Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Ciphertext-only attack (view), Ciphertext expansion (view), Ciphertext indistinguishability (view), Ciphertext stealing (view), Chosen-ciphertext attack (view), Adaptive chosen-ciphertext attack (view)

searching for Ciphertext 49 found (821 total)

alternate case: ciphertext

Codebook (526 words) [view diff] exact match in snippet view article find links to article

code words. In two-part codes, one part is for converting plaintext to ciphertext, the other for the opposite purpose. They are usually organized similarly
XOR cipher (1,034 words) [view diff] case mismatch in snippet view article find links to article
print('Key:', key) cipherText = xor_strings(message.encode('utf8'), key) print('cipherText:', cipherText) print('decrypted:', xor_strings(cipherText, key).decode('utf8'))
Attribute-based encryption (1,325 words) [view diff] exact match in snippet view article find links to article
encrypted data using authorisation policies. The secret key of a user and the ciphertext are dependent upon attributes (e.g. their email address, the country in
Moni Naor (678 words) [view diff] exact match in snippet view article find links to article
notable for initiating research on public key systems secure against chosen ciphertext attack and creating non-malleable cryptography, visual cryptography (with
D'Agapeyeff cipher (541 words) [view diff] exact match in snippet view article find links to article
in 1939. Offered as a "challenge cipher" at the end of the book, the ciphertext is: 75628 28591 62916 48164 91748 58464 74748 28483 81638 18174 74826
Kryptos (3,423 words) [view diff] exact match in snippet view article find links to article
the sculpture in 1988 was US$250,000 (worth ~US$660,000 in 2024). The ciphertext on the left-hand side of the sculpture (as seen from the courtyard) of
Otto Leiberich (670 words) [view diff] exact match in snippet view article find links to article
to 25 elements. The lengths of the ciphertext should not be a multiple of the length of either key. A ciphertext of approximately 500 characters, i.e
BitLocker (3,499 words) [view diff] exact match in snippet view article find links to article
chaining (CBC) or "xor–encrypt–xor (XEX)-based Tweaked codebook mode with ciphertext Stealing" (XTS) mode with a 128-bit or 256-bit key. CBC is not used over
Ronald Cramer (197 words) [view diff] exact match in snippet view article find links to article
of Aarhus. He is best known for his work with Victor Shoup on chosen ciphertext secure encryption in the standard model, in particular the Cramer–Shoup
Homomorphic encryption (4,603 words) [view diff] exact match in snippet view article find links to article
it is limited because each ciphertext is noisy in some sense, and this noise grows as one adds and multiplies ciphertexts, until ultimately the noise
Ransomware (10,725 words) [view diff] exact match in snippet view article find links to article
hybrid encryption and it results in a small asymmetric ciphertext as well as the symmetric ciphertext of the victim's data. It zeroizes the symmetric key
Point-to-Point Tunneling Protocol (847 words) [view diff] exact match in snippet view article find links to article
encryption. There is no method for authentication of the ciphertext stream and therefore the ciphertext is vulnerable to a bit-flipping attack. An attacker
W. T. Tutte (4,642 words) [view diff] exact match in snippet view article find links to article
characters in the ciphertext could not be distinguished from a random stream, the same was not true for a version of the ciphertext from which the chi
Lai–Massey scheme (910 words) [view diff] exact match in snippet view article find links to article
the ciphertext is ( L n + 1 , R n + 1 ) = ( L n + 1 ′ , R n + 1 ′ ) {\displaystyle (L_{n+1},R_{n+1})=(L_{n+1}',R_{n+1}')} . Decryption of a ciphertext (
Universal one-way hash function (324 words) [view diff] exact match in snippet view article find links to article
signature schemes without trapdoor functions, and also within chosen-ciphertext secure public key encryption schemes. The UOWHF family contains a finite
Format-transforming encryption (200 words) [view diff] exact match in snippet view article find links to article
