Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Cipher 378 found (4545 total)

alternate case: cipher

Block cipher mode of operation (5,828 words) [view diff] exact match in snippet view article find links to article

In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or
Encryption (3,645 words) [view diff] exact match in snippet view article find links to article
theorized a cipher to encode and decode messages to provide a more secure way of military correspondence. The cipher, known today as the Wheel Cipher or the
Symmetric-key algorithm (1,540 words) [view diff] exact match in snippet view article find links to article
use either stream ciphers or block ciphers. Stream ciphers encrypt the digits (typically bytes), or letters (in substitution ciphers) of a message one
Authenticated encryption (2,104 words) [view diff] exact match in snippet view article find links to article
that securely combining separate confidentiality and authentication block cipher operation modes could be error prone and difficult. This was confirmed by
RC4 (5,055 words) [view diff] exact match in snippet view article find links to article
In cryptography, RC4 (Rivest Cipher 4, also known as ARC4 or ARCFOUR, meaning Alleged RC4, see below) is a stream cipher. While it is remarkable for its
Cipher runes (581 words) [view diff] exact match in snippet view article find links to article
Cipher runes, or cryptic runes, are the cryptographical replacement of the letters of the runic alphabet. The knowledge of cipher runes was best preserved
Lucifer (cipher) (749 words) [view diff] exact match in snippet view article
Lucifer was the name given to several of the earliest civilian block ciphers, developed by Horst Feistel and his colleagues at IBM. Lucifer was a direct
Blowfish (cipher) (2,000 words) [view diff] exact match in snippet view article
Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in many cipher suites and encryption products. Blowfish provides
Key schedule (402 words) [view diff] exact match in snippet view article find links to article
In cryptography, the so-called product ciphers are a certain kind of cipher, where the (de-)ciphering of data is typically done as an iteration of rounds
Feistel cipher (1,316 words) [view diff] exact match in snippet view article find links to article
cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the
Lorenz cipher (3,793 words) [view diff] exact match in snippet view article find links to article
The Lorenz SZ40, SZ42a and SZ42b were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz
Camellia (cipher) (1,805 words) [view diff] exact match in snippet view article
In cryptography, Camellia is a symmetric key block cipher with a block size of 128 bits and key sizes of 128, 192 and 256 bits. It was jointly developed
Cryptomeria cipher (675 words) [view diff] exact match in snippet view article find links to article
The Cryptomeria cipher, also called C2, is a proprietary block cipher defined and licensed by the 4C Entity. It is the successor to CSS algorithm (used
Type B Cipher Machine (3,931 words) [view diff] exact match in snippet view article find links to article
for European Characters" (九七式欧文印字機 kyūnana-shiki ōbun injiki) or "Type B Cipher Machine", codenamed Purple by the United States, was an encryption machine
Initialization vector (1,797 words) [view diff] exact match in snippet view article find links to article
between (potentially similar) segments of the encrypted message. For block ciphers, the use of an IV is described by the modes of operation. Some cryptographic
ISO/IEC 10116 (99 words) [view diff] exact match in snippet view article find links to article
of operation for an n-bit block cipher is an international standard that specifies modes of operation for block ciphers of any length. The modes defined
Cipher security summary (801 words) [view diff] exact match in snippet view article find links to article
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly known
Joint Cipher Bureau (339 words) [view diff] exact match in snippet view article find links to article
The Joint Cipher Bureau (JCB) is an agency of the Indian armed forces responsible for signals intelligence and cryptanalysis and coordinating similar activities
Triple DES (2,957 words) [view diff] exact match in snippet view article find links to article
Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The 56-bit key
Twofish (827 words) [view diff] exact match in snippet view article find links to article
In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of
SHARK (224 words) [view diff] exact match in snippet view article find links to article
In cryptography, SHARK is a block cipher identified as one of the predecessors of Rijndael (the Advanced Encryption Standard). SHARK has a 64-bit block
Product cipher (278 words) [view diff] exact match in snippet view article find links to article
In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the individual
KASUMI (2,555 words) [view diff] exact match in snippet view article find links to article
KASUMI is a block cipher used in UMTS, GSM, and GPRS mobile communications systems. In UMTS, KASUMI is used in the confidentiality (f8) and integrity algorithms
GOST (block cipher) (1,455 words) [view diff] exact match in snippet view article
block cipher (Magma), defined in the standard GOST 28147-89 (RFC 5830), is a Soviet and Russian government standard symmetric key block cipher with a
Square (cipher) (125 words) [view diff] exact match in snippet view article
In cryptography, Square (sometimes written SQUARE) is a block cipher invented by Joan Daemen and Vincent Rijmen. The design, published in 1997, is a forerunner
SHARK (224 words) [view diff] exact match in snippet view article find links to article
In cryptography, SHARK is a block cipher identified as one of the predecessors of Rijndael (the Advanced Encryption Standard). SHARK has a 64-bit block
GOST (block cipher) (1,455 words) [view diff] exact match in snippet view article
block cipher (Magma), defined in the standard GOST 28147-89 (RFC 5830), is a Soviet and Russian government standard symmetric key block cipher with a
MacGuffin (cipher) (470 words) [view diff] exact match in snippet view article
In cryptography, MacGuffin is a block cipher created in 1994 by Bruce Schneier and Matt Blaze at a Fast Software Encryption workshop. It was intended as
Hasty Pudding cipher (1,315 words) [view diff] exact match in snippet view article find links to article
The Hasty Pudding cipher (HPC) is a variable-block-size block cipher designed by Richard Schroeppel, which was an unsuccessful candidate in the competition
Galois/Counter Mode (3,051 words) [view diff] exact match in snippet view article find links to article
Mode (GCM) is a mode of operation for symmetric-key cryptographic block ciphers which is widely adopted for its performance. GCM throughput rates for state-of-the-art
S-1 block cipher (191 words) [view diff] exact match in snippet view article find links to article
In cryptography, the S-1 block cipher was a block cipher posted in source code form on Usenet on 11 August 1995. Although incorrect security markings
RC6 (732 words) [view diff] exact match in snippet view article find links to article
In cryptography, RC6 (Rivest cipher 6) is a symmetric key block cipher derived from RC5. It was designed by Ron Rivest, Matt Robshaw, Ray Sidney, and
Anubis (cipher) (525 words) [view diff] exact match in snippet view article
Anubis is a block cipher designed by Vincent Rijmen and Paulo S. L. M. Barreto as an entrant in the NESSIE project, a former research program initiated
ISO/IEC 9797-1 (1,232 words) [view diff] exact match in snippet view article find links to article
Message Authentication Codes (MACs) – Part 1: Mechanisms using a block cipher is an international standard that defines methods for calculating a message
SEED (731 words) [view diff] exact match in snippet view article find links to article
SEED is a block cipher developed by the Korea Information Security Agency (KISA). It is used broadly throughout South Korean industry, but seldom found
M8 (cipher) (1,250 words) [view diff] exact match in snippet view article
In cryptography, M8 is a block cipher designed by Hitachi in 1999. It is a modification of Hitachi's earlier M6 algorithm, designed for greater security
KN-Cipher (200 words) [view diff] exact match in snippet view article find links to article
In cryptography, KN-Cipher is a block cipher created by Kaisa Nyberg and Lars Knudsen in 1995. One of the first ciphers designed to be provably secure
BEAR and LION ciphers (204 words) [view diff] exact match in snippet view article find links to article
The BEAR and LION block ciphers were invented by Ross Anderson and Eli Biham by combining a stream cipher and a cryptographic hash function. The algorithms
MAGENTA (218 words) [view diff] exact match in snippet view article find links to article
In cryptography, MAGENTA is a symmetric key block cipher developed by Michael Jacobson Jr. and Klaus Huber for Deutsche Telekom. The name MAGENTA is an
Nimbus (cipher) (165 words) [view diff] exact match in snippet view article
In cryptography, Nimbus is a block cipher invented by Alexis Machado in 2000. It was submitted to the NESSIE project, but was not selected. The algorithm
Iraqi block cipher (431 words) [view diff] exact match in snippet view article find links to article
In cryptography, the Iraqi block cipher was a block cipher published in C source code form by anonymous FTP upload around July 1999, and widely distributed
MESH (cipher) (169 words) [view diff] exact match in snippet view article
In cryptography, MESH is a block cipher designed in 2002 by Jorge Nakahara, Jr., Vincent Rijmen, Bart Preneel, and Joos Vandewalle. MESH is based directly
UES (cipher) (128 words) [view diff] exact match in snippet view article
In cryptography, UES (Universal Encryption Standard) is a block cipher designed in 1999 by Helena Handschuh and Serge Vaudenay. They proposed it as a transitional
List of DOS commands (5,780 words) [view diff] no match in snippet view article find links to article
This article lists notable commands provided by the MS-DOS disk operating system (DOS), especially as used on an IBM PC compatible computer. Other DOS
Intel Cascade Cipher (452 words) [view diff] exact match in snippet view article find links to article
In cryptography, the Intel Cascaded Cipher is a high bandwidth block cipher, used as an optional component of the Output Content Protection DRM scheme
Crab (cipher) (308 words) [view diff] exact match in snippet view article
In cryptography, Crab is a block cipher proposed by Burt Kaliski and Matt Robshaw at the first Fast Software Encryption workshop in 1993. Not really intended
MARS (cipher) (359 words) [view diff] exact match in snippet view article
MARS is a block cipher that was IBM's submission to the Advanced Encryption Standard process. MARS was selected as an AES finalist in August 1999, after
Q (cipher) (220 words) [view diff] exact match in snippet view article
In cryptography, Q is a block cipher invented by Leslie McBride. It was submitted to the NESSIE project, but was not selected. The algorithm uses a key
ARIA (cipher) (380 words) [view diff] exact match in snippet view article
In cryptography, ARIA is a block cipher designed in 2003 by a large group of South Korean researchers. In 2004, the Korean Agency for Technology and Standards
Kuznyechik (1,741 words) [view diff] exact match in snippet view article find links to article
Kuznyechik (Russian: Кузнечик, literally "grasshopper") is a symmetric block cipher. It has a block size of 128 bits and key length of 256 bits. It is defined
Akelarre (cipher) (333 words) [view diff] exact match in snippet view article
Akelarre is a block cipher proposed in 1996, combining the basic design of IDEA with ideas from RC5. It was shown to be susceptible to a ciphertext-only
PRESENT (708 words) [view diff] exact match in snippet view article find links to article
PRESENT is a lightweight block cipher, developed by the Orange Labs (France), Ruhr University Bochum (Germany) and the Technical University of Denmark
Grand Cru (cipher) (210 words) [view diff] exact match in snippet view article
In cryptography, Grand Cru is a block cipher invented in 2000 by Johan Borst. It was submitted to the NESSIE project, but was not selected. Grand Cru is
E2 (cipher) (160 words) [view diff] exact match in snippet view article
In cryptography, E2 is a symmetric block cipher which was created in 1998 by NTT and submitted to the AES competition. Like other AES candidates, E2 operates
Zodiac (cipher) (238 words) [view diff] exact match in snippet view article
In cryptography, Zodiac is a block cipher designed in 2000 by Chang-Hyi Lee for the Korean firm SoftForum. Zodiac uses a 16-round Feistel network structure
SM4 (cipher) (958 words) [view diff] exact match in snippet view article
