- Kasiski examination: hacking Vigenere cipher
- des cipher (Data Encryption Standard)
- serpent cipher: Advanced Encryption Standard contest second place
-
rc4: simpliest stream cipher
-
a5 and comp128: implementation of the A3, A5 and A8 functions defined in the GSM standard
A3 is used to authenticate the mobile station to the network. A8 is used to generate the session key used by A5 to encrypt the data transmitted between the mobile station and the BTS
- rsa: simpliest modulo operation based assymmetric cipher, one of the first public-key cryptosystems and is widely used for secure data transmission
- CubeHash: a cryptographic hash function submitted to the NIST hash function competition, SHA-3 semi-finalist