refers to encryption where the format of the input plaintext and output ciphertext are configurable. Descriptions of formats can vary, but are typically
Copiale cipher (988 words) [view diff] exact match in snippet view article find links to article
rather a homophonic cipher: each ciphertext character stands for a particular plaintext character, but several ciphertext characters may encode the same
Brent Waters (559 words) [view diff] exact match in snippet view article find links to article
S2CID 5131034. John Bethencourt; Amit Sahai; Brent Waters (May 2007), Ciphertext-Policy Attribute-Based Encryption, doi:10.1109/SP.2007.11, Wikidata Q107459178
Decius Wadsworth (657 words) [view diff] exact match in snippet view article find links to article
number of turns required for the result transmitted as ciphertext. Due to the gearing, a ciphertext substitution for a character did not repeat until all
Gardening (cryptanalysis) (489 words) [view diff] exact match in snippet view article
though plain text effectively chosen by the British was injected into the ciphertext, because the choice was very limited and the cryptanalysts did not care
HEAAN (1,759 words) [view diff] exact match in snippet view article find links to article
For a given message polynomial m ∈ R {\displaystyle m\in R} , output a ciphertext c t ← ( c 0 = r ⋅ b + e 0 + m , c 1 = r ⋅ a + e 1 ) ∈ R Q 2 {\displaystyle
EncFS (1,536 words) [view diff] exact match in snippet view article find links to article
copy of the ciphertext and nothing more. EncFS is not safe if the adversary has the opportunity to see two or more snapshots of the ciphertext at different
Comparison of backup software (26 words) [view diff] exact match in snippet view article find links to article
SHA256 HMAC with PBKDF2 encrypted keyfiles Yes; by MAC of plaintext and ciphertext No No Yes; through deduplication No No BackupPC Yes Yes; hard-links No;
LCS35 (346 words) [view diff] exact match in snippet view article find links to article
(which are not given). The value of w can then be used to decrypt the ciphertext z, another 616-digit integer. The plaintext provides the concealed information
Watermarking attack (456 words) [view diff] exact match in snippet view article find links to article
encryption in the system under attack, to "NOP-out" the IV such that the first ciphertext block in two or more sectors is identical. This requires that the input
LAN Manager (1,913 words) [view diff] exact match in snippet view article find links to article
in two 8-byte ciphertext values. The DES CipherMode should be set to ECB, and PaddingMode should be set to NONE. These two ciphertext values are concatenated
GGH encryption scheme (839 words) [view diff] exact match in snippet view article find links to article
also a lattice point. The ciphertext is then c = v + e = m ⋅ B ′ + e {\displaystyle c=v+e=m\cdot B'+e} To decrypt the ciphertext one computes c ⋅ B − 1 =
Public-key cryptography (4,512 words) [view diff] exact match in snippet view article find links to article
encrypt a message, yielding a ciphertext, but only those who know the corresponding private key can decrypt the ciphertext to obtain the original message
Cocks IBE scheme (1,093 words) [view diff] exact match in snippet view article find links to article
{\displaystyle \textstyle s=(c_{1},c_{2})} to the user. To decrypt a ciphertext s = ( c 1 , c 2 ) {\displaystyle s=(c_{1},c_{2})} for user I D {\displaystyle
Message (906 words) [view diff] exact match in snippet view article find links to article
in the United States Encryption – Process of converting plaintext to ciphertext Express mail – Accelerated mail delivery service Flag semaphore – System
KWallet (2,649 words) [view diff] exact match in snippet view article find links to article
allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications
Secure Real-time Transport Protocol (1,132 words) [view diff] exact match in snippet view article find links to article
derivation function prevents an attacker from collecting large amounts of ciphertext encrypted with one single session key. This provides protection against
HElib (212 words) [view diff] exact match in snippet view article find links to article
