• In cryptography, CIPHERUNICORN-E is a block cipher created by NEC in 1998. It was among the cryptographic techniques recommended for Japanese government...
    3 KB (285 words) - 07:18, 27 April 2022
  • In cryptography, CIPHERUNICORN-A is a block cipher created by NEC in 2000. It was among the cryptographic techniques recommended for Japanese government...
    3 KB (307 words) - 22:02, 25 March 2022
  • Symmetric key ciphers 64-bit block ciphers CIPHERUNICORN-E Hierocrypt-L1 MISTY1 128-bit block ciphers CIPHERUNICORN-A CLEFIA Hierocrypt-3 Stream ciphers Enocoro-128v2...
    8 KB (974 words) - 00:22, 19 August 2023
  • BaseKing BassOmatic BATON BEAR and LION CAST-256 Chiasmus CIKS-1 CIPHERUNICORN-A CIPHERUNICORN-E CLEFIA CMEA Cobra COCONUT98 Crab Cryptomeria/C2 CRYPTON CS-Cipher...
    10 KB (1,040 words) - 02:50, 11 January 2024
  • combined with an initialization vector (IV) and encrypted with a block cipher E, usually AES. The result of this encryption is then XORed with the plaintext...
    23 KB (2,999 words) - 05:42, 12 June 2024
  • Thumbnail for Symmetric-key algorithm
    receiver. Message authentication codes can be constructed from an AEAD cipher (e.g. AES-GCM). However, symmetric ciphers cannot be used for non-repudiation...
    15 KB (1,544 words) - 02:53, 7 June 2024
  • Thumbnail for EFF DES cracker
    BaseKing BassOmatic BATON BEAR and LION CAST-256 Chiasmus CIKS-1 CIPHERUNICORN-A CIPHERUNICORN-E CLEFIA CMEA Cobra COCONUT98 Crab Cryptomeria/C2 CRYPTON CS-Cipher...
    10 KB (1,031 words) - 05:27, 28 February 2023
  • Thumbnail for Timing attack
    BaseKing BassOmatic BATON BEAR and LION CAST-256 Chiasmus CIKS-1 CIPHERUNICORN-A CIPHERUNICORN-E CLEFIA CMEA Cobra COCONUT98 Crab Cryptomeria/C2 CRYPTON CS-Cipher...
    12 KB (1,524 words) - 20:12, 19 July 2024
  • BaseKing BassOmatic BATON BEAR and LION CAST-256 Chiasmus CIKS-1 CIPHERUNICORN-A CIPHERUNICORN-E CLEFIA CMEA Cobra COCONUT98 Crab Cryptomeria/C2 CRYPTON CS-Cipher...
    10 KB (1,316 words) - 05:28, 15 May 2024
  • misconception is to use inverse order of encryption as decryption algorithm (i.e. first XORing P17 and P18 to the ciphertext block, then using the P-entries...
    16 KB (1,807 words) - 06:29, 7 August 2024
  • is commonly called a nonce (a number used only once), and the primitives (e.g. CBC) are considered stateful rather than randomized. This is because an...
    14 KB (1,785 words) - 20:10, 11 August 2024
  • faster because of the reduced number of expensive disk operations. Hellman, M.E., "A cryptanalytic time-memory trade-off", IEEE Transactions on Information...
    13 KB (2,421 words) - 05:11, 31 July 2024
  • Thumbnail for Cryptography
    for the sender, "Bob" (or "B") for the intended recipient, and "Eve" (or "E") for the eavesdropping adversary. Since the development of rotor cipher machines...
    98 KB (10,713 words) - 13:37, 29 July 2024
  • Thumbnail for Advanced Encryption Standard
    is a derangement), i.e., S ( a i , j ) ≠ a i , j {\displaystyle S(a_{i,j})\neq a_{i,j}} , and also any opposite fixed points, i.e., S ( a i , j ) ⊕ a i...
    49 KB (5,595 words) - 13:33, 7 August 2024
  • Thumbnail for Brute-force attack
    regulations historically restricted key lengths to 56-bit symmetric keys (e.g. Data Encryption Standard), these restrictions are no longer in place, so...