ShāngMì 4 (SM4, 商密4) (formerly SMS4) is a block cipher, standardised for commercial cryptography in China. It is used in the Chinese National Standard
M6 (cipher) (283 words) [view diff] exact match in snippet view article
block cipher proposed by Hitachi in 1997 for use in the IEEE 1394 FireWire standard. The design allows some freedom in choosing a few of the cipher's operations
Tiny Encryption Algorithm (1,189 words) [view diff] exact match in snippet view article find links to article
In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable for its simplicity of description and implementation, typically a few lines
RC5 (1,465 words) [view diff] exact match in snippet view article find links to article
is a symmetric-key block cipher notable for its simplicity. Designed by Ronald Rivest in 1994, RC stands for "Rivest Cipher", or alternatively, "Ron's
Khufu and Khafre (839 words) [view diff] exact match in snippet view article find links to article
In cryptography, Khufu and Khafre are two block ciphers designed by Ralph Merkle in 1989 while working at Xerox's Palo Alto Research Center. Along with
Chiasmus (cipher) (153 words) [view diff] exact match in snippet view article
Chiasmus is a secret German government block cipher that was leaked by reverse engineering. It became notorious for its dilettant use in the BSI's software
ICE (cipher) (483 words) [view diff] exact match in snippet view article
cryptography, ICE (Information Concealment Engine) is a symmetric-key block cipher published by Matthew Kwan in 1997. The algorithm is similar in structure
E2 (cipher) (160 words) [view diff] exact match in snippet view article
In cryptography, E2 is a symmetric block cipher which was created in 1998 by NTT and submitted to the AES competition. Like other AES candidates, E2 operates
CRYPTON (210 words) [view diff] exact match in snippet view article find links to article
In cryptography, CRYPTON is a symmetric block cipher submitted as a candidate for the Advanced Encryption Standard (AES). It is very efficient in hardware
MMB (cipher) (204 words) [view diff] exact match in snippet view article
Multiplication-based Block cipher) is a block cipher designed by Joan Daemen as an improved replacement for the IDEA cipher. Modular multiplication is
IDEA NXT (212 words) [view diff] exact match in snippet view article find links to article
cryptography, the IDEA NXT algorithm (previously known as FOX) is a block cipher designed by Pascal Junod and Serge Vaudenay of EPFL (Lausanne, Switzerland)
SAVILLE (247 words) [view diff] exact match in snippet view article find links to article
Mode (also known as Key-Auto-KEY or KAK) and Autoclave Mode (also known as Cipher-Text Auto Key or CTAK). On the AIM microchip, it runs at 4% of the clock
CS-Cipher (126 words) [view diff] exact match in snippet view article find links to article
In cryptography, CS-Cipher (for Chiffrement Symétrique) is a block cipher invented by Jacques Stern and Serge Vaudenay in 1998. It was submitted to the
MISTY1 (455 words) [view diff] exact match in snippet view article find links to article
In cryptography, MISTY1 (or MISTY-1) is a block cipher designed in 1995 by Mitsuru Matsui and others for Mitsubishi Electric. MISTY1 is one of the selected
CAST-256 (331 words) [view diff] exact match in snippet view article find links to article
In cryptography, CAST-256 (or CAST6) is a symmetric-key block cipher published in June 1998. It was submitted as a candidate for the Advanced Encryption
RSA cryptosystem (7,783 words) [view diff] exact match in snippet view article find links to article
insecure public-key cipher published in 1997, designed for educational purposes. Kid-RSA gives insight into RSA and other public-key ciphers, analogous to simplified
Trapdoor function (1,316 words) [view diff] no match in snippet view article find links to article
In theoretical computer science and cryptography, a trapdoor function is a function that is easy to compute in one direction, yet difficult to compute
Mercy (cipher) (209 words) [view diff] exact match in snippet view article
tweakable block cipher designed by Paul Crowley for disk encryption. The block size is 4096 bits—unusually large for a block cipher, but a standard disk
Avalanche effect (568 words) [view diff] exact match in snippet view article find links to article
is the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein if an input is changed slightly
DFC (cipher) (397 words) [view diff] exact match in snippet view article
In cryptography, DFC (Decorrelated Fast Cipher) is a symmetric block cipher which was created in 1998 by a group of researchers from École Normale Supérieure
English Qaballa (1,672 words) [view diff] exact match in snippet view article find links to article
Crowley's Book of the Law. This system has also been referred to as the ALW cipher and the New Aeon English Qabalah (NAEQ) by other writers. In 1904, Aleister
Prince (cipher) (1,376 words) [view diff] exact match in snippet view article
Prince is a block cipher targeting low latency, unrolled hardware implementations. It is based on the so-called FX construction. Its most notable feature
BATON (276 words) [view diff] exact match in snippet view article find links to article
BATON is a Type 1 block cipher in use since at least 1995 by the United States government to secure classified information. While the BATON algorithm itself
Royal cypher (1,955 words) [view diff] exact match in snippet view article find links to article
Ireland: Including the Seamy Side. Xlibris Corporation. ISBN 9781514471333 – via Google Books. "Royal Ciphers on Postboxes: a Brief Guide". April 1, 2018.
Musical notation (8,453 words) [view diff] exact match in snippet view article find links to article
Indonesian musicians and scholars extended cipher notation to other oral traditions, and a diatonic scale cipher notation has become common for notating
The Fate of the Furious (7,408 words) [view diff] exact match in snippet view article find links to article
cyberterrorist Cipher (Theron) coerces him into working for her and turns him against his team, forcing them to find Dom and take down Cipher. The eighth
BaseKing (262 words) [view diff] exact match in snippet view article find links to article
is a block cipher designed in 1994 by Joan Daemen. It is very closely related to 3-Way, as the two are variants of the same general cipher technique.
Simon (cipher) (1,841 words) [view diff] exact match in snippet view article
Simon is a family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013. Simon has been optimized for performance
CIKS-1 (283 words) [view diff] exact match in snippet view article find links to article
In cryptography, CIKS-1 is a block cipher designed in 2002 by A.A. Moldovyan and N.A. Moldovyan. Like its predecessor, Spectr-H64, it relies heavily on
Speck (cipher) (2,411 words) [view diff] exact match in snippet view article
Speck is a family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013. Speck has been optimized for performance
Kalyna (cipher) (350 words) [view diff] exact match in snippet view article
Kalyna (Ukrainian: Калина, Viburnum opulus) is a symmetric block cipher. It supports block sizes of 128, 256 or 512 bits; the key length is either equal
FROG (609 words) [view diff] exact match in snippet view article find links to article
In cryptography, FROG is a block cipher authored by Georgoudis, Leroux and Chaves. The algorithm can work with any block size between 8 and 128 bytes,
Ladder-DES (168 words) [view diff] exact match in snippet view article find links to article
In cryptography, Ladder-DES is a block cipher designed in 1994 by Terry Ritter. It is a 4-round Feistel cipher with a block size of 128 bits, using DES
Distinguishing attack (623 words) [view diff] exact match in snippet view article find links to article
data encrypted by a cipher that allows an attacker to distinguish the encrypted data from random data. Modern symmetric-key ciphers are specifically designed
Dorabella Cipher (1,282 words) [view diff] exact match in snippet view article find links to article
The Dorabella Cipher is an enciphered letter written by composer Edward Elgar to Dora Penny, which was accompanied by another dated July 14, 1897. Penny
The Clue in the Crossword Cipher (154 words) [view diff] exact match in snippet view article find links to article
The Clue in the Crossword Cipher is the forty-fourth volume in the Nancy Drew Mystery Stories series. It was first published in 1967 under the pseudonym
Madryga (717 words) [view diff] exact match in snippet view article find links to article
In cryptography, Madryga is a block cipher published in 1984 by W. E. Madryga. It was designed to be easy and efficient for implementation in software
FEAL (551 words) [view diff] exact match in snippet view article find links to article
In cryptography, FEAL (the Fast data Encipherment Algorithm) is a block cipher proposed as an alternative to the Data Encryption Standard (DES), and designed
Rotor machine (2,462 words) [view diff] exact match in snippet view article find links to article
In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting messages. Rotor machines were the cryptographic
Xmx (410 words) [view diff] exact match in snippet view article find links to article
In cryptography, xmx is a block cipher designed in 1997 by David M'Raïhi, David Naccache, Jacques Stern, and Serge Vaudenay. According to the designers
Ultra (cryptography) (10,384 words) [view diff] exact match in snippet view article
its decrypts from Japanese sources, including the "Purple" cipher. Much of the German cipher traffic was encrypted on the Enigma machine. Used properly
MULTI2 (566 words) [view diff] exact match in snippet view article find links to article
MULTI2 is a block cipher, developed by Hitachi in 1988. Designed for general-purpose cryptography, its current use is encryption of high-definition television
DEAL (185 words) [view diff] exact match in snippet view article find links to article
DEAL (Data Encryption Algorithm with Larger blocks) is a symmetric block cipher derived from the Data Encryption Standard (DES). Its design was presented
COCONUT98 (435 words) [view diff] exact match in snippet view article find links to article
In cryptography, COCONUT98 (Cipher Organized with Cute Operations and N-Universal Transformation) is a block cipher designed by Serge Vaudenay in 1998
CIPHERUNICORN-E (285 words) [view diff] exact match in snippet view article find links to article
In cryptography, CIPHERUNICORN-E is a block cipher created by NEC in 1998. It was among the cryptographic techniques recommended for Japanese government
New Data Seal (258 words) [view diff] exact match in snippet view article find links to article
Data Seal (NDS) is a block cipher that was designed at IBM in 1975, based on the Lucifer algorithm that became DES. The cipher uses a block size of 128
LOKI97 (412 words) [view diff] exact match in snippet view article find links to article
LOKI97 is a block cipher which was a candidate in the Advanced Encryption Standard competition. It is a member of the LOKI family of ciphers, with earlier
Differential-linear attack (385 words) [view diff] exact match in snippet view article find links to article
characteristic over part of the cipher with a probability of 1 (for a few rounds—this probability would be much lower for the whole cipher). The rounds immediately
Spectr-H64 (282 words) [view diff] exact match in snippet view article find links to article
In cryptography, Spectr-H64 is a block cipher designed in 2001 by N. D. Goots, A. A. Moldovyan and N. A. Moldovyan. It relies heavily on the permutation
Madryga (717 words) [view diff] exact match in snippet view article find links to article
In cryptography, Madryga is a block cipher published in 1984 by W. E. Madryga. It was designed to be easy and efficient for implementation in software
NewDES (576 words) [view diff] exact match in snippet view article find links to article
In cryptography, NewDES is a symmetric key block cipher. It was created in 1984–1985 by Robert Scott as a potential DES replacement. Despite its name,
LOKI (723 words) [view diff] exact match in snippet view article find links to article
LOKI91 are symmetric-key block ciphers designed as possible replacements for the Data Encryption Standard (DES). The ciphers were developed based on a body
SHACAL (903 words) [view diff] exact match in snippet view article find links to article
SHACAL) is a 160-bit block cipher based on SHA-1, and supports keys from 128-bit to 512-bit. SHACAL-2 is a 256-bit block cipher based upon the larger hash
REDOC (301 words) [view diff] exact match in snippet view article find links to article
III are block ciphers designed by cryptographer Michael Wood for Cryptech Inc and are optimised for use in software. Both REDOC ciphers are patented.
