Search results
Jump to navigation
Jump to search
Page title matches
- A '''cryptographic key''' is a variable which influences the behavior of a [[cryptography | crypto3 KB (523 words) - 05:49, 8 April 2024
- 128 bytes (18 words) - 06:28, 4 September 2009
- Auto-populated based on [[Special:WhatLinksHere/Cryptographic key]]. Needs checking by a human.1 KB (132 words) - 14:31, 22 March 2024
Page text matches
- ...yptosystem, '''ciphertext''' is the result of applying the algorithm and [[cryptographic key#encryption key|encryption key]] to [[plaintext]]. In the special case of mu411 bytes (57 words) - 18:12, 28 July 2008
- HMACs use a [[cryptographic hash]] algorithm and a [[cryptographic key|symmetric key]] that is shared by the sender and the receiver of the messag2 KB (313 words) - 05:49, 8 April 2024
- ...nature]]s, and [[hashed message authentication code]]s — depend on [[cryptographic key]]s. '''None of these can be secure if the key is not.''' Enemies can someti ...ey is like buying good locks then leaving the key under the doormat. See [[cryptographic key]] and [[random number generator]] for details.3 KB (459 words) - 05:49, 8 April 2024
- ...e that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that th307 bytes (49 words) - 03:43, 16 October 2008
- {{r|Cryptographic key}}657 bytes (85 words) - 17:19, 11 January 2010
- A cipher system in which the cryptographic key, i.e. the secret used to encrypt and decrypt messages, is a sequence of ran262 bytes (45 words) - 03:46, 21 August 2008
- ...that does not know both the algorithm and a randomizing factor called a [[cryptographic key]]352 bytes (48 words) - 22:02, 31 July 2008
- *[[TSEC-|TSEC/]][[KG-13]] is a cryptographic key generator (code name PONTUS) *[[TSEC-|TSEC/]][[KW-7]] was a cryptographic key encryptor for asynchronous character data (i.e., "Teletype") (code name ORE3 KB (414 words) - 05:48, 8 April 2024
- {{R|Cryptographic key}}854 bytes (123 words) - 01:07, 2 November 2008
- A '''cryptographic key''' is a variable which influences the behavior of a [[cryptography | crypto3 KB (523 words) - 05:49, 8 April 2024
- {{r|Cryptographic key}}608 bytes (77 words) - 15:58, 11 January 2010
- {{r|Cryptographic key}}707 bytes (89 words) - 20:09, 29 July 2010
- {{r|Cryptographic key}}219 bytes (24 words) - 14:41, 18 March 2024
- {{r|Cryptographic key}}1 KB (173 words) - 14:49, 4 April 2024
- Auto-populated based on [[Special:WhatLinksHere/Cryptographic key]]. Needs checking by a human.1 KB (132 words) - 14:31, 22 March 2024
- A '''one-time pad''' is a [[cipher]] system in which the [[cryptographic key]], i.e. the secret used to encrypt and decrypt messages, is a sequence of12 KB (1,878 words) - 05:48, 8 April 2024
- Ciphers apply an algorithm and a [[cryptographic key]] to [[plaintext]] in the form of digitally encoded information; the proces12 KB (1,744 words) - 05:48, 8 April 2024
- ...ne this, they can communicate privately by using that shared secret as a [[cryptographic key]] for a [[block cipher]] or a [[stream cipher]], or as the basis for a furt6 KB (954 words) - 05:48, 8 April 2024
- ...r_generators | pseudorandom number generator]] whose output depends on a [[cryptographic key]]. To decrypt, run the generator with the same key to generate the same pse ...cipher will be insecure if the period is short, if key is too small (see [[cryptographic key]]), or if the generator design is not adequate in cryptographic terms. Give24 KB (3,851 words) - 05:49, 8 April 2024
- ...jumble of apparently random symbols (ciphertext). The process involves a [[cryptographic key | key]], a secret value that controls some of the operations. The intended ...ed of [[brute force attack]]s must be taken into account when specifying [[cryptographic key#key length|key length]]s, and the potential effects of [[quantum computing]52 KB (8,332 words) - 05:49, 8 April 2024