Poly1305 is a universal hash family designed by Daniel J. Bernstein in 2002 for use in cryptography. As with any universal hash family, Poly1305 can be...
17 KB (2,484 words) - 14:23, 11 October 2024
ChaCha20-Poly1305 is an authenticated encryption with associated data (AEAD) algorithm, that combines the ChaCha20 stream cipher with the Poly1305 message...
13 KB (1,506 words) - 14:10, 12 October 2024
construction combining both algorithms, which is called ChaCha20-Poly1305. ChaCha20 and Poly1305 are now used in the QUIC protocol, which replaces SPDY and...
31 KB (3,577 words) - 20:06, 24 October 2024
AES-192-GCM; AES-128-GCM; AES-256-CBC; AES-192-CBC; AES-128-CBC; ChaCha20-Poly1305; ARIA-256-CBC; CAMELLIA-256-CBC). You cannot use encryption at all (this...
7 KB (708 words) - 15:57, 22 October 2024
cryptanalytic advantage. Google selected ChaCha20 along with Bernstein's Poly1305 message authentication code for use in TLS, which is widely used for Internet...
22 KB (1,958 words) - 00:42, 26 December 2024
encryption. Key agreement happens via X25519; encryption is done by Salsa20-Poly1305. crypto_scalarmult, scalar multiplication on X25519. This function can...
9 KB (727 words) - 15:00, 15 December 2024
PMAC). However many of the fastest MAC algorithms, like UMAC-VMAC and Poly1305-AES, are constructed based on universal hashing. Intrinsically keyed hash...
16 KB (1,915 words) - 07:38, 26 November 2024
encourage design of authenticated encryption modes. In 2015, ChaCha20-Poly1305 is added as an alternative AE construction to GCM in IETF protocols. Authenticated...
19 KB (2,086 words) - 04:11, 21 December 2024
for key exchange, EdDSA for signatures, as well as XSalsa20-Poly1305 or XChaCha20-Poly1305 for authenticated encryption.: §11 As of 2023, there are no...
10 KB (943 words) - 13:35, 4 July 2024
IETF ChaCha20 stream cipher (256-bit key) and authenticated with the IETF Poly1305 authenticator. Outline is free and open-source, licensed under the Apache...
7 KB (620 words) - 03:12, 26 July 2024
DAA GMAC HMAC NMAC OMAC/CMAC PMAC Poly1305 SipHash UMAC VMAC Authenticated encryption modes CCM ChaCha20-Poly1305 CWC EAX GCM IAPM OCB Attacks Collision...
24 KB (3,485 words) - 12:15, 28 November 2024
connections. Additionally the attack requires the use of either ChaCha20-Poly1305 or a CBC cipher in combination with Encrypt-then-MAC modes of encryption...
5 KB (440 words) - 10:37, 14 April 2024
different cryptographic algorithms: Ciphers AES, Blowfish, Camellia, ChaCha20, Poly1305, SEED, CAST-128, DES, IDEA, RC2, RC4, RC5, Triple DES, GOST 28147-89, SM4...
52 KB (4,763 words) - 18:07, 21 December 2024
Developments since then have included the addition of ciphers (e.g., ChaCha20-Poly1305 in 6.5 of January 2014), cutting the dependency on OpenSSL (6.7, October...
26 KB (2,778 words) - 21:10, 18 November 2024
DAA GMAC HMAC NMAC OMAC/CMAC PMAC Poly1305 SipHash UMAC VMAC Authenticated encryption modes CCM ChaCha20-Poly1305 CWC EAX GCM IAPM OCB Attacks Collision...
15 KB (1,788 words) - 20:42, 10 September 2024
following: Curve25519 for key exchange ChaCha20 for symmetric encryption Poly1305 for message authentication codes SipHash24 for hashtable keys BLAKE2s for...