Substitution–permutation network (958 words) [view diff] exact match in snippet view article find links to article
network (SPN), is a series of linked mathematical operations used in block cipher algorithms such as AES (Rijndael), 3-Way, Kalyna, Kuznyechik, PRESENT, SAFER
MultiSwap (262 words) [view diff] exact match in snippet view article find links to article
In cryptography, MultiSwap is a block cipher/MAC created by Microsoft in 1999 as part of its Windows Media DRM service (WMDRM). Microsoft's internal name
Boomerang attack (864 words) [view diff] exact match in snippet view article find links to article
block ciphers based on differential cryptanalysis. The attack was published in 1999 by David Wagner, who used it to break the COCONUT98 cipher. The boomerang
Key whitening (245 words) [view diff] exact match in snippet view article find links to article
whitening is a technique intended to increase the security of an iterated block cipher. It consists of steps that combine the data with portions of the key. The
Rotational cryptanalysis (315 words) [view diff] exact match in snippet view article find links to article
correlations. Rotational pairs of inputs can thus be used to "see through" the cipher's cascaded ARX operations to a greater degree than might be expected. This
BassOmatic (386 words) [view diff] exact match in snippet view article find links to article
In cryptography, BassOmatic is the symmetric-key cipher designed by Phil Zimmermann as part of his email encryption software PGP (in the first release
LEA (cipher) (2,868 words) [view diff] exact match in snippet view article
Lightweight Encryption Algorithm (also known as LEA) is a 128-bit block cipher developed by South Korea in 2013 to provide confidentiality in high-speed
CLEFIA (208 words) [view diff] exact match in snippet view article find links to article
CLEFIA is a proprietary block cipher algorithm, developed by Sony. Its name is derived from the French word clef, meaning "key". The block size is 128
Truncated differential cryptanalysis (318 words) [view diff] exact match in snippet view article find links to article
generalization of differential cryptanalysis, an attack against block ciphers. Lars Knudsen developed the technique in 1994. Whereas ordinary differential
Interpolation attack (2,288 words) [view diff] exact match in snippet view article find links to article
block ciphers. After the two attacks, differential cryptanalysis and linear cryptanalysis, were presented on block ciphers, some new block ciphers were
Salsa20 (3,577 words) [view diff] exact match in snippet view article find links to article
and the closely related ChaCha are stream ciphers developed by Daniel J. Bernstein. Salsa20, the original cipher, was designed in 2005, then later submitted
GDES (193 words) [view diff] exact match in snippet view article find links to article
DES Scheme (GDES or G-DES) is a variant of the DES symmetric-key block cipher designed with the intention of speeding up the encryption process while
Threefish (1,366 words) [view diff] exact match in snippet view article find links to article
Threefish is a symmetric-key tweakable block cipher designed as part of the Skein hash function, an entry in the NIST hash function competition. Threefish
NUSH (168 words) [view diff] exact match in snippet view article find links to article
In cryptography, NUSH is a block cipher invented by Anatoly Lebedev and Alexey Volchkov for the Russian company LAN Crypto. It was submitted to the NESSIE
DES-X (533 words) [view diff] exact match in snippet view article find links to article
is a variant on the DES (Data Encryption Standard) symmetric-key block cipher intended to increase the complexity of a brute-force attack. The technique
CBC-MAC (2,867 words) [view diff] exact match in snippet view article find links to article
cipher block chaining message authentication code (CBC-MAC) is a technique for constructing a message authentication code (MAC) from a block cipher.
Known-key distinguishing attack (364 words) [view diff] exact match in snippet view article find links to article
attack model against symmetric ciphers, whereby an attacker who knows the key can find a structural property in cipher, where the transformation from
Hermetic Order of the Golden Dawn (4,109 words) [view diff] exact match in snippet view article find links to article
Order of the Golden Dawn, known as the Cipher Manuscripts, are written in English using the Trithemius cipher. The manuscripts give the specific outlines
SC2000 (344 words) [view diff] exact match in snippet view article find links to article
In cryptography, SC2000 is a block cipher invented by a research group at Fujitsu Labs. It was submitted to the NESSIE project, but was not selected. It
Impossible differential cryptanalysis (850 words) [view diff] exact match in snippet view article find links to article
cryptanalysis for block ciphers. While ordinary differential cryptanalysis tracks differences that propagate through the cipher with greater than expected
Key of Solomon (1,608 words) [view diff] no match in snippet view article find links to article
The Key of Solomon (Latin: Clavicula Salomonis; Hebrew: מַפְתֵּחַ-שְׁלֹמֹה, romanized: Map̄teḥ Šəlomo), also known as the Greater Key of Solomon, is a
Impossible differential cryptanalysis (850 words) [view diff] exact match in snippet view article find links to article
cryptanalysis for block ciphers. While ordinary differential cryptanalysis tracks differences that propagate through the cipher with greater than expected
SXAL/MBAL (375 words) [view diff] exact match in snippet view article find links to article
cryptography, SXAL (substitution xor algorithm, sometimes called SXAL8) is a block cipher designed in 1993 by Yokohama-based Laurel Intelligent Systems. It is normally
SEAL (cipher) (140 words) [view diff] exact match in snippet view article
cryptography, SEAL (Software-Optimized Encryption Algorithm) is a stream cipher optimised for machines with a 32-bit word size and plenty of RAM with a
SC2000 (344 words) [view diff] exact match in snippet view article find links to article
In cryptography, SC2000 is a block cipher invented by a research group at Fujitsu Labs. It was submitted to the NESSIE project, but was not selected. It
Type A Cipher Machine (1,108 words) [view diff] exact match in snippet view article find links to article
Typewriter for European Characters") or Angōki Taipu-A (暗号機 タイプA, "Type A Cipher Machine"), codenamed Red by the United States, was a diplomatic cryptographic
FISH (cipher) (150 words) [view diff] exact match in snippet view article
SHrinking) stream cipher is a fast software based stream cipher using Lagged Fibonacci generators, plus a concept from the shrinking generator cipher. It was published
SNOW (699 words) [view diff] exact match in snippet view article find links to article
SNOW is a family of word-based synchronous stream ciphers developed by Thomas Johansson and Patrik Ekdahl at Lund University. They have a 512-bit linear
Scream (cipher) (176 words) [view diff] exact match in snippet view article
The Scream cipher is a word-based stream cipher developed by Shai Halevi, Don Coppersmith and Charanjit Jutla from IBM. The cipher is designed as a software
Hierocrypt (426 words) [view diff] exact match in snippet view article find links to article
In cryptography, Hierocrypt-L1 and Hierocrypt-3 are block ciphers created by Toshiba in 2000. They were submitted to the NESSIE project, but were not
Panama (cryptography) (352 words) [view diff] exact match in snippet view article
cryptographic primitive which can be used both as a hash function and a stream cipher, but its hash function mode of operation has been broken and is not suitable
NOEKEON (251 words) [view diff] exact match in snippet view article find links to article
NOEKEON /ˈnuːki.ɒn/ is a family of two block ciphers designed by Joan Daemen, Michaël Peeters, Gilles Van Assche and Vincent Rijmen and submitted to the
List of Gravity Falls characters (9,021 words) [view diff] exact match in snippet view article find links to article
subject of the real world Cipher Hunt, a scavenger hunt to find a stone statue of Bill. The Mary Sue described Bill Cipher as one of the "sexiest" Tumblr
Permutation box (153 words) [view diff] exact match in snippet view article find links to article
across S-boxes inputs, creating diffusion while transposing. In block ciphers based on substitution-permutation network, the P-boxes, together with the
C-36 (cipher machine) (436 words) [view diff] exact match in snippet view article
C-35 and C-36 were cipher machines designed by Swedish cryptographer Boris Hagelin in the 1930s. These were the first of Hagelin's cipher machines to feature
ChaCha20-Poly1305 (1,509 words) [view diff] exact match in snippet view article find links to article
with associated data (AEAD) algorithm, that combines the ChaCha20 stream cipher with the Poly1305 message authentication code. It has fast software performance
Partitioning cryptanalysis (379 words) [view diff] exact match in snippet view article find links to article
cryptography, partitioning cryptanalysis is a form of cryptanalysis for block ciphers. Developed by Carlo Harpes in 1995, the attack is a generalization of linear
ESTREAM (876 words) [view diff] exact match in snippet view article find links to article
stream ciphers suitable for widespread adoption", organised by the EU ECRYPT network. It was set up as a result of the failure of all six stream ciphers submitted
CRYPTREC (974 words) [view diff] exact match in snippet view article find links to article
"e-Government Recommended Ciphers List", "Candidate Recommended Ciphers List", and "Monitored Ciphers List". Most of the Japanese ciphers listed in the previous
Advanced Encryption Standard process (1,040 words) [view diff] exact match in snippet view article find links to article
The Advanced Encryption Standard (AES), the symmetric block cipher ratified as a standard by National Institute of Standards and Technology of the United
Cipher Bureau (film) (130 words) [view diff] exact match in snippet view article
Cipher Bureau is a 1938 American film directed by Charles Lamont. The film was successful enough to elicit a sequel, Panama Patrol. Philip Waring, the
ISAAC (cipher) (567 words) [view diff] exact match in snippet view article
is a cryptographically secure pseudorandom number generator and a stream cipher designed by Robert J. Jenkins Jr. in 1993. The reference implementation
Cryptographic hash function (6,299 words) [view diff] exact match in snippet view article find links to article
use a block cipher to build a cryptographic hash function, specifically a one-way compression function. The methods resemble the block cipher modes of operation
Stream cipher attacks (1,029 words) [view diff] exact match in snippet view article find links to article
Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive-or operation (xor), can be very secure if used properly.[citation
Secure and Fast Encryption Routine (842 words) [view diff] exact match in snippet view article find links to article
(Secure and Fast Encryption Routine) is the name of a family of block ciphers designed primarily by James Massey (one of the designers of IDEA) on behalf
C-52 (cipher machine) (673 words) [view diff] exact match in snippet view article
(Hagelin) C-52 and CX-52 were cipher machines manufactured by Crypto AG starting 1951/1952. These pin-and-lug type cipher machines were advanced successors
List of Fast & Furious characters (26,542 words) [view diff] exact match in snippet view article find links to article
