Search results
Jump to navigation
Jump to search
Page title matches
- #REDIRECT [[symmetric-key algorithm]] ...37 bytes (3 words) - 19:38, 15 December 2005
- #REDIRECT [[symmetric-key algorithm]] ...37 bytes (3 words) - 19:39, 15 December 2005
Page text matches
- ...om number generation]], [[electronic voting]], [[side-channel attack]]s on cryptography implementations, and anonymizing communications systems. He previously wor * [[Twofish]], a [[Symmetric-key algorithm|symmetric key]] [[block cipher]] ...1 KB (142 words) - 06:23, 23 June 2025
- ...al signature service and encryption key management. Symmetric (secret key) cryptography is used in support of the encryption service. The procedures are intended t {{cryptography-stub}} ...1 KB (167 words) - 17:13, 16 May 2025
- # [[public key cryptography|Asymmetric encryption]] is too slow for many purposes, and all [[symmetric ...2 KB (305 words) - 19:40, 1 February 2025
- ...). Its design was presented by [[Lars Knudsen]] at the [[Selected Areas in Cryptography|SAC]] conference in 1997, and submitted as a proposal to the [[AES contest] ...ption Standard|DES]] as the round function. It has a 128-bit [[block size (cryptography)|block size]] and a variable [[key size]] of either 128, 192, or 256 bits; ...2 KB (307 words) - 07:36, 29 April 2025
- ...variant of the [[Data Encryption Standard|DES]] [[Symmetric-key algorithm|symmetric-key]] [[block cipher]] designed with the intention of speeding up the [[encrypt ...[Feistel cipher|Feistel network]] structure of DES to larger [[block size (cryptography)|block sizes]]. In each round, the DES round function is applied to the rig ...2 KB (276 words) - 07:21, 27 April 2022
- ...=Oorschot|first2=P. van|last3=Vanstone|first3=S.|title=Handbook of Applied Cryptography|year=1997|publisher=CRC Press|isbn=0-8493-8523-7|edition=5th|url-access=reg ...key]] techniques; however both "cipher" and "cryptosystem" are used for [[Symmetric-key algorithm|symmetric key]] techniques. ...4 KB (568 words) - 22:26, 16 January 2025
- ...ncryption''') is a [[probabilistic encryption|probabilistic]] [[Public-key cryptography|public-key]] [[encryption]] scheme. ...s a one-way trapdoor function, two random functions (hash functions) and a symmetric-key encryption (e.g., one-time padding and block-ciphers); ...3 KB (348 words) - 22:25, 27 February 2024
- ...doi-access=free }}</ref> is a protocol or algorithm that is used in many [[cryptography|cryptographic]] [[Protocol (computing)|protocol]]s to generate a sequence w ...2 KB (317 words) - 22:34, 3 October 2023
- In modern [[cryptography]], [[symmetric key algorithm|symmetric key]] [[cipher]]s are generally divi {{Cryptography navbox | block}} ...3 KB (430 words) - 04:03, 4 December 2024
- ...e are various algorithms for both symmetric keys and asymmetric public key cryptography to solve this problem. For key authentication using the traditional [[symmetric key]] cryptography, this is the problem of assuring that there is no [[man-in-the-middle attac ...4 KB (650 words) - 20:34, 18 October 2024
- A [[cryptographic key]] is a string of data that is used to lock or unlock [[cryptography|cryptographic functions]], including [[authentication]], [[authorization]] ...y: Private signature keys are the private keys of asymmetric ([[public-key cryptography|public]]) key pairs that are used by public key algorithms to generate digi ...10 KB (1,496 words) - 15:15, 16 June 2025
- ...[cryptosystem]] intended to reduce the risks inherent in exchanging [[key (cryptography)|key]]s. KDCs often operate in systems within which some users may have per In most (but not all) cases the KDC shares a [[key (cryptography)|key]] with each of all the other parties. ...3 KB (395 words) - 23:20, 30 October 2024
- {{short description|Process of generating keys in cryptography}} '''Key generation''' is the process of generating keys in [[cryptography]]. A key is used to encrypt and decrypt whatever data is being encrypted/de ...5 KB (776 words) - 04:27, 19 May 2025
- ...services to enable developers to secure Windows-based applications using [[cryptography]]. It is a set of [[Dynamic-link library|dynamically linked libraries]] tha ...ey cryptography|public-key]] and [[Symmetric key algorithm|symmetric key]] cryptography, though persistent symmetric keys are not supported. It includes functional ...6 KB (819 words) - 08:17, 27 June 2025
- In [[cryptography]], '''MAGENTA''' is a [[symmetric key algorithm|symmetric key]] [[block cip MAGENTA has a [[block size (cryptography)|block size]] of 128 [[bit]]s and [[key size]]s of 128, 192 and 256 bits. I ...3 KB (380 words) - 14:55, 20 June 2025
- ...rocedure| author=Carlisle M. Adams| year=1997| journal=Designs, Codes, and Cryptography| issue=12| pages=283–316}}</ref> ...me should conjure up images of randomness".<ref>{{cite book| title=Applied Cryptography| url=https://archive.org/details/Applied_Cryptography_2nd_ed._B._Schneier| ...4 KB (590 words) - 19:55, 13 April 2024
- ...ic key algorithms]] (STVL), [[public key algorithm]]s (AZTEC), [[protocol (cryptography)|protocol]] (PROVILAB), secure and efficient implementations (VAMPIRE) and ...s of keys are compared in the document (e.g. RSA keys vs. [[Elliptic curve cryptography|EC]] keys). This "translation table" can be used to roughly equate keys of ...5 KB (702 words) - 08:26, 3 April 2025
- In [[cryptography]], '''SFINKS''' is a [[stream cipher|stream cypher]] [[algorithm]] develope {{Cryptography navbox | stream}} ...2 KB (216 words) - 01:20, 12 March 2025
- In [[symmetric key cryptography]], both parties must possess a secret key which they must exchange prior to In [[public key cryptography]], the [[key (cryptography)|key]] distribution of public keys is done through [[Key server (cryptograp ...3 KB (549 words) - 19:38, 9 January 2025
- {{Short description|Hybrid encryption in cryptography}} ...tion]] scheme which provides [[semantic security]] against an [[Adversary (cryptography)|adversary]] who is able to use [[Chosen-plaintext attack|chosen-plaintext] ...6 KB (949 words) - 17:32, 28 November 2024