24 KB (2,217 words) - 00:09, 16 December 2024
DAA GMAC HMAC NMAC OMAC/CMAC PMAC Poly1305 SipHash UMAC VMAC Authenticated encryption modes CCM ChaCha20-Poly1305 CWC EAX GCM IAPM OCB Attacks Collision...
13 KB (1,533 words) - 23:19, 23 October 2024
DAA GMAC HMAC NMAC OMAC/CMAC PMAC Poly1305 SipHash UMAC VMAC Authenticated encryption modes CCM ChaCha20-Poly1305 CWC EAX GCM IAPM OCB Attacks Collision...
27 KB (2,851 words) - 11:52, 26 December 2024
DAA GMAC HMAC NMAC OMAC/CMAC PMAC Poly1305 SipHash UMAC VMAC Authenticated encryption modes CCM ChaCha20-Poly1305 CWC EAX GCM IAPM OCB Attacks Collision...
52 KB (5,014 words) - 00:19, 12 December 2024
performance-sensitive devices. Specialized hardware accelerators for ChaCha20-Poly1305 are less complex compared to AES accelerators. According to the authors'...
23 KB (3,051 words) - 19:42, 23 December 2024
DAA GMAC HMAC NMAC OMAC/CMAC PMAC Poly1305 SipHash UMAC VMAC Authenticated encryption modes CCM ChaCha20-Poly1305 CWC EAX GCM IAPM OCB Attacks Collision...
14 KB (1,342 words) - 05:08, 21 August 2024
WireGuard utilizes the Curve25519 protocol for key exchange and ChaCha20-Poly1305 for encryption and message authentication, but also includes the ability...
33 KB (3,702 words) - 22:50, 25 December 2024
DAA GMAC HMAC NMAC OMAC/CMAC PMAC Poly1305 SipHash UMAC VMAC Authenticated encryption modes CCM ChaCha20-Poly1305 CWC EAX GCM IAPM OCB Attacks Collision...
14 KB (1,491 words) - 01:05, 24 December 2024
NH, 256-bit Advanced Encryption Standard (AES-256), ChaCha12/ChaCha20, Poly1305 for the four elements. HPolyC is an earlier variant which does not use...
4 KB (320 words) - 08:40, 12 December 2024
DAA GMAC HMAC NMAC OMAC/CMAC PMAC Poly1305 SipHash UMAC VMAC Authenticated encryption modes CCM ChaCha20-Poly1305 CWC EAX GCM IAPM OCB Attacks Collision...
31 KB (3,618 words) - 06:32, 24 December 2024
Camellia, CAST5, CAST6, Serpent, Twofish, MORUS-1280, and other primitives: Poly1305, SHA-1, SHA-256, SHA-512, ChaCha20. liboqs utilizes AVX, AVX2, and AVX-512...
55 KB (4,523 words) - 02:39, 26 December 2024
DAA GMAC HMAC NMAC OMAC/CMAC PMAC Poly1305 SipHash UMAC VMAC Authenticated encryption modes CCM ChaCha20-Poly1305 CWC EAX GCM IAPM OCB Attacks Collision...
24 KB (2,850 words) - 07:59, 12 November 2024
DAA GMAC HMAC NMAC OMAC/CMAC PMAC Poly1305 SipHash UMAC VMAC Authenticated encryption modes CCM ChaCha20-Poly1305 CWC EAX GCM IAPM OCB Attacks Collision...
3 KB (464 words) - 07:05, 4 October 2024
DAA GMAC HMAC NMAC OMAC/CMAC PMAC Poly1305 SipHash UMAC VMAC Authenticated encryption modes CCM ChaCha20-Poly1305 CWC EAX GCM IAPM OCB Attacks Collision...
50 KB (5,744 words) - 16:51, 23 December 2024
ClientKeyShare to an appendix Adding the ChaCha20 stream cipher with the Poly1305 message authentication code Adding the Ed25519 and Ed448 digital signature...
179 KB (17,624 words) - 18:05, 24 December 2024