return for her two sons to rescue his child from Cipher. Once Deckard rescues his son, Dom turns on Cipher and kills Rhodes, avenging Elena's death before
Pike (cipher) (235 words) [view diff] exact match in snippet view article
The Pike stream cipher was invented by Ross Anderson to be a "leaner and meaner" version of FISH after he broke FISH in 1994. Its name is supposed to be
FEA-M (278 words) [view diff] exact match in snippet view article find links to article
cryptography, FEA-M (Fast Encryption Algorithm for Multimedia) is a block cipher developed in 2001 by X. Yi, C. H. Tan, C. K. Siew, and M. R. Syed. With
Treyfer (423 words) [view diff] exact match in snippet view article find links to article
In cryptography, Treyfer is a block cipher/MAC designed in 1997 by Gideon Yuval. Aimed at smart card applications, the algorithm is extremely simple and
WAKE (cipher) (253 words) [view diff] exact match in snippet view article
cryptography, WAKE is a stream cipher designed by David Wheeler in 1993. WAKE stands for Word Auto Key Encryption. The cipher works in cipher feedback mode, generating
Content Scramble System (1,412 words) [view diff] exact match in snippet view article find links to article
commercially produced DVD-Video discs. CSS utilizes a proprietary 40-bit stream cipher algorithm. The system was introduced around 1996 and was first compromised
Trivium (cipher) (1,129 words) [view diff] exact match in snippet view article
Trivium is a synchronous stream cipher designed to provide a flexible trade-off between speed and gate count in hardware, and reasonably efficient software
Cobra ciphers (231 words) [view diff] exact match in snippet view article find links to article
based block ciphers: Cobra-S128, Cobra-F64a, Cobra-F64b, Cobra-H64, and Cobra-H128. In each of these names, the number indicates the cipher's block size
Rabbit (cipher) (640 words) [view diff] exact match in snippet view article
Rabbit is a high-speed stream cipher from 2003. The algorithm and source code was released in 2008 as public domain software. Rabbit was first presented
Davies attack (257 words) [view diff] exact match in snippet view article find links to article
adapted to other Feistel ciphers besides DES. In 1998, Pornin developed techniques for analyzing and maximizing a cipher's resistance to this kind of
Padding (cryptography) (3,307 words) [view diff] exact match in snippet view article
report, Sincerely yours, etc. The primary use of padding with classical ciphers is to prevent the cryptanalyst from using that predictability to find known
Newuniversal (2,340 words) [view diff] exact match in snippet view article find links to article
character Spitfire (Professor Jenny Swensen, later known as Chrome), becomes Cipher (Dr. Jennifer Swann). Artist Salvador Larroca has stated that he "wasn't
Colossus computer (7,190 words) [view diff] exact match in snippet view article find links to article
codebreakers in the years 1943–1945 to help in the cryptanalysis of the Lorenz cipher. Colossus used thermionic valves (vacuum tubes) to perform Boolean and counting
3-subset meet-in-the-middle attack (1,556 words) [view diff] exact match in snippet view article find links to article
cryptology for hash and block cipher cryptanalysis. The 3-subset variant opens up the possibility to apply MITM attacks on ciphers, where it is not trivial
Davies attack (257 words) [view diff] exact match in snippet view article find links to article
adapted to other Feistel ciphers besides DES. In 1998, Pornin developed techniques for analyzing and maximizing a cipher's resistance to this kind of
CWC mode (230 words) [view diff] exact match in snippet view article find links to article
In cryptography, CWC Mode (Carter–Wegman + CTR mode) is an AEAD block cipher mode of operation that provides both encryption and built-in message integrity
Ace Combat Zero: The Belkan War (1,670 words) [view diff] exact match in snippet view article find links to article
"Galm Team", a mercenary fighter squadron led by the player character "Cipher", as they fight to repel an enemy invasion during the titular Belkan War
Grain (cipher) (1,069 words) [view diff] exact match in snippet view article
Grain is a stream cipher submitted to eSTREAM in 2004 by Martin Hell, Thomas Johansson and Willi Meier. It has been selected for the final eSTREAM portfolio
Trivium (cipher) (1,129 words) [view diff] exact match in snippet view article
Trivium is a synchronous stream cipher designed to provide a flexible trade-off between speed and gate count in hardware, and reasonably efficient software
Cobra ciphers (231 words) [view diff] exact match in snippet view article find links to article
based block ciphers: Cobra-S128, Cobra-F64a, Cobra-F64b, Cobra-H64, and Cobra-H128. In each of these names, the number indicates the cipher's block size
JADE (cipher machine) (279 words) [view diff] exact match in snippet view article
War II cipher machine. The Imperial Japanese Navy used the machine for communications from late 1942 until 1944. JADE was similar to another cipher machine
CIPHERUNICORN-A (307 words) [view diff] exact match in snippet view article find links to article
In cryptography, CIPHERUNICORN-A is a block cipher created by NEC in 2000. It was among the cryptographic techniques recommended for Japanese government
A5/1 (2,725 words) [view diff] exact match in snippet view article find links to article
A5/1 is a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard. It is one of several implementations
Āryabhaṭa numeration (602 words) [view diff] no match in snippet view article find links to article
Āryabhaṭa numeration is an alphasyllabic numeral system based on Sanskrit phonemes. It was introduced in the early 6th century in India by Āryabhaṭa, in
Typex (2,010 words) [view diff] exact match in snippet view article find links to article
cryptography, Typex (alternatively, Type X or TypeX) machines were British cipher machines used from 1937. It was an adaptation of the commercial German Enigma
E0 (cipher) (802 words) [view diff] exact match in snippet view article
E0 is a stream cipher used in the Bluetooth protocol. It generates a sequence of pseudorandom numbers and combines it with the data using the XOR operator
KWallet (2,649 words) [view diff] exact match in snippet view article find links to article
such as passwords or IDs and encrypt them through Blowfish symmetric block cipher algorithm or GNU Privacy Guard encryption. KDE Wallet Manager (KWallet)
Chosen-plaintext attack (1,432 words) [view diff] exact match in snippet view article find links to article
information that reduces the security of the encryption scheme. Modern ciphers aim to provide semantic security, also known as ciphertext indistinguishability
SOBER (517 words) [view diff] exact match in snippet view article find links to article
Enabled Register. Initially the cipher was intended as a replacement for broken ciphers in cellular telephony. The ciphers evolved, and other developers
QUAD (cipher) (868 words) [view diff] exact match in snippet view article
In cryptography, the QUAD cipher is a stream cipher which was designed with provable security arguments in mind. QUAD relies on the iteration of a randomly
Key derivation function (1,640 words) [view diff] exact match in snippet view article find links to article
pseudorandom function (which typically uses a cryptographic hash function or block cipher). KDFs can be used to stretch keys into longer keys or to obtain keys of
NESSIE (537 words) [view diff] exact match in snippet view article find links to article
interested", according to a NESSIE project press release. None of the six stream ciphers submitted to NESSIE were selected because every one fell to cryptanalysis
IAPM (mode) (181 words) [view diff] exact match in snippet view article
parallelizable mode (IAPM) is a mode of operation for cryptographic block ciphers. As its name implies, it allows for a parallel mode of operation for higher
A5/2 (561 words) [view diff] exact match in snippet view article find links to article
A5/2 is a stream cipher used to provide voice privacy in the GSM cellular telephone protocol. It was designed in 1992-1993 (finished March 1993) as a replacement
OCB mode (843 words) [view diff] exact match in snippet view article find links to article
an authenticated encryption mode of operation for cryptographic block ciphers. OCB mode was designed by Phillip Rogaway, who credits Mihir Bellare, John
EAX mode (659 words) [view diff] exact match in snippet view article find links to article
(encrypt-then-authenticate-then-translate) is a mode of operation for cryptographic block ciphers. It is an Authenticated Encryption with Associated Data (AEAD) algorithm
World War I cryptography (976 words) [view diff] exact match in snippet view article find links to article
With the rise of easily-intercepted wireless telegraphy, codes and ciphers were used extensively in World War I. The decoding by British Naval intelligence
Message authentication code (1,918 words) [view diff] exact match in snippet view article find links to article
like cryptographic hash functions (as in the case of HMAC) or from block cipher algorithms (OMAC, CCM, GCM, and PMAC). However many of the fastest MAC algorithms
MDC-2 (641 words) [view diff] exact match in snippet view article find links to article
on a block cipher with a proof of security in the ideal-cipher model. The length of the output hash depends on the underlying block cipher used. For a
Achterbahn (stream cipher) (532 words) [view diff] exact match in snippet view article
synchronous stream cipher algorithm submitted to the eSTREAM Project of the eCRYPT network. In the final specification the cipher is called ACHTERBAHN-128/80
Whirlpool (hash function) (1,054 words) [view diff] exact match in snippet view article
Whirlpool is a hash designed after the Square block cipher, and is considered to be in that family of block cipher functions. Whirlpool is a Miyaguchi-Preneel
Time/memory/data tradeoff attack (2,388 words) [view diff] exact match in snippet view article find links to article
other one or two. This type of attack is very difficult, so most of the ciphers and encryption schemes in use were not designed to resist it.[citation
DECT (6,227 words) [view diff] exact match in snippet view article find links to article
The standard also provides encryption services with the DECT Standard Cipher (DSC). The encryption is fairly weak, using a 35-bit initialization vector
NEMA (machine) (488 words) [view diff] exact match in snippet view article
de:Heinrich Emil Weber Geoff Sullivan and Frode Weierud: The Swiss NEMA Cipher Machine. Cryptologia, 23(4), October 1999, pp310–328. Walter Schmid: Die
One-key MAC (919 words) [view diff] exact match in snippet view article find links to article
(OMAC) is a family of message authentication codes constructed from a block cipher much like the CBC-MAC algorithm. It may be used to provide assurance of
Brute-force attack (2,168 words) [view diff] exact match in snippet view article find links to article
technologies have proven their capability in the brute-force attack of certain ciphers. One is modern graphics processing unit (GPU) technology,[page needed]
DES supplementary material (600 words) [view diff] exact match in snippet view article find links to article
the various tables referenced in the Data Encryption Standard (DES) block cipher. All bits and bytes are arranged in big endian order in this document. That
HC-256 (534 words) [view diff] exact match in snippet view article find links to article
