Authenticated Encryption (AE) is an encryption scheme which simultaneously assures the data confidentiality (also known as privacy: the encrypted message...
19 KB (2,075 words) - 00:58, 28 September 2024
Block cipher mode of operation (redirect from Encryption mode)
single cryptographic primitive (an encryption algorithm). These combined modes are referred to as authenticated encryption, AE or "authenc". Examples of AE...
52 KB (5,878 words) - 15:11, 20 September 2024
IPsec (redirect from Authentication Header)
supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and protection from replay...
44 KB (5,242 words) - 08:28, 22 October 2024
achieved by using message authentication codes (MACs), authenticated encryption (AE), or digital signatures. The message authentication code, also known as...
6 KB (612 words) - 07:45, 8 July 2024
Galois/Counter Mode (redirect from Galois Message Authentication Code)
authenticity (integrity) and confidentiality and belongs to the class of authenticated encryption with associated data (AEAD) methods. This means that as input it...
23 KB (2,996 words) - 08:23, 11 September 2024
a message authentication code (MAC) or a digital signature usually done by a hashing algorithm or a PGP signature. Authenticated encryption algorithms...
34 KB (3,640 words) - 21:56, 15 October 2024
Transport Layer Security (redirect from Transport layer encryption)
support for authenticated encryption ciphers, used mainly for Galois/Counter Mode (GCM) and CCM mode of Advanced Encryption Standard (AES) encryption. TLS Extensions...
179 KB (17,618 words) - 02:05, 5 November 2024
not integrity. Block cipher-based encryption modes used for full disk encryption are not authenticated encryption themselves because of concerns of the...
17 KB (2,194 words) - 03:24, 4 September 2024
ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks. There are two main...
98 KB (10,723 words) - 20:16, 2 November 2024
OCB mode (category Authenticated-encryption schemes)
Offset codebook mode (OCB mode) is an authenticated encryption mode of operation for cryptographic block ciphers. OCB mode was designed by Phillip Rogaway...
8 KB (843 words) - 15:52, 12 June 2024
Checksum CMAC HMAC (hash-based message authentication code) MAA MMH-Badger MAC Poly1305 Authenticated encryption UMAC VMAC SipHash KMAC IEEE Standard for...
16 KB (1,914 words) - 13:54, 20 October 2024
CCM mode (category Authenticated-encryption schemes)
message authentication code; counter with CBC-MAC) is a mode of operation for cryptographic block ciphers. It is an authenticated encryption algorithm...
8 KB (924 words) - 06:45, 11 October 2024
CAESAR Competition (redirect from Competition for Authenticated Encryption: Security, Applicability, and Robustness)
The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) is a competition organized by a group of international cryptologic...
3 KB (217 words) - 00:15, 19 August 2023
design authenticated encryption schemes NIST hash function competition Post-Quantum Cryptography Standardization "cryptology:: The Data Encryption Standard...
10 KB (1,040 words) - 02:50, 11 January 2024
EAX mode (category Authenticated-encryption schemes)
mode (encrypt-then-authenticate-then-translate) is a mode of operation for cryptographic block ciphers. It is an Authenticated Encryption with Associated...
6 KB (659 words) - 17:22, 19 June 2024
for encryption as well as authentication, though newer designs exist that combine both security solutions in so-called authenticated encryption modes...
14 KB (1,797 words) - 08:53, 7 September 2024
ChaCha20-Poly1305 (category Authenticated-encryption schemes)
an authenticated encryption with associated data (AEAD) algorithm, that combines the ChaCha20 stream cipher with the Poly1305 message authentication code...
13 KB (1,511 words) - 14:10, 12 October 2024
IAPM (mode) (category Authenticated-encryption schemes)
first cipher modes to provide both authentication and privacy in a single pass. (In earlier authenticated encryption designs, two passes would be required...
2 KB (172 words) - 18:27, 29 October 2023
Lattice-based cryptography (redirect from Lattice encryption)
schemes, grouped by primitive. Selected schemes for the purpose of encryption: GGH encryption scheme, which is based in the closest vector problem (CVP). In...
23 KB (2,793 words) - 23:26, 17 September 2024
Hardware-based encryption is the use of computer hardware to assist software, or sometimes replace software, in the process of data encryption. Typically...
15 KB (1,245 words) - 03:49, 12 July 2024
key exchange itself is a non-authenticated key-agreement protocol, it provides the basis for a variety of authenticated protocols, and is used to provide...
48 KB (5,245 words) - 18:30, 27 October 2024
or more rarely Basic access authentication. These weak cleartext protocols used together with HTTPS network encryption resolve many of the threats that...
24 KB (2,850 words) - 04:01, 30 September 2024
HMAC (redirect from Keyed-Hashing Message Authentication)
cryptographic hash function. m {\displaystyle m} is the message to be authenticated. K {\displaystyle K} is the secret key. K ′ {\displaystyle K'} is a...
18 KB (2,335 words) - 04:57, 18 October 2024
RSA (cryptosystem) (redirect from RSA encryption)
That system was declassified in 1997. In a public-key cryptosystem, the encryption key is public and distinct from the decryption key, which is kept secret...
60 KB (7,773 words) - 06:12, 2 November 2024
Cryptographic hash function (redirect from One way encryption)
functions. For example, a CRC was used for message integrity in the WEP encryption standard, but an attack was readily discovered, which exploited the linearity...
48 KB (6,237 words) - 00:38, 5 November 2024
wide-block. While the authenticated encryption scheme IAPM provides encryption as well as an authentication tag, the encryption component of the IAPM...
30 KB (3,771 words) - 08:32, 29 October 2024
Key size (redirect from 128 bit encryption)
therefore, be large enough that a brute-force attack (possible against any encryption algorithm) is infeasible – i.e. would take too long and/or would take...
29 KB (3,213 words) - 18:15, 18 September 2024
Symmetric-key algorithm (redirect from Symmetric encryption)
algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical...
15 KB (1,544 words) - 20:48, 3 November 2024
Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption. Authenticated encryption: Protection against ciphertext modification by an attacker...
70 KB (2,834 words) - 08:37, 8 October 2024
hashes, message authentication codes, mask generation functions, stream ciphers, pseudo-random number generators, and authenticated encryption. A sponge function...
7 KB (811 words) - 14:51, 1 November 2024