Search results
Jump to navigation
Jump to search
Page title matches
- * The [[Data Encryption Standard]] itself, the first well-known Feistel cipher, using 16 rounds and eight 6 by 4 S-boxes. ...T cipher]], a Soviet standard similar in design to DES, a 32-round Feistel cipher using eight 4 by 4 S-boxes.4 KB (551 words) - 12:36, 13 April 2016
- <th>Cipher</th><th>Type</th><th>Block size</th><th>Key size</th><th>Rounds</th><th>S-b <td>[[CAST cipher#CAST-128|CAST-128]]</td><td>Feistel</td><td>64</td><td>40 to 128</td><td>167 KB (1,292 words) - 12:20, 27 July 2010
- ...can be [[cryptography#two-way encryption|encrypted]] in two basic ways, '''cipher''' and [[code]]. For a discussion of the applications of each, see the [[Cr ...re of linguistic structure such as words. It would make no difference to a cipher if its inputs were the complete works of [[William Shakespeare]], a digitiz12 KB (1,744 words) - 05:48, 8 April 2024
- Howard just reverted [http://en.citizendium.org/wiki?title=Cipher&curid=100079427&diff=100386215&oldid=100386209] one of my edits. I think th ...er. The end-to-end users may, indeed, have completely separate end-to-end cipher. If the connections A-X, C-X, and E-X, need protection against traffic ana30 KB (4,939 words) - 23:17, 31 August 2011
- #Redirect [[Block cipher]]26 bytes (3 words) - 17:18, 24 October 2008
- == Understanding the cipher == ...in the deck and complicate the cryptotext with nulls? Is there any kind of cipher feedback? [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 09:08, 13 May 20944 bytes (153 words) - 18:17, 13 May 2011
- 44 bytes (5 words) - 04:51, 26 October 2008
- is a [[block cipher]] that was a candidate in the [[AES competition]]; it did not make it into DEAL is a [[Feistel cipher]] using [[Data Encryption Standard|DES]] as the F function. Six rounds were1 KB (215 words) - 14:23, 30 September 2009
- 35 bytes (3 words) - 17:45, 30 September 2009
- ...iving a block of [[ciphertext]] for each. The other main type are [[stream cipher]]s, which generate a continuous stream of keying material to be mixed with ...ial components in many security systems. However, just having a good block cipher does not give you security, much as just having good tires does not give yo53 KB (8,371 words) - 05:48, 8 April 2024
- '''Camellia''' is a [[block cipher]] from [[Mitsubshi]] and [[Nippon Telephone and Telegraph]]. It can be used ...er keys. Some of the design is quite similar to NTT's earlier cipher [[E2 (cipher)|E2]], which was a candidate in the [[AES competition]].783 bytes (126 words) - 05:48, 8 April 2024
- ...t blocks and supports key sizes of 128, 192 or 256 bits. It is a [[Feistel cipher]] with six or eight rounds. | title = The MAGENTA Block Cipher Algorithm2 KB (235 words) - 05:49, 8 April 2024
- ...urity Agency]] (KISA) and widely used in Korea. It is a 16-round [[Feistel cipher]] using two 8 by 8 S-boxes.435 bytes (67 words) - 05:48, 8 April 2024
- ...Secure and Fast Encryption Routine''', is the name for a series of [[block cipher]]s designed by [[James Massey]] and co-workers for [[Cylink]] Corporation. ...ly stands for 'Stop Knudsen', a wise precaution in the design of any block cipher".1 KB (221 words) - 05:48, 8 April 2024
- 35 bytes (3 words) - 17:58, 30 September 2009
- | pagename = Cipher | abc = Cipher956 bytes (99 words) - 22:36, 28 February 2010
- The '''GOST cipher''' was a standard [[block cipher]] in the [[Soviet Union]]. GOST was a Soviet national standards body. There The GOST cipher1 KB (228 words) - 05:49, 8 April 2024
- ARIA is a [[block cipher]] developed in [[South Korea]], and an official standard (KS X 1213) there. There is a [http://210.104.33.10/ARIA/index-e.html home page] for the cipher. Internet RFC 5794 gives a specification of the algorithm for Internet use664 bytes (101 words) - 10:08, 2 December 2013
