• In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, such as confidentiality (encryption)...
    4 KB (483 words) - 17:52, 3 July 2024
  • RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem, one of the oldest widely used for secure data transmission. The initialism "RSA" comes from the...
    61 KB (7,868 words) - 17:39, 2 July 2024
  • The Paillier cryptosystem, invented by and named after Pascal Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography. The...
    13 KB (1,929 words) - 21:01, 7 December 2023
  • a hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem. Public-key...
    10 KB (1,099 words) - 10:56, 2 April 2024
  • Thumbnail for Public-key cryptography
    cryptosystem Kyber McEliece cryptosystem Examples of notable – yet insecure – asymmetric key algorithms include: Merkle–Hellman knapsack cryptosystem...
    36 KB (4,185 words) - 16:36, 5 July 2024
  • free GNU Privacy Guard software, recent versions of PGP, and other cryptosystems. The Digital Signature Algorithm (DSA) is a variant of the ElGamal signature...
    10 KB (1,476 words) - 16:26, 18 May 2024
  • A cryptosystem is a set of cryptographic algorithms that map ciphertexts and plaintexts to each other. Private-key cryptosystems use the same key for encryption...
    2 KB (120 words) - 03:36, 11 April 2022
  • The Rabin cryptosystem is a family of public-key encryption schemes based on a trapdoor function whose security, like that of RSA, is related to the difficulty...
    15 KB (2,399 words) - 19:36, 6 November 2023
  • A threshold cryptosystem, the basis for the field of threshold cryptography, is a cryptosystem that protects information by encrypting it and distributing...
    8 KB (868 words) - 22:39, 15 March 2024
  • security, compared to cryptosystems based on modular exponentiation in Galois fields, such as the RSA cryptosystem and ElGamal cryptosystem. Elliptic curves...
    39 KB (4,660 words) - 13:02, 21 May 2024
  • Boneh–Goh–Nissim cryptosystem Ishai–Paskin cryptosystem Joye-Libert cryptosystem Castagnos–Laguillaumie cryptosystem A cryptosystem that supports arbitrary...
    40 KB (4,379 words) - 16:58, 25 June 2024
  • The Benaloh Cryptosystem is an extension of the Goldwasser-Micali cryptosystem (GM) created in 1985 by Josh (Cohen) Benaloh. The main improvement of the...
    4 KB (751 words) - 11:00, 9 September 2020
  • Thumbnail for Cryptography
    and cryptosystems is somewhat arbitrary, a sophisticated cryptosystem can be derived from a combination of several more primitive cryptosystems. In many...
    98 KB (10,726 words) - 01:02, 9 July 2024
  • Ronald Cramer and Victor Shoup in 1998, it is an extension of the ElGamal cryptosystem. In contrast to ElGamal, which is extremely malleable, Cramer–Shoup adds...
    7 KB (1,125 words) - 20:19, 5 November 2023
  • E(a,E(b,m)) = mab mod p = mba mod p = E(b,E(a,m)). The Massey–Omura Cryptosystem was proposed by James Massey and Jim K. Omura in 1982 as a possible improvement...
    8 KB (1,293 words) - 05:39, 15 August 2023
  • In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece. It was the first such scheme to...
    15 KB (2,092 words) - 21:20, 2 March 2024
  • The Merkle–Hellman knapsack cryptosystem was one of the earliest public key cryptosystems. It was published by Ralph Merkle and Martin Hellman in 1978...
    10 KB (1,838 words) - 16:48, 3 July 2024
  • The Goldwasser–Micali (GM) cryptosystem is an asymmetric key encryption algorithm developed by Shafi Goldwasser and Silvio Micali in 1982. GM has the distinction...
    7 KB (976 words) - 18:47, 24 August 2023
  • Knapsack cryptosystems are cryptosystems whose security is based on the hardness of solving the knapsack problem. They remain quite unpopular because...
    3 KB (308 words) - 20:21, 21 September 2023
  • In cryptography, the Niederreiter cryptosystem is a variation of the McEliece cryptosystem developed in 1986 by Harald Niederreiter. It applies the same...
    5 KB (675 words) - 02:49, 7 July 2023
  • Naccache–Stern Knapsack cryptosystem is an atypical public-key cryptosystem developed by David Naccache and Jacques Stern in 1997. This cryptosystem is deterministic...
    4 KB (565 words) - 17:03, 1 June 2024
  • anglicized name Secure Inter-Network Architecture. As of April 2024 the cryptosystem was employed by "many European governments for transmitting classified...
    4 KB (260 words) - 20:15, 24 June 2024
  • Key escrow (redirect from Fair cryptosystem)
    Key escrow (also known as a "fair" cryptosystem)[citation needed] is an arrangement in which the keys needed to decrypt encrypted data are held in escrow...
    4 KB (528 words) - 08:44, 31 January 2024
  • this a fairly efficient digital signature scheme. The Lamport signature cryptosystem was invented in 1979 and named after its inventor, Leslie Lamport. Alice...
    13 KB (2,001 words) - 09:26, 19 August 2023
  • Cohen's cryptosystem is a public-key cryptosystem proposed in 1998 by Bram Cohen. In Cohen's cryptosystem, a private key is a positive integer p {\displaystyle...
    2 KB (295 words) - 13:10, 18 June 2024
  • Thumbnail for Hill cipher
    Authentication protocol Cryptographic primitive Cryptanalysis Cryptocurrency Cryptosystem Cryptographic nonce Cryptovirology Hash function Cryptographic hash function...
    13 KB (2,241 words) - 19:55, 25 April 2024
  • Naccache–Stern cryptosystem is a homomorphic public-key cryptosystem whose security rests on the higher residuosity problem. The Naccache–Stern cryptosystem was...
    3 KB (549 words) - 17:50, 28 January 2023
  • Thumbnail for Alice and Bob
    1978 paper "A Method for Obtaining Digital Signatures and Public-key Cryptosystems". Subsequently, they have become common archetypes in many scientific...
    25 KB (2,080 words) - 12:46, 12 July 2024
  • The Digital Signature Algorithm (DSA) is a public-key cryptosystem and Federal Information Processing Standard for digital signatures, based on the mathematical...
    16 KB (2,176 words) - 18:31, 15 June 2024
  • Malleability is often an undesirable property in a general-purpose cryptosystem, since it allows an attacker to modify the contents of a message. For...
    6 KB (983 words) - 01:57, 16 January 2024