Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer...
6 KB (819 words) - 05:08, 24 March 2025
Most cryptographic hash functions are designed to take a string of any length as input and produce a fixed-length hash value. A cryptographic hash function...
49 KB (6,299 words) - 15:10, 30 May 2025
work in cryptography concerns cryptographic primitives—algorithms with basic cryptographic properties—and their relationship to other cryptographic problems...
100 KB (11,007 words) - 01:11, 20 June 2025
Security level (redirect from Cryptographic strength)
In cryptography, security level is a measure of the strength that a cryptographic primitive — such as a cipher or hash function — achieves. Security level...
13 KB (1,332 words) - 16:46, 24 June 2025
In cryptographic protocol design, cryptographic agility or crypto-agility is the ability to switch between multiple cryptographic primitives. A cryptographically...
12 KB (1,222 words) - 11:18, 7 February 2025
Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself or...
24 KB (2,852 words) - 22:13, 30 June 2025
A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences...
9 KB (1,015 words) - 07:59, 25 April 2025
stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be...
13 KB (1,517 words) - 22:31, 1 June 2025
Symmetric-key algorithm (redirect from Symmetric key cryptography)
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of...
15 KB (1,540 words) - 21:14, 19 June 2025
Digital signature (redirect from Cryptographic signature)
to the recipient. Digital signatures are a standard element of most cryptographic protocol suites, and are commonly used for software distribution, financial...
45 KB (5,315 words) - 21:32, 29 June 2025
Encryption (redirect from Cryptographic algorithm)
types of keys in cryptographic systems are symmetric-key and public-key (also known as asymmetric-key). Many complex cryptographic algorithms often use...
34 KB (3,645 words) - 13:17, 2 July 2025
it suitable for use in cryptography. It is also referred to as a cryptographic random number generator (CRNG). Most cryptographic applications require random...
29 KB (3,633 words) - 08:24, 16 April 2025
Initialization vector (category Cryptography)
In cryptography, an initialization vector (IV) or starting variable is an input to a cryptographic primitive being used to provide the initial state....
14 KB (1,797 words) - 08:53, 7 September 2024
Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
22 KB (2,846 words) - 19:45, 6 February 2025
Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
64 KB (6,569 words) - 09:25, 1 July 2025
Block cipher mode of operation (category Cryptographic algorithms)
which combined confidentiality and data integrity into a single cryptographic primitive (an encryption algorithm). These combined modes are referred to...
52 KB (5,828 words) - 12:52, 13 June 2025
(or its version after key stretching) are concatenated and fed to a cryptographic hash function, and the output hash value is then stored with the salt...
13 KB (1,527 words) - 22:35, 14 June 2025
with other cryptographic primitives); in this case they are described as universal hash functions. Among the typical uses of non-cryptographic hash functions...
7 KB (796 words) - 00:45, 28 April 2025
PKCS 1 (category Cryptography standards)
RSA algorithm for public-key cryptography. It defines the mathematical properties of public and private keys, primitive operations for encryption and...
11 KB (1,484 words) - 18:23, 11 March 2025
The Cryptographic Message Syntax (CMS) is the IETF's standard for cryptographically protected messages. It can be used by cryptographic schemes and protocols...
3 KB (322 words) - 07:10, 20 February 2025
is as hard as solving the hard problem underlying the primitive. Even if perfect cryptographic routines are used, the attacker can gain knowledge of the...
23 KB (3,308 words) - 22:09, 21 June 2025
PKCS 7 (category Cryptography standards)
Public-Key Cryptography Standards (PKCS) #7: Cryptographic Message Syntax Specification Version 1.5, March 1998 RFC 2630 - Cryptographic Message Syntax...
4 KB (443 words) - 12:38, 16 June 2024
In cryptography, the white-box model refers to an extreme attack scenario, in which an adversary has full unrestricted access to a cryptographic implementation...
20 KB (2,480 words) - 08:03, 11 June 2025
Block cipher (category Cryptographic primitives)
can be used to build other cryptographic primitives, such as those below. For these other primitives to be cryptographically secure, care has to be taken...
51 KB (6,569 words) - 08:42, 11 April 2025
Black-box obfuscation (category Cryptographic primitives)
In cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that...
7 KB (979 words) - 14:23, 8 March 2025
Multivariate cryptography is the generic term for asymmetric cryptographic primitives based on multivariate polynomials over a finite field F {\displaystyle...
8 KB (1,147 words) - 02:58, 17 April 2025
Hash collision (redirect from Cryptographic hash collision)
returns a fixed length of bits. Although hash algorithms, especially cryptographic hash algorithms, have been created with the intent of being collision...
9 KB (1,142 words) - 20:01, 19 June 2025
RSA cryptosystem (redirect from RSA public key cryptography)
algorithm was granted to MIT on 20 September 1983: U.S. patent 4,405,829 "Cryptographic communications system and method". From DWPI's abstract of the patent:...
60 KB (7,783 words) - 17:53, 28 June 2025
Benchmarking of Cryptographic Hashes – measurements of hash function speed on various platforms The ECRYPT Hash Function Website – A wiki for cryptographic hash...
16 KB (806 words) - 04:43, 24 May 2025
1991. L. Brown, Josef Pieprzyk and Jennifer Seberry, "LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications", in Advances in Cryptology...
6 KB (723 words) - 23:05, 27 March 2024