HC-256 is a stream cipher designed to provide bulk encryption in software at high speeds while permitting strong confidence in its security. A 128-bit
Crypto-1 (536 words) [view diff] exact match in snippet view article find links to article
Crypto1 is a proprietary encryption algorithm (stream cipher) and authentication protocol created by NXP Semiconductors for its MIFARE Classic RFID contactless
Beale ciphers (4,266 words) [view diff] exact match in snippet view article find links to article
The Beale ciphers are a set of three ciphertexts, one of which allegedly states the location of a buried treasure of gold, silver and jewels estimated
Alex Hirsch (3,459 words) [view diff] exact match in snippet view article find links to article
for which he voices its characters Grunkle Stan, Soos Ramirez, and Bill Cipher, among others. The show has won several BAFTA and Annie Awards. In 2016
Rebound attack (1,939 words) [view diff] exact match in snippet view article find links to article
the attack is to observe a certain differential characteristic in a block cipher (or in a part of it), a permutation or another type of primitive. Finding
Differential fault analysis (401 words) [view diff] exact match in snippet view article find links to article
obtain a secret key. DFA has also been applied successfully to the AES cipher. Many countermeasures have been proposed to defend from these kinds of attacks
M-94 (1,054 words) [view diff] exact match in snippet view article find links to article
back and forth in a frame; with 30 being selected for each cipher session. The strip cipher could interoperate with the M-94 if suitable strips were provided
One-way compression function (3,977 words) [view diff] exact match in snippet view article find links to article
compression functions are often built from block ciphers. Some methods to turn any normal block cipher into a one-way compression function are Davies–Meyer
Variably Modified Permutation Composition (427 words) [view diff] exact match in snippet view article find links to article
Permutation Composition) for cryptography is a stream cipher similar to the well known and popular cipher RC4 designed by Ron Rivest. It was designed by Bartosz
Cipher (manga) (435 words) [view diff] exact match in snippet view article
Cipher is a shōjo manga series written and illustrated by Minako Narita. It was serialized in Hakusensha's LaLa magazine from the February 1985 issue to
MUGI (588 words) [view diff] exact match in snippet view article find links to article
is a pseudorandom number generator (PRNG) designed for use as a stream cipher. It was among the cryptographic techniques recommended for Japanese government
William F. Friedman (2,834 words) [view diff] exact match in snippet view article find links to article
In 1940, subordinates of his led by Frank Rowlett broke Japan's PURPLE cipher, thus disclosing Japanese diplomatic secrets before America's entrance into
Noreen (198 words) [view diff] exact match in snippet view article find links to article
Noreen, or BID 590, was an off-line one-time tape cipher machine of British origin. As well as being used by the United Kingdom, Noreen was used by Canada
HC-9 (191 words) [view diff] exact match in snippet view article find links to article
The HC-9 was a mechanical cipher device manufactured by the Swedish company AB Transvertex. It was designed in the early 1950s for the Swedish Armed Forces
EFF DES cracker (1,031 words) [view diff] exact match in snippet view article find links to article
to perform a brute force search of the Data Encryption Standard (DES) cipher's key space – that is, to decrypt an encrypted message by trying every possible
Biclique attack (3,173 words) [view diff] exact match in snippet view article find links to article
cryptanalysis is based on MITM attacks, it is applicable to both block ciphers and (iterated) hash-functions. Biclique attacks are known for having weakened
DRYAD (646 words) [view diff] exact match in snippet view article find links to article
The DRYAD Numeral Cipher/Authentication System (KTC 1400 D) is a simple, paper cryptographic system employed by the U.S. military for authentication and
Fialka (1,494 words) [view diff] exact match in snippet view article find links to article
In cryptography, Fialka (M-125) is the name of a Cold War-era Soviet cipher machine. A rotor machine, the device uses 10 rotors, each with 30 contacts
Cipher Manuscripts (1,760 words) [view diff] exact match in snippet view article find links to article
The Cipher Manuscripts are a collection of 60 folios containing the structural outline of a series of magical initiation rituals corresponding to the spiritual
Merkle–Hellman knapsack cryptosystem (1,852 words) [view diff] exact match in snippet view article find links to article
Kademlia Mix network Mathematics Cryptographic hash function Block cipher Stream cipher Symmetric-key algorithm Authenticated encryption Public-key cryptography
PMAC (cryptography) (124 words) [view diff] exact match in snippet view article
taking a block cipher and creating an efficient message authentication code that is reducible in security to the underlying block cipher. PMAC is similar
Integral cryptanalysis (716 words) [view diff] exact match in snippet view article find links to article
cryptanalysis is a cryptanalytic attack that is particularly applicable to block ciphers based on substitution–permutation networks. It was originally designed
OMI cryptograph (149 words) [view diff] exact match in snippet view article find links to article
The OMI cryptograph was a rotor cipher machine produced and sold by Italian firm Ottico Meccanica Italiana (OMI) in Rome. The machine had seven rotors
Poly1305 (2,513 words) [view diff] exact match in snippet view article find links to article
crypto_secretbox_xsalsa20poly1305 authenticated cipher, and then using ChaCha in the ChaCha20-Poly1305 authenticated cipher deployed in TLS on the internet. Poly1305
MICKEY (677 words) [view diff] exact match in snippet view article find links to article
KEYstream generator (MICKEY) is a stream cipher algorithm developed by Steve Babbage and Matthew Dodd. The cipher is designed to be used in hardware platforms
Index of cryptography articles (2,932 words) [view diff] exact match in snippet view article find links to article
cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis • Adaptive chosen-ciphertext
Key (cryptography) (1,524 words) [view diff] exact match in snippet view article
logarithms which aim to have security equivalent to a 128 bit symmetric cipher." To prevent a key from being guessed, keys need to be generated randomly
General der Nachrichtenaufklärung Training Referat (4,162 words) [view diff] exact match in snippet view article find links to article
substitution ciphers is a generalisation of the Caesar cipher where there can be any permutation of the alphabet. For the simple substitution cipher there are
Meet-in-the-middle attack (3,219 words) [view diff] exact match in snippet view article find links to article
space and 2112 operations. When trying to improve the security of a block cipher, a tempting idea is to encrypt the data several times using multiple keys
Pinwheel (cryptography) (378 words) [view diff] exact match in snippet view article
bits (determined by the machine's initial settings), as a component in a cipher machine. A pinwheel consisted of a rotating wheel with a certain number
Orville Ward Owen (972 words) [view diff] exact match in snippet view article find links to article
called a "cipher wheel". The alleged discoveries were published in Owen's multi-volume work Sir Francis Bacon's Cipher Story (1893–95). Owen's "cipher wheel"
Doulos SIL (161 words) [view diff] exact match in snippet view article find links to article
cousin specially designed for numbered musical notation named Doulos SIL Cipher. "Linux.com :: Smart Unicode typefaces released under free license". linux
KL-7 (1,306 words) [view diff] exact match in snippet view article find links to article
cipher machine to use electronics (vacuum tubes), apart from the British ROCKEX, which was developed during World War 2. It was also the first cipher
Shared secret (239 words) [view diff] exact match in snippet view article find links to article
Cryptography General History of cryptography Outline of cryptography Classical cipher Cryptographic protocol Authentication protocol Cryptographic primitive Cryptanalysis
National Pigeon Service (756 words) [view diff] exact match in snippet view article find links to article
that dead cipher pigeon...Cipher Mysteries "Wanted for one last mission: call for Bletchley Park codebreakers to crack the D-Day pigeon cipher". Telegraph
Rockex (333 words) [view diff] exact match in snippet view article find links to article
Rockex, or Telekrypton, was an offline one-time tape Vernam cipher machine known to have been used by Britain and Canada from 1943. It was developed by
F-FCSR (121 words) [view diff] exact match in snippet view article find links to article
cryptography, F-FCSR is a stream cipher developed by Thierry Berger, François Arnault, and Cédric Lauradoux. The core of the cipher is a Feedback with Carry Shift
Key (cryptography) (1,524 words) [view diff] exact match in snippet view article
logarithms which aim to have security equivalent to a 128 bit symmetric cipher." To prevent a key from being guessed, keys need to be generated randomly
Schlüsselgerät 39 (2,388 words) [view diff] exact match in snippet view article find links to article
The Schlüsselgerät 39 (SG-39) was an electrically operated rotor cipher machine, invented by the German Fritz Menzer during World War II. The device was
VMAC (742 words) [view diff] exact match in snippet view article find links to article
VMAC is a block cipher-based message authentication code (MAC) algorithm using a universal hash proposed by Ted Krovetz and Wei Dai in April 2007. The
Arabesque (film) (1,819 words) [view diff] exact match in snippet view article
written by Julian Mitchell, Stanley Price, and Peter Stone based on The Cipher, a 1961 novel by Alex Gordon (pseudonym of Gordon Cotler [fr]). The film
Data Authentication Algorithm (129 words) [view diff] exact match in snippet view article find links to article
last cipher block truncated and used as the DAC. The DAA is equivalent to ISO/IEC 9797-1 MAC algorithm 1, or CBC-MAC, with DES as the underlying cipher, truncated
Timing attack (1,611 words) [view diff] exact match in snippet view article find links to article
Cryptomeria/C2 CRYPTON CS-Cipher DEAL DES-X DFC E2 FEAL FEA-M FROG G-DES Grand Cru Hasty Pudding cipher Hierocrypt ICE IDEA NXT Intel Cascade Cipher Iraqi Kalyna KASUMI
Otto Buggisch (3,218 words) [view diff] exact match in snippet view article find links to article
mathematician who, during World War II, was a cryptanalyst working in the cipher bureau, the Cipher Department of the High Command of the Wehrmacht (OKW/Chi) responsible
Common Scrambling Algorithm (1,222 words) [view diff] exact match in snippet view article find links to article
distinct ciphers: a block cipher and a stream cipher. When used in encryption mode the data are first encrypted using the 64-bit block cipher in CBC mode
ORYX (345 words) [view diff] exact match in snippet view article find links to article
cellular communications in order to protect data traffic. It is a stream cipher designed to have a very strong 96-bit key strength with a way to reduce
Keystream (259 words) [view diff] exact match in snippet view article find links to article
arithmetic. Keystreams are used in the one-time pad cipher and in most stream ciphers. Block ciphers can also be used to produce keystreams. For instance
