[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Taxonomy of crypto applications

Trying to make sense of the various applications of crypto,
I came up with an illustration of their 'dependancies' at
This picture illustrates topics that you should learn
before others.

For instance, digital watermarking depends on steganography
and message-authentication codes.  Anonymity requires
understanding traffic mixing and practical encryption; practical
encryption requires understanding public and secret key encryption.

FWIW.  Comments welcome.

      David Honig                   Orbit Technology
     [email protected]                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	     Directorate of Intelligence, CIA