• Authenticated Encryption (AE) is an encryption scheme which simultaneously assures the data confidentiality (also known as privacy: the encrypted message...
    19 KB (2,075 words) - 19:58, 14 August 2024
  • Thumbnail for Block cipher mode of operation
    single cryptographic primitive (an encryption algorithm). These combined modes are referred to as authenticated encryption, AE or "authenc". Examples of AE...
    52 KB (5,878 words) - 12:53, 24 August 2024
  • IPsec (redirect from Authentication Header)
    supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and protection from replay...
    48 KB (5,079 words) - 04:34, 15 August 2024
  • authenticity (integrity) and confidentiality and belongs to the class of authenticated encryption with associated data (AEAD) methods. This means that as input it...
    23 KB (2,999 words) - 05:42, 12 June 2024
  • achieved by using message authentication codes (MACs), authenticated encryption (AE), or digital signatures. The message authentication code, also known as...
    6 KB (612 words) - 07:45, 8 July 2024
  • Thumbnail for Encryption
    a message authentication code (MAC) or a digital signature usually done by a hashing algorithm or a PGP signature. Authenticated encryption algorithms...
    34 KB (3,646 words) - 05:09, 26 August 2024
  • EAX mode (category Authenticated-encryption schemes)
    mode (encrypt-then-authenticate-then-translate) is a mode of operation for cryptographic block ciphers. It is an Authenticated Encryption with Associated...
    6 KB (659 words) - 17:22, 19 June 2024
  • OCB mode (category Authenticated-encryption schemes)
    Offset codebook mode (OCB mode) is an authenticated encryption mode of operation for cryptographic block ciphers. OCB mode was designed by Phillip Rogaway...
    8 KB (843 words) - 15:52, 12 June 2024
  • not integrity. Block cipher-based encryption modes used for full disk encryption are not authenticated encryption themselves because of concerns of the...
    17 KB (2,147 words) - 01:55, 8 August 2024
  • Thumbnail for Cryptography
    ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks. There are two main...
    98 KB (10,713 words) - 13:13, 22 August 2024
  • ChaCha20-Poly1305 (category Authenticated-encryption schemes)
    an authenticated encryption with associated data (AEAD) algorithm, that combines the ChaCha20 stream cipher with the Poly1305 message authentication code...
    13 KB (1,574 words) - 20:27, 8 August 2024
  • Checksum CMAC HMAC (hash-based message authentication code) MAA MMH-Badger MAC Poly1305 Authenticated encryption UMAC VMAC SipHash KMAC IEEE Standard for...
    15 KB (1,790 words) - 04:23, 31 July 2024
  • CCM mode (category Authenticated-encryption schemes)
    message authentication code; counter with CBC-MAC) is a mode of operation for cryptographic block ciphers. It is an authenticated encryption algorithm...
    8 KB (924 words) - 10:55, 17 July 2024
  • The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) is a competition organized by a group of international cryptologic...
    3 KB (217 words) - 00:15, 19 August 2023
  • Thumbnail for Digest access authentication
    or more rarely Basic access authentication. These weak cleartext protocols used together with HTTPS network encryption resolve many of the threats that...
    24 KB (2,850 words) - 08:47, 21 August 2024
  • Pipher, and Joseph H. Silverman introduced a lattice-based public-key encryption scheme, known as NTRU. However, their scheme is not known to be at least...
    23 KB (2,766 words) - 09:27, 17 August 2024
  • for encryption as well as authentication, though newer designs exist that combine both security solutions in so-called authenticated encryption modes...
    14 KB (1,785 words) - 20:10, 11 August 2024
  • support for authenticated encryption ciphers, used mainly for Galois/Counter Mode (GCM) and CCM mode of Advanced Encryption Standard (AES) encryption. TLS Extensions...
    179 KB (17,613 words) - 19:41, 20 August 2024
  • wide-block. While the authenticated encryption scheme IAPM provides encryption as well as an authentication tag, the encryption component of the IAPM...
    30 KB (3,679 words) - 05:50, 22 August 2024
  • Password-authenticated key agreement generally encompasses methods such as: Balanced password-authenticated key exchange Augmented password-authenticated key...
    17 KB (1,850 words) - 19:49, 19 August 2024
  • Key size (redirect from 128 bit encryption)
    therefore, be large enough that a brute-force attack (possible against any encryption algorithm) is infeasible – i.e. would take too long and/or would take...
    29 KB (3,213 words) - 18:51, 7 June 2024
  • operation Encryption modes N/A Authenticated encryption modes N/A Message authentication codes PC-MAC-AES Authenticated encryption N/A Entity authentication N/A...
    8 KB (974 words) - 00:22, 19 August 2023
  • Thumbnail for Symmetric-key algorithm
    algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical...
    15 KB (1,544 words) - 02:53, 7 June 2024
  • Thumbnail for Diffie–Hellman key exchange
    key exchange itself is a non-authenticated key-agreement protocol, it provides the basis for a variety of authenticated protocols, and is used to provide...
    47 KB (5,161 words) - 17:29, 25 August 2024
  • Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption. Authenticated encryption: Protection against ciphertext modification by an attacker...
    70 KB (2,826 words) - 01:56, 26 August 2024
  • design authenticated encryption schemes NIST hash function competition Post-Quantum Cryptography Standardization "cryptology:: The Data Encryption Standard...
    10 KB (1,040 words) - 02:50, 11 January 2024
  • m} (by symmetric encryption of m {\displaystyle m} ) encrypted with the key k {\displaystyle k} (using an authenticated encryption scheme) as follows:...
    6 KB (965 words) - 20:25, 27 February 2023
  • Thumbnail for Sponge function
    hashes, message authentication codes, mask generation functions, stream ciphers, pseudo-random number generators, and authenticated encryption. A sponge function...
    7 KB (811 words) - 15:05, 22 August 2024
  • not (yet) standardized by NIST, including a stream cipher, an authenticated encryption system, a "tree" hashing scheme for faster hashing on certain architectures...
    51 KB (5,689 words) - 19:48, 26 August 2024
  • Thumbnail for Cryptographic hash function
    functions. For example, a CRC was used for message integrity in the WEP encryption standard, but an attack was readily discovered, which exploited the linearity...
    48 KB (6,228 words) - 01:22, 22 August 2024