Black Chamber (732 words) [view diff] exact match in snippet view article find links to article
Chamber, officially the Cable and Telegraph Section and also known as the Cipher Bureau,[clarification needed] was the first peacetime cryptanalytic organization
List of Indian intelligence agencies (2,355 words) [view diff] exact match in snippet view article find links to article
Hindustan Times". Archived from the original on 19 January 2014. "Indian Joint Cipher Bureau | 2 Authors | 6 Publications | Related Institutions". SciSpace -
Wilhelm Fenner (3,020 words) [view diff] exact match in snippet view article find links to article
cryptanalyst, before and during the time of World War II in the OKW/Chi, the Cipher Department of the High Command of the Wehrmacht, working within the main
Piling-up lemma (1,445 words) [view diff] exact match in snippet view article find links to article
cryptanalysis to construct linear approximations to the action of block ciphers. It was introduced by Mitsuru Matsui (1993) as an analytical tool for linear
The Apple Cart (1,338 words) [view diff] exact match in snippet view article find links to article
and the platform: in short, to reduce him to a cipher. The King's reply is that rather than be a cipher he will abandon his throne and take his obviously
KG-84 (265 words) [view diff] exact match in snippet view article find links to article
improved HF performance, synchronous out-of-sync detection, asynchronous cipher text, plain text, bypass, and European TELEX protocol. The KG-84 (A/C) is
FreeOTFE (819 words) [view diff] exact match in snippet view article find links to article
(AES) finalists, and all ciphers can be used with multiple different keylengths. FreeOTFE originally offered encryption using cipher-block chaining (CBC)
Erich Fellgiebel (1,007 words) [view diff] exact match in snippet view article find links to article
plot to assassinate the Fuhrer. In 1929, Fellgiebel became head of the cipher bureau (German: Chiffrierstelle) of the Ministry of the Reichswehr, which
Correlation immunity (328 words) [view diff] exact match in snippet view article find links to article
< n {\displaystyle 0\leq i_{1}<\ldots <i_{k}<n} . When used in a stream cipher as a combining function for linear feedback shift registers, a Boolean function
Kerberos (protocol) (3,023 words) [view diff] exact match in snippet view article
username and symmetric cipher and compares it with the data from the database. Login was a success if the cipher matches the cipher that is stored for the
Alias season 2 (985 words) [view diff] exact match in snippet view article find links to article
Sloane is made a full partner in the malevolent Alliance of Twelve. 25 3 "Cipher" Dan Attias Alex Kurtzman & Roberto Orci October 13, 2002 (2002-10-13) 9
Disk encryption theory (3,772 words) [view diff] exact match in snippet view article find links to article
the ciphers' block-size (typically 128 bits). Modes are therefore rules on how to repeatedly apply the ciphers' single-block operations. Cipher-block
Theo Travis (1,983 words) [view diff] exact match in snippet view article find links to article
Days in 1994, and, since 1999, with varying guest musicians in their band Cipher which collaborated with Bill Nelson in both the latter's improvisational
Bcrypt (2,863 words) [view diff] exact match in snippet view article find links to article
designed by Niels Provos and David Mazières. It is based on the Blowfish cipher and presented at USENIX in 1999. Besides incorporating a salt to protect
Random oracle (1,773 words) [view diff] exact match in snippet view article find links to article
A with probability 1. An ideal cipher is a random permutation oracle that is used to model an idealized block cipher. A random permutation decrypts each
RadioGatún (1,559 words) [view diff] exact match in snippet view article find links to article
using eight bytes). Although RadioGatún is a derivative of Panama, a stream cipher and hash construction from the late 1990s whose hash construction has been
One Piece (14,342 words) [view diff] exact match in snippet view article find links to article
protects the known seas from pirates and other criminals. There is also Cipher Pol which is a group of agencies within the World Government that are their
Zero stroke (727 words) [view diff] exact match in snippet view article find links to article
Zero stroke or cipher stroke was an alleged mental disorder, reportedly diagnosed by physicians in Germany during the hyperinflation in the Weimar Republic
One Piece (14,342 words) [view diff] exact match in snippet view article find links to article
protects the known seas from pirates and other criminals. There is also Cipher Pol which is a group of agencies within the World Government that are their
Theo Travis (1,983 words) [view diff] exact match in snippet view article find links to article
Days in 1994, and, since 1999, with varying guest musicians in their band Cipher which collaborated with Bill Nelson in both the latter's improvisational
Random oracle (1,773 words) [view diff] exact match in snippet view article find links to article
A with probability 1. An ideal cipher is a random permutation oracle that is used to model an idealized block cipher. A random permutation decrypts each
RadioGatún (1,559 words) [view diff] exact match in snippet view article find links to article
using eight bytes). Although RadioGatún is a derivative of Panama, a stream cipher and hash construction from the late 1990s whose hash construction has been
List of Martin Gardner Mathematical Games columns (355 words) [view diff] exact match in snippet view article find links to article
for all entries in the main table Gardner, Martin (1977). "A new kind of cipher that would take millions of years to break" (PDF). math.upenn.edu. Retrieved
Secure Communications Interoperability Protocol (1,280 words) [view diff] exact match in snippet view article find links to article
SCIP uses a block cipher operating in counter mode. A new Traffic Encryption Key (TEK) is negotiated for each call. The block cipher is fed a 64-bit state
Characters of the Metal Gear series (30,380 words) [view diff] exact match in snippet view article find links to article
different from Coldman or Cipher. Emmerich is accused by Diamond Dogs of murdering Strangelove and facilitating the attack on MSF for Cipher in exchange for his
Robert Maskell Patterson (656 words) [view diff] no match in snippet view article find links to article
Robert Maskell Patterson (March 23, 1787 – September 5, 1854) was an American professor of mathematics, chemistry and natural philosophy at the University
SIGCUM (1,103 words) [view diff] exact match in snippet view article find links to article
SIGCUM, also known as Converter M-228, was a rotor cipher machine used to encrypt teleprinter traffic by the United States Army. Hastily designed by William
BID 770 (82 words) [view diff] exact match in snippet view article find links to article
v t e Cipher machines Rotor machines CCM Enigma M-125 Fialka Hebern HX-63 KL-7 Lacida M-325 Mercury NEMA OMI RED SG-39 SG-41 SIGABA SIGCUM Singlet Typex
Fritz Menzer (1,557 words) [view diff] exact match in snippet view article find links to article
Wehrmacht signals intelligence agency, later working in (OKW/ Chi) that was the cipher bureau of the supreme command of the Nazi party, and later in Abwehr, the
EncFS (1,555 words) [view diff] exact match in snippet view article find links to article
uses whatever ciphers it is able to locate in various encryption libraries on the system. Blowfish and AES are typically available. The cipher key length
STU-II (190 words) [view diff] exact match in snippet view article find links to article
v t e Cipher machines Rotor machines CCM Enigma M-125 Fialka Hebern HX-63 KL-7 Lacida M-325 Mercury NEMA OMI RED SG-39 SG-41 SIGABA SIGCUM Singlet Typex
HX-63 (315 words) [view diff] exact match in snippet view article find links to article
2021). "The Scandalous History of the Last Rotor Cipher Machine". IEEE. Retrieved September 15, 2021. Cipher A. Deavours; Louis Kruh (1 January 1985). Machine
Young X-Men (1,265 words) [view diff] exact match in snippet view article find links to article
herself at the end of Young X-Men #8, however her codename is spelled "Cipher," rather than "Cypher" (as it is spelled in earlier mentions). She had come
Cryptanalysis of the Lorenz cipher (8,661 words) [view diff] exact match in snippet view article find links to article
Cryptanalysis of the Lorenz cipher was the process that enabled the British to read high-level German army messages during World War II. The British Government
Erhard Maertens (2,574 words) [view diff] exact match in snippet view article find links to article
intelligence, and specifically, overrating the security of the Naval Enigma cipher machine. In 1941, he held a naval enquiry into the strength of Naval Enigma
Walter Fricke (2,301 words) [view diff] exact match in snippet view article find links to article
the OKW/Chi Section IIb. His specialty was the production of codes and ciphers, and the security studies of Army systems. After the war he was director
Advanced Systems Format (714 words) [view diff] exact match in snippet view article find links to article
elliptic curve cryptography key exchange, DES block cipher, a custom block cipher, RC4 stream cipher and the SHA-1 hashing function. ASF container-based
Pike (694 words) [view diff] exact match in snippet view article find links to article
(cipher), a stream cipher invented by Ross Anderson Pike (programming language), a programming language Red Pike (cipher), a British government cipher
Numbered musical notation (3,338 words) [view diff] exact match in snippet view article find links to article
'simplified notation', not to be confused with the integer notation) is a cipher notation system used in mainland China, Taiwan, Hong Kong, and to some extent
5-UCO (329 words) [view diff] exact match in snippet view article find links to article
The 5-UCO (5-Unit Controlled) was an on-line one-time tape Vernam cipher encryption system developed by the UK during World War II for use on teleprinter
Magic (cryptography) (5,378 words) [view diff] exact match in snippet view article
RED and BLUE, but a machine-generated code similar to Germany's Enigma cipher. Decoding was slow and much of the traffic was still hard to break. By the
Shrinking generator (573 words) [view diff] exact match in snippet view article find links to article
a form of pseudorandom number generator intended to be used in a stream cipher. It was published in Crypto 1993 by Don Coppersmith, Hugo Krawczyk and Yishay
Quantum cryptography (9,126 words) [view diff] exact match in snippet view article find links to article
see Quantum readout of PUFs), etc. H. P. Yuen presented Y-00 as a stream cipher using quantum noise around 2000 and applied it for the U.S. Defense Advanced
Otto Leiberich (670 words) [view diff] exact match in snippet view article find links to article
Guido Hoheisel. Leiberich joined the newly established post war German cipher bureau that from 1956 on was called the Central Cryptography Office (German:
Cipha Sounds (1,125 words) [view diff] no match in snippet view article find links to article
Cipha Sounds (born Luis Diaz; on April 19, 1976) is an American DJ, comedian, and radio and television personality of Puerto Rican descent. He is mostly
Kryha (433 words) [view diff] case mismatch in snippet view article find links to article
doi:10.1080/01611194.2010.485440. Kruh, Louis (1985). "THE KRYHA LILIPUT CIPHERING MACHINE". Cryptologia. 9 (3): 252-261. doi:10.1080/0161-118591859988.
