| gptkbp:instanceOf | gptkb:academic 
 | 
                        
                            
                                | gptkbp:etymology | from Greek 'kryptos' (hidden) and 'logos' (study) 
 | 
                        
                            
                                | gptkbp:hasApplication | gptkb:cryptocurrency banking
 e-commerce
 digital signatures
 data encryption
 identity management
 password protection
 secure messaging
 electronic voting
 military communication
 
 | 
                        
                            
                                | gptkbp:hasSubfield | gptkb:mathematics computer science
 
 | 
                        
                            
                                | gptkbp:includes | gptkb:crypt cryptography
 
 | 
                        
                            
                                | gptkbp:majorConference | gptkb:ASIACRYPT gptkb:CHES
 gptkb:CRYPTO
 gptkb:EUROCRYPT
 
 | 
                        
                            
                                | gptkbp:majorJournal | gptkb:Journal_of_Cryptology gptkb:Designs,_Codes_and_Cryptography
 
 | 
                        
                            
                                | gptkbp:notableEvent | gptkb:Enigma_code_breaking creation of public key cryptography
 development of RSA algorithm
 
 | 
                        
                            
                                | gptkbp:notablePerson | gptkb:Adi_Shamir gptkb:Alan_Turing
 gptkb:Claude_Shannon
 gptkb:Leonard_Adleman
 gptkb:Martin_Hellman
 gptkb:Ron_Rivest
 gptkb:Whitfield_Diffie
 gptkb:August_Kerckhoffs
 
 | 
                        
                            
                                | gptkbp:organization | gptkb:International_Association_for_Cryptologic_Research gptkb:Cryptology_Research_Society_of_India
 
 | 
                        
                            
                                | gptkbp:relatedTo | gptkb:public_key_infrastructure cybersecurity
 privacy
 information security
 hash functions
 digital forensics
 random number generation
 symmetric-key cryptography
 steganography
 asymmetric-key cryptography
 
 | 
                        
                            
                                | gptkbp:studies | authentication information security
 data integrity
 secure communication
 data confidentiality
 non-repudiation
 
 | 
                        
                            
                                | gptkbp:uses | gptkb:combinatorics gptkb:information_theory
 gptkb:probability_theory
 abstract algebra
 number theory
 computational complexity
 mathematical algorithms
 
 | 
                        
                            
                                | gptkbp:bfsParent | gptkb:25th_Air_Force 
 | 
                        
                            
                                | gptkbp:bfsLayer | 6 
 | 
                        
                            
                                | https://www.w3.org/2000/01/rdf-schema#label | Cryptology 
 |