- In [[cryptography]], a '''stream cipher''' is a symmetric [[cipher]] which encrypts data by combining the plaintext with pseudorandom data to ...— to infer the internal state of the generator; that would break the cipher completely.24 KB (3,851 words) - 05:49, 8 April 2024
- '''Serpent''' is a [[block cipher]] designed by an international team of well-known researchers — [[Ros Serpent is an [[Block cipher#SP network | SP network]] with 32 rounds. It uses eight 4 by 4 S-boxes, but903 bytes (147 words) - 05:49, 8 April 2024
Page text matches
- {{r|Block cipher}} {{r|Blowfish (cipher)}}899 bytes (119 words) - 07:46, 8 January 2010
- #REDIRECT [[Block cipher/Catalogs/Cipher list]]47 bytes (6 words) - 01:46, 9 August 2009
- ...design of the [[Data Encryption Standard]] and its predecessor, [[Lucifer (cipher)|Lucifer]]. [[Feistel cipher]]s, a class of [[block cipher]], are named after him.269 bytes (38 words) - 09:03, 6 October 2010
- ...ert, best known for designing the [[CAST (cipher)|CAST]] family of [[block cipher]]s.157 bytes (21 words) - 14:01, 22 May 2011
- ...Catalogs/Cipher list|list of block ciphers]] and a [[Block cipher/Catalogs/Cipher table|table]] showing some of their properties.281 bytes (42 words) - 16:57, 10 August 2009
- ...n government standard symmetric key block cipher; also based on this block cipher is the GOST hash function.164 bytes (24 words) - 06:48, 1 October 2009
- {{rpl|Block cipher}} {{rpl|Stream cipher}}2 KB (243 words) - 17:48, 13 March 2024
- {{r|Cipher}} {{r|Block cipher modes of operation}}640 bytes (81 words) - 04:17, 27 April 2010
- ...our; the objective is to build up an overall approximation that breaks the cipher.194 bytes (26 words) - 02:00, 2 November 2008
- ...pher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products.160 bytes (23 words) - 05:59, 14 June 2010
- {{r|Block cipher}} {{r|Stream cipher}}844 bytes (96 words) - 14:48, 4 April 2024
- ...ing]], a [[Block_cipher_modes_of_operation|mode of operation]] for [[block cipher]]s.285 bytes (39 words) - 21:40, 24 November 2011
- Auto-populated based on [[Special:WhatLinksHere/Blowfish (cipher)]]. Needs checking by a human. {{r|Block cipher}}525 bytes (69 words) - 10:50, 1 March 2010
- '''Camellia''' is a [[block cipher]] from [[Mitsubshi]] and [[Nippon Telephone and Telegraph]]. It can be used ...er keys. Some of the design is quite similar to NTT's earlier cipher [[E2 (cipher)|E2]], which was a candidate in the [[AES competition]].783 bytes (126 words) - 05:48, 8 April 2024
- ...that security in a cipher should not depend on keeping the details of the cipher secret; it should depend only on keeping the key secret.222 bytes (34 words) - 05:48, 15 May 2009
- ...rther down the alphabet. It was named after [[Julius Caesar]] who used the cipher with a shift of 3 in order to communicate with his generals during his vari One Caesar cipher is still in use; [[rot 13]] is used to hide "spoilers" such as the ending o714 bytes (116 words) - 05:48, 8 April 2024
- ...block cipher, named because it applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.223 bytes (32 words) - 00:50, 1 October 2009
- ...e was the main designer of the [[SAFER (cipher)| SAFER]] series of [[block cipher]]s for [[Cylink]] corporation and, with his student [[Xuejia Lai]], co-desi296 bytes (41 words) - 05:48, 8 April 2024
- {{r|Block cipher}} {{r|Cipher}}973 bytes (125 words) - 14:41, 18 March 2024
- ...the middle) in two independent ways, starting either from the input of the cipher (plaintext) or from the output ( ciphertext); he calculates some possible v352 bytes (53 words) - 00:56, 2 November 2008