Search results

Jump to navigation Jump to search
Results 1 – 21 of 144
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • In [[cryptography]], '''F-FCSR''' is a [[stream cipher]] developed by Thierry Berger, Françoi F-FCSR was one of the eight algorithms selected for the [[eCRYPT]] network's [[eSTREAM]] Portfolio, but it was lat ...
    1 KB (147 words) - 08:55, 27 April 2022
  • ...services to enable developers to secure Windows-based applications using [[cryptography]]. It is a set of [[Dynamic-link library|dynamically linked libraries]] tha ...ey cryptography|public-key]] and [[Symmetric key algorithm|symmetric key]] cryptography, though persistent symmetric keys are not supported. It includes functional ...
    6 KB (819 words) - 08:17, 27 June 2025
  • {{short description|European research program in cryptography, 2000-2003}} ...[Europe]]an research project funded from 2000 to 2003 to identify secure [[cryptography|cryptographic]] [[Cryptographic primitive|primitives]]. The project was com ...
    5 KB (657 words) - 12:41, 17 October 2024
  • ...key]] encryption algorithms; however various [[symmetric key encryption]] algorithms achieve a similar property (e.g., [[block ciphers]] when used in a chaining ...tor equal to the public key size. More efficient probabilistic encryption algorithms include [[ElGamal encryption|Elgamal]], [[Paillier]], and various construct ...
    4 KB (612 words) - 19:08, 11 February 2025
  • '''40-bit encryption''' refers to a (now broken) [[key size]] of forty bits, or five [[byte]]s, for [[symmetric encryption] ...e.{{sfn|Schneier|1996|p=154}} With dedicated hardware, a 40-bit key can be broken in seconds. The [[Electronic Frontier Foundation]]'s [[Deep Crack]], built ...
    5 KB (798 words) - 21:50, 13 August 2024
  • [[Category:Broken cryptography algorithms]] ...
    2 KB (203 words) - 01:37, 17 October 2023
  • {{Short description|Number of standards related to cryptography}} ...'''[[standardization|standards]] related to [[cryptography]]'''. Standard algorithms and protocols provide a focus for study; standards for popular applications ...
    5 KB (553 words) - 02:51, 20 June 2024
  • ...rotocols}}'''Cryptographic primitives''' are well-established, low-level [[cryptography|cryptographic]] [[algorithm]]s that are frequently used to build [[cryptogr ...be only breakable with {{var|X}} number of computer operations, and it is broken with significantly fewer than {{var|X}} operations, then that cryptographic ...
    6 KB (923 words) - 05:08, 24 March 2025
  • |text = Modern ciphers rarely get broken... You’re far more likely to get hit by malware or an implementation bug th Picking any two [[cipher]]s, if the [[key (cryptography)|key]] used is the same for both, the second cipher could possibly undo the ...
    9 KB (1,268 words) - 03:29, 1 July 2025
  • In [[cryptography]], a '''ciphertext-only attack''' ('''COA''') or '''known ciphertext attack ...he corresponding [[plaintext]]s can be deduced, or even better, the [[key (cryptography)|key]]. The ability to obtain any information at all about the underlying ...
    5 KB (696 words) - 01:31, 2 February 2025
  • In [[cryptography]], '''LOKI97''' is a [[block cipher]] which was a candidate in the [[Advanc ...Advanced Encryption Standard|AES]] candidates, has a 128-bit [[block size (cryptography)|block size]] and a choice of a 128-, 192- or 256-bit [[key length]]. It us ...
    4 KB (546 words) - 07:03, 27 April 2022
  • ...rk analysing DES, and are very similar to DES in structure. The '''LOKI''' algorithms were named for [[Loki]], the god of mischief in [[Norse mythology]]. The cipher uses a 64-bit [[block size (cryptography)|block]] and a 64-bit [[key length|key]]. Like [[Data Encryption Standard|D ...
    6 KB (779 words) - 23:05, 27 March 2024
  • A '''key''' in [[cryptography]] is a piece of information, usually a string of numbers or letters that ar ...[plaintext]] to [[ciphertext]].<ref>{{Citation|last=Piper|first=Fred|title=Cryptography|date=2002|url=https://onlinelibrary.wiley.com/doi/abs/10.1002/0471028959.so ...
    13 KB (1,823 words) - 15:21, 12 November 2025
  • {{Short description|1999 public-key cryptography algorithm}} The '''Cayley–Purser algorithm''' was a [[public-key cryptography]] [[algorithm]] published in early 1999 by 16-year-old [[Ireland|Irishwoman ...
    7 KB (1,036 words) - 08:53, 19 October 2022
  • In [[cryptography]], '''MISTY1''' (or '''MISTY-1''') is a [[block cipher]] designed in 1995 b ...to "candidate" by CRYPTREC revision in 2013. However, it was successfully broken in 2015 by Yosuke Todo using [[integral cryptanalysis]]; this attack was im ...
    5 KB (706 words) - 14:35, 30 July 2023
  • In [[cryptography]], '''MOSQUITO''' was a [[stream cipher]] [[algorithm]] designed by [[Joan ...g, where it was noted that "in reaching the third phase of eSTREAM all the algorithms in this book have made a significant advance in the development of stream c ...
    7 KB (994 words) - 05:12, 28 May 2025
  • ...e" [[algorithm]] based on the [[Enigma machine]]. It is considered to be [[cryptography|cryptographically]] far too weak to provide any security against [[brute-fo ...er version of the ''crypt(1)'' command in order to comply with [[Export of cryptography from the United States|contemporaneous laws and regulations that limited th ...
    7 KB (954 words) - 20:05, 18 August 2024
  • {{Short description|Cryptography method}} ...ref><ref name=Goldreich>[[Oded Goldreich|Goldreich, Oded.]] Foundations of Cryptography: Volume 2, Basic Applications. Vol. 2. Cambridge university press, 2004.</r ...
    14 KB (1,838 words) - 10:02, 20 May 2025
  • | known_for = [[Cryptography]], [[security]] }}.</ref><ref>{{citation|title=New AES crypto standard broken already? Depends who you ask|publisher=[[The Register]]|url=https://www.the ...
    5 KB (581 words) - 20:10, 15 January 2025
  • ...since been found in the algorithm, but it was one of the first encryption algorithms to make use of data-dependent rotations,{{Citation needed|date=April 2016}} {{Cryptography navbox | block}} ...
    5 KB (751 words) - 21:33, 16 March 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)