In cryptography, key size or key length refers to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the...
29 KB (3,222 words) - 03:31, 9 April 2025
symmetric-key encryption algorithms are usually better for bulk encryption. With exception of the one-time pad they have a smaller key size, which means...
15 KB (1,540 words) - 19:12, 22 April 2025
A key's security strength is dependent on its algorithm, the size of the key, the generation of the key, and the process of key exchange. The key is...
13 KB (1,517 words) - 22:31, 1 June 2025
are commonly sold in kits that include a variety of sizes. Key length typically increases with size but not necessarily proportionally so. Variants on...
19 KB (2,130 words) - 05:10, 22 May 2025
Advanced Encryption Standard (redirect from AES Key)
different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths:...
50 KB (5,678 words) - 06:43, 27 May 2025
Cipher (section Key size and vulnerability)
search for a key (i.e., "brute force" attack) substantially. Key size, i.e., the size of key used to encrypt a message. As the key size increases, so...
18 KB (2,154 words) - 17:54, 27 May 2025
USB HID protocol. A YubiKey can also present itself as an OpenPGP card using 1024, 2048, 3072 and 4096-bit RSA (for key sizes over 2048 bits, GnuPG version...
32 KB (2,957 words) - 02:48, 21 March 2025
and how similar the two keys are in size and shape. It can also refer to the measurable difference between a key and the size required to fit and operate...
4 KB (478 words) - 13:22, 5 December 2024
Unicity distance (redirect from Spurious key)
assumptions about the size of the key and the number of possible messages, there is an average ciphertext length where there is only one key (on average) that...
7 KB (980 words) - 23:44, 24 May 2025
Triple DES (section Keying options)
and 3DES encryption algorithms. This CVE, combined with the inadequate key size of 3DES, led to NIST deprecating 3DES in 2019 and disallowing all uses...
23 KB (2,957 words) - 06:06, 5 May 2025
RSA cryptosystem (redirect from RSA public key cryptography)
theory Diffie–Hellman key exchange Digital Signature Algorithm Elliptic-curve cryptography Key exchange Key management Key size Public-key cryptography Rabin...
60 KB (7,783 words) - 17:51, 26 May 2025
Data Encryption Standard (section Key schedule)
short 56-bit key size. In January 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and...
60 KB (6,717 words) - 17:36, 25 May 2025
Post-quantum cryptography (section Lattice-based cryptography – LWE key exchange and Ring-LWE key exchange)
large key sizes, the symmetric key cryptographic systems like AES and SNOW 3G are already resistant to attack by a quantum computer. Further, key management...
63 KB (6,408 words) - 13:56, 6 May 2025
decryption, D. Both algorithms accept two inputs: an input block of size n bits and a key of size k bits; and both yield an n-bit output block. The decryption...
51 KB (6,569 words) - 08:42, 11 April 2025
AES-128 (key size 128 bits) is designed to offer a 128-bit security level, which is considered roughly equivalent to a RSA using 3072-bit key. In this...
13 KB (1,332 words) - 01:56, 12 March 2025
have 56-bit and 128-bit key sizes, respectively, providing a much higher level of security than the less secure 40-bit key size of CSS. The content scramble...
12 KB (1,412 words) - 03:17, 2 May 2025
the cipher key called a round key. A key schedule is an algorithm that calculates all the round keys from the key. Some ciphers have simple key schedules...
3 KB (402 words) - 08:19, 29 May 2025
Rijndael, supports block and key sizes of 128, 192, and 256 bits, but in AES the block size is always 128 bits. The extra block sizes were not adopted by the...
3 KB (371 words) - 04:03, 4 December 2024
64-bit block size and a key size of between 40 and 128 bits (but only in 8-bit increments). The full 16 rounds are used when the key size is longer than...
4 KB (378 words) - 19:55, 13 April 2024
Cryptography (section Symmetric-key cryptography)
with typical key sizes. As a result, public-key cryptosystems are commonly hybrid cryptosystems, in which a fast high-quality symmetric-key encryption algorithm...
99 KB (10,975 words) - 18:31, 26 May 2025
Speck (cipher) (section Block and key sizes)
variety of block and key sizes. A block is always two words, but the words may be 16, 24, 32, 48 or 64 bits in size. The corresponding key is 2, 3 or 4 words...
23 KB (2,411 words) - 07:38, 25 May 2025
key is commonly found on desktop and laptop keyboards. The key has the opposite effect of the End key. In limited-size keyboards where the Home key is...
4 KB (454 words) - 17:35, 21 December 2024
key exchange is a mathematical method of securely generating a symmetric cryptographic key over a public channel and was one of the first public-key protocols...
48 KB (5,437 words) - 22:41, 31 May 2025
NIST SP 800-90A (section Key erasure)
the block size instead of the key size and therefore the actual security level is much less than the security level implied by the key size. CTR_DRBG...
17 KB (1,979 words) - 23:02, 21 April 2025
(LUKS1) or 32 (LUKS2) encryption keys to be stored along with encryption parameters such as cipher type and key size. The presence of this header is a...
14 KB (1,175 words) - 01:55, 8 August 2024
Elliptic-curve cryptography (category Public-key cryptography)
such as RSA is a smaller key size, reducing storage and transmission requirements. For example, a 256-bit elliptic curve public key should provide comparable...
39 KB (4,677 words) - 13:04, 20 May 2025
compact layout, combine keys which are normally kept separate. Alt + Fn is typically found on laptops due to their keyboard size restrictions. It is also...
12 KB (1,536 words) - 16:49, 7 May 2025
{\mbox{DES}}_{K}(M\oplus K_{1})} The key size is thereby increased to 56 + (2 × 64) = 184 bits. However, the effective key size (security) is only increased to...
4 KB (533 words) - 09:53, 31 October 2024
The End key is a key commonly found on desktop and laptop keyboards. The key has the opposite effect of the Home key. In some limited-size keyboards where...
3 KB (412 words) - 15:19, 2 November 2022
Blowfish (cipher) (redirect from Blowfish key)
of the design include key-dependent S-boxes and a highly complex key schedule. Blowfish has a 64-bit block size and a variable key length from 32 bits up...
18 KB (2,000 words) - 15:11, 16 April 2025