User:Sn KGS/Cryptographic algorithms
These diagrams have been created in the winter term 2020/2021 at Kiel University during a cryptography lecture for computing education students. Some of the following image were only used to illustrate specific examples and might not be suitable for Wikimedia Commons. I hope that this only applies to a minimal portion of the images.
Digital signatures
- The algorithms involved in an asymmetric cryptographic signature process
- An attacker on a digital signature algorithm
Message authentication codes
- The algorithms involved in generating and validating message authentication codes.
- An attacker on a MAC algorithm
- A cascading algorithm to create message authentication codes
Symmetric encryption
![]() |
This page or section is incomplete. |
Attackers
![]() |
This page or section is incomplete. |
Asymmetric encryption
![]() |
This page or section is incomplete. |
Attackers
![]() |
This page or section is incomplete. |