Search results
Jump to navigation
Jump to search
Page title matches
- 108 bytes (12 words) - 16:46, 1 August 2020
Page text matches
- ...y changing to [[cipher feedback]] mode for one [[Block size (cryptography)|block]]. The cost is the increased complexity. ...intext]] length ''N'' is not a multiple of the [[block size (cryptography)|block size]] ''L'': ...1 KB (178 words) - 22:53, 1 June 2025
- ...follows logically from the [[pigeonhole principle]] and the fact that the cipher must be reversible{{snd}}and it is undesirable for the output to be longer ...but today it is easily exceeded. If the [[block cipher modes of operation|cipher mode]] does not properly randomise the input, the limit is even lower. ...3 KB (430 words) - 04:03, 4 December 2024
- {{Short description|Stream cipher}} ...de]] or [[Salsa20]], but unlike those ciphers generating contiguous blocks of the keystream is made especially efficient by LEVIATHAN's unique tree struc ...2 KB (226 words) - 00:24, 19 February 2025
- {{Short description|Authenticated encryption mode for block ciphers}} {{About|the [[mode of operation]]|Creative EAX|Environmental Audio Extensions}} ...6 KB (933 words) - 17:22, 19 June 2024
- ...Communications-Electronics Security Group]] (CESG), the technical division of the [[Her Majesty's Government|United Kingdom government's]] secret communi ...name="zergo">[http://www.cypherspace.org/adam/ukexport/zergo.html "The use of encryption and related services with the NHSnet"], report by Zergo Ltd.</re ...4 KB (570 words) - 10:26, 19 July 2024
- {{Short description|Stream cipher}} In [[cryptography]], '''WAKE''' is a [[stream cipher]] designed by [[David Wheeler (computer scientist)|David Wheeler]] in 1993. ...2 KB (313 words) - 06:30, 19 July 2024
- ...le=Advances in Cryptology — CRYPTO' 99 |chapter=On the Security Properties of OAEP as an All-or-Nothing Transform |year=1999|doi=10.1007/3-540-48405-1_32 ...r the original plaintext without first having access to every single block of the pseudomessage. ...5 KB (724 words) - 11:27, 4 September 2023
- {{Short description|Block cipher}} {{Infobox block cipher ...3 KB (418 words) - 09:07, 27 May 2025
- ...f service attack]] against all messages on a particular channel using that cipher.<ref>{{cite web|title=7019 - AES Bit-Flipping Attack|url=https://www.hackin ...ter the message route in a way that will force re-encryption with a weaker cipher, thus possibly making it easier for an attacker to decipher the message.<re ...3 KB (397 words) - 21:43, 21 June 2024
- {{Short description|Authenticated encryption mode for block ciphers}} ...tiality]]. CCM mode is only defined for block ciphers with a block length of 128 bits.<ref name="NIST SP800-38C">{{cite tech report ...8 KB (1,150 words) - 10:33, 6 January 2025
- {{Short description|Authenticated encryption mode of operation for block ciphers}} ...sed on the ''[[IAPM (mode)|integrity-aware parallelizeable mode]]'' (IAPM) of authenticated encryption by Charanjit S. Jutla. The ''OCB2'' version was p ...8 KB (1,181 words) - 01:40, 25 May 2025
- ...o the [[Advanced Encryption Standard process]] run by [[National Institute of Standards and Technology]] in the [[United States|U.S.]] ...Also, CRYPTREC was unusually careful to examine variants and modifications of the techniques, or at least to discuss their care in doing so; this resulte ...8 KB (1,099 words) - 00:22, 19 August 2023
- ...e Dei'', a [[Religious emblems programs (Boy Scouts of America)|Boy Scouts of America award]] * [[American Academy of Dermatology]] ...2 KB (269 words) - 04:52, 8 May 2025
- {{Short description|Length increase of a message when it is encrypted}} ...ldwasser-Micali cryptosystem]] result in ciphertexts hundreds or thousands of times longer than the plaintext. ...3 KB (420 words) - 00:33, 21 October 2024
- ...ocks without resulting in any expansion of the [[ciphertext]], at the cost of slightly increased complexity. ...ithout [[Padding (cryptography)|padding]] the message to a multiple of the block size, so the ciphertext is the same size as the plaintext. ...17 KB (2,774 words) - 14:13, 13 January 2024
- ...use of an IV is described by the [[Block cipher mode of operation|modes of operation]]. ...oss.) An example of stateful encryption schemes is the [[counter mode]] of operation, which has a [[sequence number]] for a nonce. ...14 KB (2,121 words) - 08:53, 7 September 2024
- ...C.agr.jpg|thumb|U.S. State Department code book issued in 1899, an example of a one-part code, at the [[National Cryptologic Museum]]]] ...187 of the State Department 1899 code book, a one-part code with a choice of code word or numeric ciphertext. Numeric codes are prefixed by the page num ...4 KB (671 words) - 03:22, 20 March 2025
- ...02.11-2007|last=Cole|first=Terry|date=12 June 2007|publisher=The Institute of Electrical and Electronics Engineers, Inc|accessdate=11 April 2011|location ...ader. CCMP is based on AES processing and uses a 128-bit key and a 128-bit block size. CCMP uses CCM with the following two parameters: ...5 KB (682 words) - 05:39, 11 December 2024
- ...d [[BATON]] at 129%). The [[Cypris (microchip)|Cypris chip]] mentions two modes; specifications for [[Windster (microchip)|Windster]] and [[Indictor (micro {{Cryptography navbox | block}} ...3 KB (347 words) - 05:21, 9 January 2024
- * [[Mode (book series)|''Mode'' (book series)]], a quartet of novels by Piers Anthony ...a system of musical tonality involving a type of scale coupled with a set of characteristic melodic behaviors ...4 KB (560 words) - 17:33, 16 April 2025