Block cipher/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris (→Parent topics: cipher) |
imported>Sandy Harris (→Other related topics: modes) |
||
Line 16: | Line 16: | ||
==Other related topics== | ==Other related topics== | ||
{{r|Cryptanalysis}} | {{r|Cryptanalysis}} | ||
{{r|Block cipher modes of operation}} | |||
{{r|Hash (cryptography)}} | {{r|Hash (cryptography)}} | ||
{{r|Linearity (cryptography)}}. A general discussion of nonlinearity would be part of this. | {{r|Linearity (cryptography)}}. A general discussion of nonlinearity would be part of this. |
Revision as of 02:58, 23 May 2009
- See also changes related to Block cipher, or pages that link to Block cipher or to this page or whose text contains "Block cipher".
Parent topics
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Cipher [r]: A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key [e]
Subtopics
- Advanced Encryption Standard [r]: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
- Avalanche (cryptography) [r]: A desirable property for operations in a cipher or hash, where a small change (even a single bit) quickly builds up to creating large effects. [e]
- Data Encryption Standard [r]: A block cipher specification issued by the U.S. government in 1976, intended for sensitive but unclassified data. It is now obsolescent, succeeded by the Advanced Encryption Standard, but still used in commercial systems. [e]
- Round (cryptography) [r]: A relatively simple operation which, when repeated many times, can be used to build an iterated cipher or hash. [e]
- S-box (cryptography) [r]: A substitution box or lookup table. [e]
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Block cipher modes of operation [r]: Methods of combining multiple block cipher operations to achieve a larger goal. [e]
- Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- Linearity (cryptography) [r]: Add brief definition or description. A general discussion of nonlinearity would be part of this.
- Key (cryptography) [r]: Characteristics and generation of data which, in combination with a cryptographic algorithm, introduces or removes the concealment applied to plaintext or taken to ciphertext; key management is arelated but separate discipline of secure distribution of keys and entering them into cryptosystems [e]
- Key management (cryptography) [r]: Add brief definition or description
- Stream cipher [r]: A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step. [e]