Block cipher/Related Articles
Jump to navigation Jump to search
- See also changes related to Block cipher, or pages that link to Block cipher or to this page or whose text .
- Cryptography : A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message.
- Information security : The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world
- Cipher : A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key
See our table of block ciphers for links to individual ciphers.
- Avalanche (cryptography) : A desirable property for operations in a cipher or hash, where a small change (even a single bit) quickly builds up to creating large effects.
- Round (cryptography) : A relatively simple operation which, when repeated many times, can be used to build an iterated cipher or hash.
- S-box (cryptography) : A substitution box or lookup table.
- Cryptanalysis : The sub-field of cryptology which deals with breaking into existing codes and ciphers.
- Block cipher modes of operation : Methods of combining multiple block cipher operations to achieve a larger goal.
- Hash (cryptography) : An algorithm that produces a fixed-size digest from an input of essentially arbitrary size.
- Key (cryptography) : Characteristics and generation of data which, in combination with a cryptographic algorithm, introduces or removes the concealment applied to plaintext or taken to ciphertext; key management is arelated but separate discipline of secure distribution of keys and entering them into cryptosystems
- Key management (cryptography) : Add brief definition or description
- Stream cipher : A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step.
- Permutation cipher : Add brief definition or description
- Transposition cipher : Add brief definition or description