Search results
Jump to navigation
Jump to search
Page title matches
- ...yption, ciphertext is still the result of applying an algorithm and key to ciphertext produced by a different cryptosystem. Ideal ciphertext appears to be completely random.[[Category:Suggestion Bot Tag]]442 bytes (61 words) - 17:02, 28 July 2024
- 129 bytes (16 words) - 18:11, 28 July 2008
- Auto-populated based on [[Special:WhatLinksHere/Ciphertext]]. Needs checking by a human.930 bytes (120 words) - 17:02, 28 July 2024
Page text matches
- ...yption, ciphertext is still the result of applying an algorithm and key to ciphertext produced by a different cryptosystem. Ideal ciphertext appears to be completely random.[[Category:Suggestion Bot Tag]]442 bytes (61 words) - 17:02, 28 July 2024
- Attacking a [[block cipher]] by creating a code book, collecting plaintext/ciphertext pairs.128 bytes (16 words) - 00:42, 2 November 2008
- ...cipher that operates on fixed-size blocks of plaintext, giving a block of ciphertext for each141 bytes (20 words) - 10:24, 22 October 2008
- ...''plaintext''' is the unencrypted message, contrasted with the encrypted [[ciphertext]]. It exhibits the statistical properties of [[natural language]].214 bytes (26 words) - 05:48, 8 April 2024
- ...troduces or removes the concealment applied to [[plaintext]] or taken to [[ciphertext]]; [[key management]] is arelated but separate discipline of secure distrib346 bytes (45 words) - 11:07, 30 October 2008
- ...rting either from the input of the cipher (plaintext) or from the output ( ciphertext); he calculates some possible values each way and compares the results.352 bytes (53 words) - 00:56, 2 November 2008
- ...at mathematically manipulates the individual elements of plaintext, into [[ciphertext]], a form unintelligible to any recipient that does not know both the algor352 bytes (48 words) - 22:02, 31 July 2008
- {{r|Ciphertext}}219 bytes (24 words) - 14:41, 18 March 2024
- ...ker must get or guess one block of plaintext for which he has the matching ciphertext. ...much better strategy for him. He runs a number of decryptions of the known ciphertext with possible second-half keys, stores results in a table, then runs encryp6 KB (925 words) - 12:01, 17 September 2024
- ...cipher]] provides a way to encrypt blocks of plaintext to yield blocks of ciphertext. A block cipher '''mode of operation''' specifies how multiple block cipher ...disadvantage is that the same plaintext block always encrypts to the same ciphertext; this gives an enemy some information. If enough blocks are encrypted this8 KB (1,301 words) - 17:00, 19 July 2024
- Auto-populated based on [[Special:WhatLinksHere/Ciphertext]]. Needs checking by a human.930 bytes (120 words) - 17:02, 28 July 2024
- ...uses only linear operations, an attacker can just plug in known plaintext/ciphertext pairs until there are at least as many equations as variables, then solve f ...tput bit in terms of 64 inputs and 128 key bits. Plug in a known plaintext/ciphertext pair and only the key bits remain as variables. He has 64 equations in 1286 KB (886 words) - 12:01, 8 July 2024
- {{r|Ciphertext}}1 KB (148 words) - 12:00, 3 August 2024
- ...some plaintext; he makes a little table, his own "code book" showing which ciphertext blocks correspond to which plaintexts. If he can fill in all 256 entries, t ...and solve for the key), a code book attack (collect all possible plaintext/ciphertext pairs) will ''in theory break any block cipher''. However, all of those att6 KB (1,068 words) - 07:01, 30 July 2024
- ...e ciphertext, to lessen the statistical relationship between plaintext and ciphertext. Padding that was mistaken for plaintext has changed the course of [[World Encryption is the process of converting '''plaintext''' to '''ciphertext'''; decryption reverses the process to produce plaintext.12 KB (1,748 words) - 17:02, 28 July 2024
- ...form, on average, about 2<sup>64</sup> hash operations, to find a repeated ciphertext for a 64-bit block cipher or a repetition of a 64-bit challenge, he needs t3 KB (419 words) - 07:00, 19 July 2024
- * [[code book attack]] — collect all possible plaintext/ciphertext pairs for a [[block cipher]], or the entire pseudorandom stream until it st3 KB (440 words) - 08:36, 22 June 2024
- ...channels based on statistical properties; the false channels might receive ciphertext of random noise being sent through the same encryption as the true informat3 KB (460 words) - 03:59, 18 September 2024
- ...iphers take as input a block of plaintext and a key, and output a block of ciphertext of the same size. Block ciphers are used in a [[Block cipher modes of oper4 KB (546 words) - 05:48, 8 April 2024
- ...troduces or removes the concealment applied to [[plaintext]] or taken to [[ciphertext]]. This discussion deals with the nature of keys (e.g., binary strings of l4 KB (568 words) - 07:00, 8 September 2024