Block cipher/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} ==Parent topics== {{r|Cryptography}} {{r|Information security}} ==Subtopics== {{r|Advanced Encryption Standard}} {{r|Avalanche (cryptography)) {{r|Data Encryption Standar...) |
No edit summary |
||
(9 intermediate revisions by 5 users not shown) | |||
Line 5: | Line 5: | ||
{{r|Cryptography}} | {{r|Cryptography}} | ||
{{r|Information security}} | {{r|Information security}} | ||
{{r|Cipher}} | |||
==Subtopics== | ==Subtopics== | ||
{{r|Avalanche (cryptography) | See our [[Block_cipher/Catalogs/Cipher_table| table of block ciphers]] for links to individual ciphers. | ||
{{r|Avalanche (cryptography)}} | |||
{{r|Round (cryptography)}} | {{r|Round (cryptography)}} | ||
{{r|S-box (cryptography)}} | {{r|S-box (cryptography)}} | ||
==Other related topics== | ==Other related topics== | ||
{{r|Cryptanalysis}} | {{r|Cryptanalysis}} | ||
{{r|Hash (cryptography}} | {{r|Block cipher modes of operation}} | ||
{{r|Linearity (cryptography)}}. A general discussion of nonlinearity would be part of this. | {{r|Hash (cryptography)}} | ||
{{r|Key management (cryptography}} | <!--{{r|Linearity (cryptography)}}. A general discussion of nonlinearity would be part of this.--> | ||
{{r|Key (cryptography)}} | |||
{{r|Key management (cryptography)}} | |||
{{r|Stream cipher}} | {{r|Stream cipher}} | ||
{{r|Permutation cipher}} | |||
{{r|Transposition cipher}} | |||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Code book attack}} | |||
{{r|AES competition}} |
Latest revision as of 16:00, 19 July 2024
- See also changes related to Block cipher, or pages that link to Block cipher or to this page or whose text contains "Block cipher".
Parent topics
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Cipher [r]: A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key [e]
Subtopics
See our table of block ciphers for links to individual ciphers.
- Avalanche (cryptography) [r]: A desirable property for operations in a cipher or hash, where a small change (even a single bit) quickly builds up to creating large effects. [e]
- Round (cryptography) [r]: A relatively simple operation which, when repeated many times, can be used to build an iterated cipher or hash. [e]
- S-box (cryptography) [r]: A substitution box or lookup table. [e]
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Block cipher modes of operation [r]: Methods of combining multiple block cipher operations to achieve a larger goal. [e]
- Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- Key (cryptography) [r]: Characteristics and generation of data which, in combination with a cryptographic algorithm, introduces or removes the concealment applied to plaintext or taken to ciphertext; key management is arelated but separate discipline of secure distribution of keys and entering them into cryptosystems [e]
- Key management (cryptography) [r]: Add brief definition or description
- Stream cipher [r]: A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step. [e]
- Permutation cipher [r]: Add brief definition or description
- Transposition cipher [r]: Add brief definition or description
- Code book attack [r]: Attacking a block cipher by creating a code book, collecting plaintext/ciphertext pairs. [e]
- AES competition [r]: A competition run by the US National Institute of Standards and Technology to chose a block cipher to become the Advanced Encryption Standard. [e]