Search results
Jump to navigation
Jump to search
Page title matches
- #REDIRECT [[symmetric-key algorithm]] ...88 bytes (9 words) - 07:32, 9 June 2017
- #REDIRECT [[symmetric-key algorithm]] ...37 bytes (3 words) - 19:36, 15 December 2005
Page text matches
- ...es, the algorithms are for the most part unrelated. There have been six RC algorithms so far: [[Category:Cryptographic algorithms]] ...870 bytes (124 words) - 11:42, 20 February 2022
- 2 KB (305 words) - 19:40, 1 February 2025
- Asymmetric keys differ from symmetric keys in that the algorithms use separate keys for encryption and decryption, while a symmetric key’s al ...([[public-key cryptography|public]]) key pairs that are used by public key algorithms to generate digital signatures with possible long-term implications. When p ...10 KB (1,496 words) - 15:15, 16 June 2025
- ...e categories|date=January 2025}}{{short description|Suite of cryptographic algorithms needed to implement a particular security service}} ...key]] techniques; however both "cipher" and "cryptosystem" are used for [[Symmetric-key algorithm|symmetric key]] techniques. ...4 KB (568 words) - 22:26, 16 January 2025
- ...d five core research areas, termed "virtual laboratories": [[symmetric key algorithms]] (STVL), [[public key algorithm]]s (AZTEC), [[protocol (cryptography)|prot === Yearly report on algorithms and key lengths === ...5 KB (702 words) - 08:26, 3 April 2025
- ...ared key; keeping data secret requires keeping this key secret. Public-key algorithms use a [[public key]] and a [[private key]]. The public key is made availabl ...generate it). The remainder of the conversation uses a (typically faster) symmetric-key algorithm for encryption. ...5 KB (776 words) - 04:27, 19 May 2025
- ...ve been shared among the two sides over some secure channel. However, some algorithms share the keys at the time of authentication. ...other (e.g., Internet shopping), this is not practical. There are various algorithms for both symmetric keys and asymmetric public key cryptography to solve thi ...4 KB (650 words) - 20:34, 18 October 2024
- == Algorithms and information processing == ...4 KB (339 words) - 11:52, 17 July 2024
- ...cally used. Such systems almost always use [[symmetric key]] cryptographic algorithms. The term PSK is used in [[Wi-Fi]] encryption such as [[Wired Equivalent Pr ...y be eavesdropping on the interaction. Choosing keys used by cryptographic algorithms is somewhat different in that any pattern whatsoever should be avoided, as ...3 KB (462 words) - 16:50, 23 January 2025
- ...both [[user mode|user]] and [[kernel mode]], and also supports all of the algorithms from the CryptoAPI. The Microsoft provider that implements CNG is housed in ...27, 2000 |access-date=January 13, 2010}}</ref> CTR_DRBG is one of the two algorithms in NIST SP 800-90 endorsed by [[Bruce Schneier|Schneier]], the other being ...6 KB (819 words) - 08:17, 27 June 2025
- ...e output of that generator is used to encrypt the plaintext. Block cipher algorithms split the plaintext into fixed-size blocks and encrypt one block at a time. ...aved to [[persistent storage]]. Data at rest is generally encrypted by a [[Symmetric-key algorithm|symmetric key]]. ...10 KB (1,434 words) - 02:44, 27 June 2025
- ..."7-day" export review policies,{{Citation needed|date=November 2014}} when algorithms with larger key lengths could not legally be [[Export of cryptography from All 40-bit and 56-bit encryption algorithms are [[obsolete]], because they are vulnerable to brute force attacks, and t ...5 KB (798 words) - 21:50, 13 August 2024
- ...the [[RSA (cryptosystem)|RSA]] public-key algorithm, several widely used [[symmetric-key algorithm]]s, [[cryptographic hash function]]s, and a cryptographically sec ...3 KB (478 words) - 17:24, 31 March 2025
- ...ily an inner product, not necessarily over [[real number]]s), but standard algorithms may encounter [[division by zero]] in this more general setting. ==Orthogonalization algorithms== ...4 KB (497 words) - 20:48, 17 January 2024
- ...h led a team at Argonne developing EISPACK, initially by translating these algorithms into FORTRAN. [[Jack Dongarra]] joined the team as an undergraduate intern ...3 KB (339 words) - 12:49, 16 June 2025
- ...ng the [[Schreier–Sims algorithm]].<ref>{{citation|title=Permutation Group Algorithms|volume=152|series=Cambridge Tracts in Mathematics|first=Ákos|last=Seress|pu ...'n''</sub> has base size ''n'' − 1), and there are often specialized algorithms that deal with these cases. ...2 KB (348 words) - 15:33, 12 December 2023
- ...'''CAST-128''' (alternatively '''CAST5''') is a [[Symmetric-key algorithm|symmetric-key]] [[block cipher]] used in a number of products, notably as the default [[c | title=CSEC Approved Cryptographic Algorithms for the Protection of Sensitive Information and for Electronic Authenticati ...4 KB (590 words) - 19:55, 13 April 2024
- ...key]] encryption algorithms; however various [[symmetric key encryption]] algorithms achieve a similar property (e.g., [[block ciphers]] when used in a chaining ...tor equal to the public key size. More efficient probabilistic encryption algorithms include [[ElGamal encryption|Elgamal]], [[Paillier]], and various construct ...4 KB (612 words) - 19:08, 11 February 2025
- algorithm used in graph algorithms. It starts with a peripheral node and then [[Category:Graph algorithms]] ...4 KB (628 words) - 14:28, 25 October 2024
- In a symmetric-key system, Bob knows Alice's encryption key. Once the message is encrypted, Al ...ago. Cryptography uses a variety of different types of encryption. Earlier algorithms were performed by hand and are substantially different from modern [[algori ...9 KB (1,263 words) - 21:45, 22 March 2025