encryption scheme, as well as optimizations such as Smart-Vercauteren ciphertext packing techniques. HElib is written in C++ and uses the NTL mathematical
Information leakage (524 words) [view diff] exact match in snippet view article find links to article
Computer and Network Security Lecture Notes 9 : DSA/DSS, RSA, chosen-ciphertext attack" (PDF). MIT. Retrieved 2012-09-14. Yu, Xiang; Tian, Zhihong; Qiu
ACE Encrypt (5,287 words) [view diff] exact match in snippet view article find links to article
((P,q,g_{1},g_{2},c,d,h_{1},h_{2},k_{1},k_{2}),(w,x,y,z_{1},z_{2}))} A ciphertext of the ACE encryption scheme has the form ( s , u 1 , u 2 , v , e ) {\displaystyle
RSA Secret-Key Challenge (581 words) [view diff] exact match in snippet view article find links to article
May 2007. For each contest, RSA had posted on its website a block of ciphertext and the random initialization vector used for encryption. To win, a contestant
Moti Yung (1,627 words) [view diff] exact match in snippet view article find links to article
STOC). 1990: Public-key cryptosystems provably secure against chosen ciphertext attacks (with M. Naor; ACM’s STOC). 1991: How to withstand mobile virus
PALISADE (software) (946 words) [view diff] exact match in snippet view article
BGV, BFV, and CKKS schemes Digital signature Identity-based encryption Ciphertext-policy attribute-based encryption There are several known git repositories/ports
Cryptovirology (1,458 words) [view diff] exact match in snippet view article find links to article
the victim's files. The malware prompts the user to send the asymmetric ciphertext to the attacker who will decipher it and return the symmetric decryption
Network security (1,646 words) [view diff] exact match in snippet view article find links to article
descriptions as a fallback Encryption – Process of converting plaintext to ciphertext Traffic analysis – Process of intercepting and examining messages Active:
Giovan Battista Bellaso (1,623 words) [view diff] exact match in snippet view article find links to article
IINCVPNSHMLRNXOIZN RD Ciphertext Deciphering: VIRTVTIOMNIAPARENT VIRTVTIOMNIAPARENT VI Countersign SYBOVEYLDANVOFSZLP IINCVPNSHMLRNXOIZN RD Ciphertext larmataturchescapa
Column level encryption (402 words) [view diff] exact match in snippet view article find links to article
goes through encryption, which is the process of encoding plaintext into ciphertext. Non-designated readers or receivers will not be able to read the data
One-time password (3,542 words) [view diff] exact match in snippet view article find links to article
of the Counter Barkan, Elad; Eli Biham; Nathan Keller (2003). "Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication": 600–16. Archived from
Crypto-PAn (1,151 words) [view diff] exact match in snippet view article find links to article
plaintext bits of x {\displaystyle x} decrypted so far, rather than using the ciphertext bits: I i ≠ E k ( x ) [ 0 , i ) p a d [ i , 128 ) {\displaystyle I_{i}\neq
Boneh–Franklin scheme (1,142 words) [view diff] exact match in snippet view article find links to article
user. Given m ∈ M {\displaystyle \textstyle m\in {\mathcal {M}}} , the ciphertext c {\displaystyle \textstyle c} is obtained as follows: Q I D = H 1 ( I
Blacker (security) (264 words) [view diff] exact match in snippet view article
segregation of sensitive plaintext information (RED signals) from encrypted ciphertext (BLACK signals) Weissman, Clark (1992). "BLACKER: security for the DDN
Discriminant Book (1,043 words) [view diff] exact match in snippet view article find links to article
being transmitted along with the ciphertext. The starting position for the rotors was transmitted just before the ciphertext, usually after having been enciphered
Agrippa (A Book of the Dead) (4,352 words) [view diff] exact match in snippet view article
finished is a ruse. The visual effect is the result of running the decrypted ciphertext (in memory) through the re-purposed bit-scrambling decryption algorithm
End-to-end encryption (3,144 words) [view diff] exact match in snippet view article find links to article
Encryption model where only the sender and recipient can read the ciphertext