Correlation attack (2,299 words) [view diff] exact match in snippet view article find links to article
are a class of cryptographic known-plaintext attacks for breaking stream ciphers whose keystreams are generated by combining the output of several linear-feedback
Bar mitzvah attack (277 words) [view diff] exact match in snippet view article find links to article
the SSL/TLS protocols that exploits the use of the RC4 cipher with weak keys for that cipher. While this affects only the first hundred or so bytes of
Lai–Massey scheme (910 words) [view diff] exact match in snippet view article find links to article
of block ciphers, an alternative to the Feistel network for converting a non-invertible keyed round function to an invertible keyed cipher. It is used
Elliptic-curve Diffie–Hellman (2,168 words) [view diff] exact match in snippet view article find links to article
then be used to encrypt subsequent communications using a symmetric-key cipher. It is a variant of the Diffie–Hellman protocol using elliptic-curve cryptography
M-325 (237 words) [view diff] exact match in snippet view article find links to article
M-325 The M-325 (SIGFOY) cipher machine was inspired by the German Enigma Date invented 1944 Type rotor machine
Niels Ferguson (273 words) [view diff] exact match in snippet view article find links to article
Ferguson has contributed to is the AES finalist block cipher algorithm Twofish as well as the stream cipher Helix and the Skein hash function. In 1999, Niels
SHA-2 (4,982 words) [view diff] exact match in snippet view article find links to article
itself built using the Davies–Meyer structure from a specialized block cipher. SHA-2 includes significant changes from its predecessor, SHA-1. The SHA-2
BID/60 (99 words) [view diff] exact match in snippet view article find links to article
v t e Cipher machines Rotor machines CCM Enigma M-125 Fialka Hebern HX-63 KL-7 Lacida M-325 Mercury NEMA OMI RED SG-39 SG-41 SIGABA SIGCUM Singlet Typex
Sezzadio (213 words) [view diff] exact match in snippet view article find links to article
1428. Mark Knowles[who?] argues that Antonio was the author of the Voynich cipher manuscript. The large parish church was built from 1900 in neo-Gothic style
Mohsen Namjoo (2,057 words) [view diff] exact match in snippet view article find links to article
بوسه‌های بیهوده 2014 Trust the Tangerine Peel از پوست نارنگی مدد 2016 Personal Cipher صفر شخصی 2018 On the String of the Tear's Bow بر چلّه کمان اشک 2019 Phantasm
Secure Terminal Equipment (454 words) [view diff] exact match in snippet view article find links to article
v t e Cipher machines Rotor machines CCM Enigma M-125 Fialka Hebern HX-63 KL-7 Lacida M-325 Mercury NEMA OMI RED SG-39 SG-41 SIGABA SIGCUM Singlet Typex
Kathe Koja (1,659 words) [view diff] exact match in snippet view article find links to article
in The Cipher, Bad Brains, "Teratisms," The Blue Mirror, etc.). Koja won the Bram Stoker Award and the Locus Award for her first novel The Cipher, and a
List of Pokémon characters (7,176 words) [view diff] no match in snippet view article find links to article
This is a list of recurring characters in the Pokémon video game series. Characters may appear in multiple continuities within the Pokémon franchise, such
Erich Hüttenhain (1,297 words) [view diff] exact match in snippet view article find links to article
the Third Reich. He was Head of the cryptanalysis unit at OKW/Chi, the Cipher Department of the High Command of the Wehrmacht. Hüttenhain was the son
Bombe (7,962 words) [view diff] exact match in snippet view article find links to article
kryptologiczna), which had been designed in Poland at the Biuro Szyfrów (Cipher Bureau) by cryptologist Marian Rejewski, who had been breaking German Enigma
The Alphabet Cipher (734 words) [view diff] exact match in snippet view article find links to article
Cipher" was a brief study published by Lewis Carroll in 1868, describing how to use the alphabet to send encrypted codes. It was one of four ciphers he
Format-preserving encryption (2,991 words) [view diff] exact match in snippet view article find links to article
definition of an n-bit block cipher). For such finite domains, and for the purposes of the discussion below, the cipher is equivalent to a permutation
Cipher in the Snow (356 words) [view diff] exact match in snippet view article find links to article
Cipher in the Snow is a short story written by Jean Mizer Todhunter about the death of an ostracized teenager. It was later made into a short film by Brigham
Dave Sturt (773 words) [view diff] exact match in snippet view article find links to article
for many years with Theo Travis in Cipher, producing three albums and several scores to silent films. Prior to Cipher, the pair had worked together in the
Gamelan notation (1,430 words) [view diff] exact match in snippet view article find links to article
the 19th century, initially for archival purposes. Kepatihan is a type of cipher musical notation that was devised for the notation of the Indonesian gamelan
Wilhelm Tranow (1,577 words) [view diff] exact match in snippet view article find links to article
Cipher No. 2 (German Code Name: Köln (Cologne)) (Naval Cypher) was introduced. From September 1941, Tranow reconstructed the codebook of Naval Cipher
Södermanland Runic Inscription 47 (183 words) [view diff] exact match in snippet view article find links to article
Nyköping Municipality. The inscription consists of both long branch runes and cipher runes ("branch" and "ice" types). ...(ʀ)-kʀ [Hrø]ʀ[i]kʀ :   kiarþi giærði
Challenge–response authentication (1,540 words) [view diff] exact match in snippet view article find links to article
methods are unavailable, the U.S. military uses the AKAC-1553 TRIAD numeral cipher to authenticate and encrypt some communications. TRIAD includes a list of
Cipher Hunt (5,548 words) [view diff] exact match in snippet view article find links to article
The Cipher Hunt was an alternate reality game and international scavenger hunt created by storyboard artist and voice actor Alex Hirsch based on his animated
ISO/IEC 18014 (272 words) [view diff] exact match in snippet view article find links to article
Kademlia Mix network Mathematics Cryptographic hash function Block cipher Stream cipher Symmetric-key algorithm Authenticated encryption Public-key cryptography
Benji, Zax & the Alien Prince (2,059 words) [view diff] exact match in snippet view article find links to article
Antarians must wear a special bracelet known as a cipher. In the episode "The Locals", Prince Yubi's cipher is stolen by a gang of boys known as "The Vikings"
Efficient Probabilistic Public-Key Encryption Scheme (323 words) [view diff] exact match in snippet view article find links to article
functions) and a symmetric-key encryption (e.g., one-time padding and block-ciphers); EPOC-3 uses the Okamoto–Uchiyama one-way trapdoor function and two random
DUDEK (369 words) [view diff] exact match in snippet view article find links to article
respectively. Jan Bury, From the Archives: Inside a Cold War Crypto Cell. Polish Cipher Bureau in the 1980s, Cryptologia 32(4), October 2008, pp. 351–367. A T-352
Land of Talk (2,033 words) [view diff] exact match in snippet view article find links to article
recuperation period to write and record the next album, titled Cloak and Cipher. It was released on August 24, 2010, on Saddle Creek Records. It has contributions
VINSON (176 words) [view diff] exact match in snippet view article find links to article
v t e Cipher machines Rotor machines CCM Enigma M-125 Fialka Hebern HX-63 KL-7 Lacida M-325 Mercury NEMA OMI RED SG-39 SG-41 SIGABA SIGCUM Singlet Typex
STU-I (71 words) [view diff] exact match in snippet view article find links to article
v t e Cipher machines Rotor machines CCM Enigma M-125 Fialka Hebern HX-63 KL-7 Lacida M-325 Mercury NEMA OMI RED SG-39 SG-41 SIGABA SIGCUM Singlet Typex
Newark (237 words) [view diff] exact match in snippet view article find links to article
Roman Catholic Archdiocese of Newark, New Jersey Newark cipher, a variation of the Pigpen cipher system Newark Park, a country house and estate in Gloucestershire
The Purple Cipher (132 words) [view diff] exact match in snippet view article find links to article
The Purple Cipher is a 1920 American silent mystery film directed by Chester Bennett and starring Earle Williams, Vola Vale and Ernest Shields. Shot by
STU-III (1,449 words) [view diff] exact match in snippet view article find links to article
STU-III/Inter Working Function (IWF) STU-III/Secure Data Device (SDD) STU-III/CipherTAC 2000 (CTAC) Most STU-III units were built for use with what NSA calls
Charles Wheatstone (6,389 words) [view diff] exact match in snippet view article find links to article
stereoscope (a device for displaying three-dimensional images) and the Playfair cipher (an encryption technique). Charles Wheatstone was born in Barnwood, Gloucestershire
KY-3 (229 words) [view diff] exact match in snippet view article find links to article
v t e Cipher machines Rotor machines CCM Enigma M-125 Fialka Hebern HX-63 KL-7 Lacida M-325 Mercury NEMA OMI RED SG-39 SG-41 SIGABA SIGCUM Singlet Typex
GTRI Cyber Technology and Information Security Laboratory (200 words) [view diff] case mismatch in snippet view article find links to article
Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory (CIPHER) is one of eight labs in the Georgia Tech Research Institute. It was created
Hidden message (957 words) [view diff] exact match in snippet view article find links to article
hidden visual messages and symbolic or cryptic codes such as a crossword or cipher. Although there are many legitimate examples of hidden messages created
C. Lorenz AG (2,181 words) [view diff] exact match in snippet view article find links to article
new cipher machine that would allow communication by radio in extreme secrecy. Called the Schlüsselzusatz (cipher attachment), the Lorenz cipher machine
KY-58 (122 words) [view diff] exact match in snippet view article find links to article
v t e Cipher machines Rotor machines CCM Enigma M-125 Fialka Hebern HX-63 KL-7 Lacida M-325 Mercury NEMA OMI RED SG-39 SG-41 SIGABA SIGCUM Singlet Typex
CBC (545 words) [view diff] exact match in snippet view article find links to article
found in cannabis Cap binding complex, a protein complex Cipher block chaining, a block cipher mode of operation Common Booster Core, part of a Delta IV
