• Authenticated Encryption (AE) is an encryption scheme which simultaneously assures the data confidentiality (also known as privacy: the encrypted message...
    19 KB (2,075 words) - 00:58, 28 September 2024
  • Thumbnail for Block cipher mode of operation
    single cryptographic primitive (an encryption algorithm). These combined modes are referred to as authenticated encryption, AE or "authenc". Examples of AE...
    52 KB (5,878 words) - 15:11, 20 September 2024
  • IPsec (redirect from Authentication Header)
    supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and protection from replay...
    44 KB (5,242 words) - 08:28, 22 October 2024
  • achieved by using message authentication codes (MACs), authenticated encryption (AE), or digital signatures. The message authentication code, also known as...
    6 KB (612 words) - 07:45, 8 July 2024
  • authenticity (integrity) and confidentiality and belongs to the class of authenticated encryption with associated data (AEAD) methods. This means that as input it...
    23 KB (2,996 words) - 08:23, 11 September 2024
  • Thumbnail for Encryption
    a message authentication code (MAC) or a digital signature usually done by a hashing algorithm or a PGP signature. Authenticated encryption algorithms...
    34 KB (3,640 words) - 21:56, 15 October 2024
  • support for authenticated encryption ciphers, used mainly for Galois/Counter Mode (GCM) and CCM mode of Advanced Encryption Standard (AES) encryption. TLS Extensions...
    179 KB (17,618 words) - 02:05, 5 November 2024
  • not integrity. Block cipher-based encryption modes used for full disk encryption are not authenticated encryption themselves because of concerns of the...
    17 KB (2,194 words) - 03:24, 4 September 2024
  • Thumbnail for Cryptography
    ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks. There are two main...
    98 KB (10,723 words) - 20:16, 2 November 2024
  • OCB mode (category Authenticated-encryption schemes)
    Offset codebook mode (OCB mode) is an authenticated encryption mode of operation for cryptographic block ciphers. OCB mode was designed by Phillip Rogaway...
    8 KB (843 words) - 15:52, 12 June 2024
  • Checksum CMAC HMAC (hash-based message authentication code) MAA MMH-Badger MAC Poly1305 Authenticated encryption UMAC VMAC SipHash KMAC IEEE Standard for...
    16 KB (1,914 words) - 13:54, 20 October 2024
  • CCM mode (category Authenticated-encryption schemes)
    message authentication code; counter with CBC-MAC) is a mode of operation for cryptographic block ciphers. It is an authenticated encryption algorithm...
    8 KB (924 words) - 06:45, 11 October 2024
  • The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) is a competition organized by a group of international cryptologic...
    3 KB (217 words) - 00:15, 19 August 2023
  • design authenticated encryption schemes NIST hash function competition Post-Quantum Cryptography Standardization "cryptology:: The Data Encryption Standard...
    10 KB (1,040 words) - 02:50, 11 January 2024
  • EAX mode (category Authenticated-encryption schemes)
    mode (encrypt-then-authenticate-then-translate) is a mode of operation for cryptographic block ciphers. It is an Authenticated Encryption with Associated...
    6 KB (659 words) - 17:22, 19 June 2024
  • for encryption as well as authentication, though newer designs exist that combine both security solutions in so-called authenticated encryption modes...
    14 KB (1,797 words) - 08:53, 7 September 2024
  • ChaCha20-Poly1305 (category Authenticated-encryption schemes)
    an authenticated encryption with associated data (AEAD) algorithm, that combines the ChaCha20 stream cipher with the Poly1305 message authentication code...
    13 KB (1,511 words) - 14:10, 12 October 2024
  • IAPM (mode) (category Authenticated-encryption schemes)
    first cipher modes to provide both authentication and privacy in a single pass. (In earlier authenticated encryption designs, two passes would be required...
    2 KB (172 words) - 18:27, 29 October 2023
  • schemes, grouped by primitive. Selected schemes for the purpose of encryption: GGH encryption scheme, which is based in the closest vector problem (CVP). In...
    23 KB (2,793 words) - 23:26, 17 September 2024
  • Thumbnail for Hardware-based encryption
    Hardware-based encryption is the use of computer hardware to assist software, or sometimes replace software, in the process of data encryption. Typically...
    15 KB (1,245 words) - 03:49, 12 July 2024
  • Thumbnail for Diffie–Hellman key exchange
    key exchange itself is a non-authenticated key-agreement protocol, it provides the basis for a variety of authenticated protocols, and is used to provide...
    48 KB (5,245 words) - 18:30, 27 October 2024
  • Thumbnail for Digest access authentication
    or more rarely Basic access authentication. These weak cleartext protocols used together with HTTPS network encryption resolve many of the threats that...
    24 KB (2,850 words) - 04:01, 30 September 2024
  • Thumbnail for HMAC
    cryptographic hash function. m {\displaystyle m} is the message to be authenticated. K {\displaystyle K} is the secret key. K ′ {\displaystyle K'} is a...
    18 KB (2,335 words) - 04:57, 18 October 2024
  • That system was declassified in 1997. In a public-key cryptosystem, the encryption key is public and distinct from the decryption key, which is kept secret...
    60 KB (7,773 words) - 06:12, 2 November 2024
  • Thumbnail for Cryptographic hash function
    functions. For example, a CRC was used for message integrity in the WEP encryption standard, but an attack was readily discovered, which exploited the linearity...
    48 KB (6,237 words) - 00:38, 5 November 2024
  • wide-block. While the authenticated encryption scheme IAPM provides encryption as well as an authentication tag, the encryption component of the IAPM...
    30 KB (3,771 words) - 08:32, 29 October 2024
  • Key size (redirect from 128 bit encryption)
    therefore, be large enough that a brute-force attack (possible against any encryption algorithm) is infeasible – i.e. would take too long and/or would take...
    29 KB (3,213 words) - 18:15, 18 September 2024
  • Thumbnail for Symmetric-key algorithm
    algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical...
    15 KB (1,544 words) - 20:48, 3 November 2024
  • Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption. Authenticated encryption: Protection against ciphertext modification by an attacker...
    70 KB (2,834 words) - 08:37, 8 October 2024
  • Thumbnail for Sponge function
    hashes, message authentication codes, mask generation functions, stream ciphers, pseudo-random number generators, and authenticated encryption. A sponge function...
    7 KB (811 words) - 14:51, 1 November 2024