
Arthur Scherbius
|
1,270
|
40
|
Start
|
Mid
|
470
|
OMEMO
|
1,270
|
40
|
Start
|
Low
|
471
|
Rijndael MixColumns
|
1,265
|
40
|
Start
|
Low
|
472
|
Twisted Edwards curve
|
1,257
|
40
|
C
|
Low
|
473
|
Power analysis
|
1,252
|
40
|
Unknown
|
Unknown
|
474
|
Steganographia
|
1,240
|
40
|
Start
|
Low
|
475
|
Rotor machine
|
1,238
|
39
|
Unknown
|
Unknown
|
476
|
A5/1
|
1,237
|
39
|
B
|
High
|
477
|
SYN cookies
|
1,236
|
39
|
Start
|
Unknown
|
478
|
Opportunistic Wireless Encryption
|
1,228
|
39
|
Stub
|
Low
|
479
|
Wiener's attack
|
1,225
|
39
|
B
|
High
|
480
|
Visual cryptography
|
1,223
|
39
|
Unknown
|
Unknown
|
481
|
Great Cipher
|
1,223
|
39
|
Start
|
Mid
|
482
|
RIPEMD
|
1,222
|
39
|
C
|
Unknown
|
483
|
Friend-to-friend
|
1,221
|
39
|
Start
|
Low
|
484
|
MS-CHAP
|
1,221
|
39
|
Start
|
Low
|
485
|
Hash-based cryptography
|
1,220
|
39
|
Start
|
Low
|
486
|
David Wheeler (computer scientist)
|
1,214
|
39
|
Start
|
Low
|
487
|
XTEA
|
1,211
|
39
|
Start
|
Low
|
488
|
Proton Drive
|
1,211
|
39
|
Start
|
Low
|
489
|
Perfect Dark (P2P)
|
1,200
|
38
|
C
|
Low
|
490
|
NTRUEncrypt
|
1,196
|
38
|
C
|
Mid
|
491
|
Cipher Bureau (Poland)
|
1,190
|
38
|
GA
|
Low
|
492
|
Integrated Windows Authentication
|
1,188
|
38
|
Start
|
Unknown
|
493
|
EFF DES cracker
|
1,188
|
38
|
C
|
Mid
|
494
|
Hybrid cryptosystem
|
1,188
|
38
|
Start
|
High
|
495
|
Frank Terpil
|
1,167
|
37
|
Start
|
Low
|
496
|
Shared secret
|
1,157
|
37
|
Stub
|
High
|
497
|
Montgomery curve
|
1,152
|
37
|
C
|
Mid
|
498
|
Rubber-hose cryptanalysis
|
1,149
|
37
|
Redirect
|
Low
|
499
|
SM4 (cipher)
|
1,142
|
36
|
Start
|
Low
|
500
|
Peercoin
|
1,138
|
36
|
Stub
|
Low
|