    21 KB (2,250 words) - 15:26, 19 July 2024
  • BaseKing BassOmatic BATON BEAR and LION CAST-256 Chiasmus CIKS-1 CIPHERUNICORN-A CIPHERUNICORN-E CLEFIA CMEA Cobra COCONUT98 Crab Cryptomeria/C2 CRYPTON CS-Cipher...
    8 KB (924 words) - 10:55, 17 July 2024
  • Thumbnail for Data Encryption Standard
    {\displaystyle K_{2}} : E K 1 ( E K 2 ( P ) ) = P {\displaystyle E_{K_{1}}(E_{K_{2}}(P))=P} or equivalently, E K 2 = D K 1 . {\displaystyle E_{K_{2}}=D_{K_{1}}...
    59 KB (6,541 words) - 09:32, 30 July 2024
  • a message to obscure the fact that many messages end in predictable ways, e.g. sincerely yours. Official messages often start and end in predictable ways:...
    23 KB (3,307 words) - 18:11, 14 February 2024
  • doi:10.1007/s00145-021-09398-9. eISSN 1432-1378. hdl:2066/235128. ISSN 0933-2790. S2CID 253633576. TU Graz. "Ascon: Publications". tugraz.at. v t e...
    8 KB (848 words) - 03:29, 28 April 2024
  • Thumbnail for Commercial National Security Algorithm Suite
    standards, raised considerable speculation about whether NSA had found weaknesses e.g. in elliptic-curve algorithms or others, or was trying to distance itself...
    9 KB (609 words) - 06:31, 19 July 2024
  • Thumbnail for Triple DES
    K2)} instead of one, and encrypt each block twice: E K 2 ( E K 1 ( plaintext ) ) {\displaystyle E_{K2}(E_{K1}({\textrm {plaintext}}))} . If the original...
    23 KB (2,946 words) - 08:25, 17 May 2024
  • Thumbnail for Avalanche effect
    slightly (for example, flipping a single bit), the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers...
    5 KB (568 words) - 17:23, 14 December 2023
  • BaseKing BassOmatic BATON BEAR and LION CAST-256 Chiasmus CIKS-1 CIPHERUNICORN-A CIPHERUNICORN-E CLEFIA CMEA Cobra COCONUT98 Crab Cryptomeria/C2 CRYPTON CS-Cipher...
    3 KB (218 words) - 20:16, 20 April 2023
  • indistinguishability • Ciphertext-only attack • Ciphertext stealing • CIPHERUNICORN-A • CIPHERUNICORN-E • Classical cipher • Claude Shannon • Claw-free permutation...
    67 KB (2,933 words) - 23:58, 6 June 2024
  • BaseKing BassOmatic BATON BEAR and LION CAST-256 Chiasmus CIKS-1 CIPHERUNICORN-A CIPHERUNICORN-E CLEFIA CMEA Cobra COCONUT98 Crab Cryptomeria/C2 CRYPTON CS-Cipher...
    7 KB (838 words) - 06:46, 27 April 2022
  • and a candidate for the AES competition CIPHERUNICORN-A – 128-bit block; CRYPTREC recommendation CIPHERUNICORN-E – 64-bit block; CRYPTREC recommendation...
    20 KB (1,890 words) - 03:10, 29 July 2024
  • function of encryption, i.e., D = E−1. More formally, a block cipher is specified by an encryption function E K ( P ) := E ( K , P ) : { 0 , 1 } k × {...
    50 KB (6,475 words) - 10:19, 23 June 2024
  • such as using a sequential counter over the block prior to encryption (i.e., CTR mode) and removing it after decryption avoids this problem. Another...
    12 KB (1,295 words) - 08:30, 9 August 2024
  • Thumbnail for CAST-128
    BaseKing BassOmatic BATON BEAR and LION CAST-256 Chiasmus CIKS-1 CIPHERUNICORN-A CIPHERUNICORN-E CLEFIA CMEA Cobra COCONUT98 Crab Cryptomeria/C2 CRYPTON CS-Cipher...
    4 KB (378 words) - 19:55, 13 April 2024
  • Vincent Rijmen (2002). The Design of Rijndael: AES—The Advanced Encryption Standard. Springer-Verlag. ISBN 3-540-42580-2. SCAN's entry for SHARK v t e...
    3 KB (224 words) - 07:09, 27 April 2022