Kupyna (540 words) [view diff] exact match in snippet view article find links to article
Even–Mansour cipher. The compression function consists of two fixed permutations, T⊕ and T+, which are taken from the Kalyna block cipher and consist of
Scrypt (1,659 words) [view diff] exact match in snippet view article find links to article
scrypt General Designers Colin Percival First published 2009 Cipher detail Digest sizes variable Block sizes variable Rounds variable
Don Coppersmith (428 words) [view diff] exact match in snippet view article find links to article
mathematician. He was involved in the design of the Data Encryption Standard block cipher at IBM, particularly the design of the S-boxes, strengthening them against
Grøstl (570 words) [view diff] exact match in snippet view article find links to article
permutation functions P and Q are heavily based on the Rijndael (AES) block cipher, but operate on 8×8 or 8×16 arrays of bytes, rather than 4×4. Like AES,
Wilhelm Gimmler (708 words) [view diff] exact match in snippet view article find links to article
responsibility for the monthly distribution of keys for the Enigma I rotor cipher machine. From October 1934 to October 1935, Gimmler was commanding officer
Peter Novopashenny (751 words) [view diff] exact match in snippet view article find links to article
as a cryptanalyst during World War II for the German Wehrmacht (OKW/Chi) cipher bureau, working on the Russian desk, deciphering enciphered Soviet communications
SM3 (hash function) (335 words) [view diff] exact match in snippet view article
Retrieved 2022-07-30. Wang Xiaoyun. SM3 Cryptographic Hash Algorithm[J]. Journal of Information Security Research, 2016, 2(11): 983-994. SM4 (cipher) v t e
Everything Is Everything (Brand Nubian album) (510 words) [view diff] exact match in snippet view article
(featuring Busta Rhymes) Murphy Anthony Best Buckwild 4:16 6. "Step into da Cipher" (featuring Serge, Maestro Manny and Snagglepuss) DeChalus Murphy Lord Jamar
Cryptologia (130 words) [view diff] exact match in snippet view article find links to article
subject. The founding editors were Brian J. Winkel, David Kahn, Louis Kruh, Cipher A. Deavours and Greg Mellen. The current Editor-in-Chief is Craig Bauer
Skein (hash function) (822 words) [view diff] exact match in snippet view article
Callas and Jesse Walker. Skein is based on the Threefish tweakable block cipher compressed using Unique Block Iteration (UBI) chaining mode, a variant of
BLAKE (hash function) (2,888 words) [view diff] exact match in snippet view article
cryptographic hash function based on Daniel J. Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with round constants, is
Ferdinand Voegele (565 words) [view diff] exact match in snippet view article find links to article
before and during the time of World War II and who would eventually lead the cipher bureau of the Luftwaffe Signal Intelligence Service (German: Oberbefehlshaber
CCMP (cryptography) (594 words) [view diff] exact match in snippet view article
Counter Mode Cipher Block Chaining Message Authentication Code Protocol (Counter Mode CBC-MAC Protocol) or CCM mode Protocol (CCMP) is an authenticated
Agnes Meyer Driscoll (1,572 words) [view diff] exact match in snippet view article find links to article
to making and breaking ciphers. In her first days in the Code and Signal section, she co-developed one of the U.S. Navy's cipher machines, the "Communications
Steganography (6,107 words) [view diff] exact match in snippet view article find links to article
In his work Polygraphiae, Johannes Trithemius developed his Ave Maria cipher that can hide information in a Latin praise of God.[better source needed]
Hugo Kettler (149 words) [view diff] exact match in snippet view article find links to article
German Army. In October 1943, Kettler became director of the OKW/Chi, the cipher Department of the High Command of the Wehrmacht. Kettler remained in command
Cryptographic protocol (1,015 words) [view diff] exact match in snippet view article find links to article
Kademlia Mix network Mathematics Cryptographic hash function Block cipher Stream cipher Symmetric-key algorithm Authenticated encryption Public-key cryptography
Ross J. Anderson (1,523 words) [view diff] exact match in snippet view article find links to article
block cipher Serpent, one of the finalists in the Advanced Encryption Standard (AES) competition. He also discovered weaknesses in the FISH cipher and designed
Friedrich Boetzel (629 words) [view diff] exact match in snippet view article find links to article
Boetzel was an intelligence officer who was Director of Operations of the Cipher Department of the High Command of the Wehrmacht from 1939 to 1943. His cover
IEEE P1619 (852 words) [view diff] exact match in snippet view article find links to article
following algorithms: Counter mode with CBC-MAC (CCM) Galois/Counter Mode (GCM) Cipher Block Chaining (CBC) with HMAC-Secure Hash Algorithm XTS-HMAC-Secure Hash
Hebern rotor machine (1,099 words) [view diff] exact match in snippet view article find links to article
substitution into a polyalphabetic one similar to the well known Vigenère cipher, with the exception that it required no manual lookup of the keys or cyphertext
Russell Willson (1,057 words) [view diff] exact match in snippet view article find links to article
officer of the United States Navy and inventor of the Navy Cipher Box (also called 'Naval Cipher Box' or 'Navy Code Box') issued in 1917. The son of Sidney
Identity V (1,582 words) [view diff] exact match in snippet view article find links to article
must evade the Hunter and collaborate to open the exit gates by decoding cipher machines. It was initially released on April 2, 2018, by NetEase in China
Karl Stein (mathematician) (254 words) [view diff] exact match in snippet view article
unit responsible for security of own processes, cipher devices testing, and invention of new cipher devices. He managed a staff of 11 In 1955, he became
Comparison of cryptography libraries (1,565 words) [view diff] exact match in snippet view article find links to article
stream ciphers. Stream ciphers are defined as using plain text digits that are combined with a pseudorandom cipher digit stream. Stream ciphers are typically
Heath Robinson (codebreaking machine) (1,853 words) [view diff] exact match in snippet view article
the Lorenz cipher. This achieved the decryption of messages in the German teleprinter cipher produced by the Lorenz SZ40/42 in-line cipher machine. Both
M. A. Rothman (1,896 words) [view diff] exact match in snippet view article find links to article
Inside Man debuted at #122 on the USA Today list on July 18, 2019. Darwin's Cipher, a standalone medical thriller novel, was released in February 2019 and
HAVAL (265 words) [view diff] exact match in snippet view article find links to article
Kademlia Mix network Mathematics Cryptographic hash function Block cipher Stream cipher Symmetric-key algorithm Authenticated encryption Public-key cryptography
KY-68 (193 words) [view diff] exact match in snippet view article find links to article
v t e Cipher machines Rotor machines CCM Enigma M-125 Fialka Hebern HX-63 KL-7 Lacida M-325 Mercury NEMA OMI RED SG-39 SG-41 SIGABA SIGCUM Singlet Typex
Cipher System (249 words) [view diff] exact match in snippet view article find links to article
Cipher System is a Swedish melodic death metal band from Tjörn. The band formed under the name Eternal Grief in 1995. They changed their name in 2001 to
Werner Liebknecht (354 words) [view diff] exact match in snippet view article find links to article
devices used by German Armed Forces during World War II, including the cipher teleprinter attachment, the SZ 40 and the Siemens and Halske T52 secure
Pokémon XD: Gale of Darkness (1,421 words) [view diff] exact match in snippet view article find links to article
Shadow Pokémon from Cipher agents and defeating Cipher's other admins to free cities under their control. Greevil, the leader of Cipher, reveals himself
KL-51 (171 words) [view diff] exact match in snippet view article find links to article
v t e Cipher machines Rotor machines CCM Enigma M-125 Fialka Hebern HX-63 KL-7 Lacida M-325 Mercury NEMA OMI RED SG-39 SG-41 SIGABA SIGCUM Singlet Typex
Secure voice (1,687 words) [view diff] exact match in snippet view article find links to article
techniques. DVP uses a self-synchronizing encryption technique known as cipher feedback (CFB). The extremely high number of possible keys associated with
Unicity distance (980 words) [view diff] exact match in snippet view article find links to article
unicity distance is the length of an original ciphertext needed to break the cipher by reducing the number of possible spurious keys to zero in a brute force
Karl Schröter (748 words) [view diff] exact match in snippet view article find links to article
mathematical theoretician and cryptanalyst for the civilian Pers Z S, the cipher bureau of the Foreign Office (German: Auswärtiges Amt), from the spring
Bart Preneel (975 words) [view diff] exact match in snippet view article find links to article
also a co-inventor of the stream cipher MUGI which would later become a Japanese standard, and of the stream cipher Trivium which was a well-received[weasel words]
CrypTool (666 words) [view diff] exact match in snippet view article find links to article
link] (To view documents see Help:FTP) Kopal, Nils. "Solving Classical Ciphers with CrypTool 2" (PDF). Linköping University Electronic Press. Retrieved
Fhána (1,796 words) [view diff] exact match in snippet view article find links to article
leaving Fhána in January 2023, his final concert with the band was the Fhána Cipher Live Tour 2022 in Nagoya. The band contributed two songs titled "Eien to
Streebog (854 words) [view diff] exact match in snippet view article find links to article
function operates in Miyaguchi–Preneel mode and employs a 12-round AES-like cipher with a 512-bit block and 512-bit key. (It uses an 8×8 matrix of bytes rather
MD4 (871 words) [view diff] exact match in snippet view article find links to article
Designers Ronald Rivest First published October 1990 Series MD2, MD4, MD5, MD6 Cipher detail Digest sizes 128 bits Block sizes 512 bits Rounds 3 Best public cryptanalysis
U-571 (film) (3,470 words) [view diff] exact match in snippet view article
II German U-boat boarded by American submariners to capture her Enigma cipher machine. Although the film was financially successful and received generally