• Thumbnail for Data Encryption Standard
    The Data Encryption Standard (DES /ˌdiːˌiːˈɛs, dɛz/) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of...
    60 KB (6,717 words) - 17:36, 25 May 2025
  • was markedly more open and transparent than its predecessor, the Data Encryption Standard (DES). This process won praise from the open cryptographic community...
    10 KB (1,040 words) - 10:14, 4 January 2025
  • Thumbnail for Advanced Encryption Standard
    Advanced Encryption Standard (AES), also known by its original name Rijndael (Dutch pronunciation: [ˈrɛindaːl]), is a specification for the encryption of electronic...
    50 KB (5,679 words) - 15:35, 15 June 2025
  • Thumbnail for International Data Encryption Algorithm
    cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block...
    12 KB (1,499 words) - 19:07, 14 April 2024
  • Thumbnail for Triple DES
    algorithm three times to each data block. The 56-bit key of the Data Encryption Standard (DES) is no longer considered adequate in the face of modern cryptanalytic...
    23 KB (2,957 words) - 06:06, 5 May 2025
  • attract a large amount of cryptanalysis. Data Encryption Standard (DES, now obsolete) Advanced Encryption Standard (AES) RSA the original public key algorithm...
    5 KB (500 words) - 02:51, 20 June 2024
  • Thumbnail for Encryption
    In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can...
    34 KB (3,645 words) - 07:39, 2 June 2025
  • Transparent data encryption (often abbreviated to TDE) is a technology employed by Microsoft, IBM and Oracle to encrypt database files. TDE offers encryption at...
    6 KB (639 words) - 12:21, 20 April 2025
  • JSON Web Encryption (JWE) is an IETF standard providing a standardised syntax for the exchange of encrypted data, based on JSON and Base64. It is defined...
    3 KB (283 words) - 21:10, 15 January 2025
  • Thumbnail for List of telecommunications encryption terms
    Crypto-shredding Data Encryption Standard (DES) Decipher Decode Decrypt DECT Standard Cipher Descrambler Dncipher Encode Encoding law Encrypt End-to-end encryption group...
    5 KB (446 words) - 21:24, 28 August 2024
  • Thumbnail for National Security Agency
    transparent process for replacing the outdated Data Encryption Standard (DES) by an Advanced Encryption Standard (AES). Cybersecurity policy expert Susan Landau...
    260 KB (24,829 words) - 20:14, 12 June 2025
  • Authenticated Encryption (AE) is an encryption scheme which simultaneously assures the data confidentiality (also known as privacy: the encrypted message...
    18 KB (1,992 words) - 02:40, 9 June 2025
  • Data Encryption Standard (DES), but in some ciphers the tables are generated dynamically from the key (e.g. the Blowfish and the Twofish encryption algorithms)...
    10 KB (929 words) - 20:28, 24 May 2025
  • Thumbnail for Feistel cipher
    including the US Data Encryption Standard, the Soviet/Russian GOST and the more recent Blowfish and Twofish ciphers. In a Feistel cipher, encryption and decryption...
    10 KB (1,316 words) - 19:41, 2 February 2025
  • ciphers and hash functions, including a theoretical weakness in the Data Encryption Standard (DES). It was noted by Biham and Shamir that DES was surprisingly...
    13 KB (1,677 words) - 11:30, 9 March 2025
  • commercial encryption on the rapidly growing field of wired money transfer. The U.S. Government's introduction of the Data Encryption Standard in 1975 meant...
    37 KB (4,098 words) - 16:28, 10 May 2025
  • Force: Cracking the Data Encryption Standard. Curtin's work includes helping to prove the weakness of the Data Encryption Standard and providing expert...
    2 KB (163 words) - 18:25, 29 April 2024
  • Key size (redirect from 128 bit encryption)
    cipher was selected in 1974 as the base for what would become the Data Encryption Standard. Lucifer's key length was reduced from 128 bits to 56 bits, which...
    29 KB (3,225 words) - 01:39, 6 June 2025
  • DES supplementary material (category Data Encryption Standard)
    This article details the various tables referenced in the Data Encryption Standard (DES) block cipher. All bits and bytes are arranged in big endian order...
    11 KB (600 words) - 11:47, 6 November 2023
  • Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it. The resulting...
    42 KB (4,692 words) - 23:00, 1 April 2025
  • symmetric-key block ciphers designed as possible replacements for the Data Encryption Standard (DES). The ciphers were developed based on a body of work analysing...
    6 KB (723 words) - 23:05, 27 March 2024
  • Yamagishi, 1992). Subsequently, Matsui published an attack on the Data Encryption Standard (DES), eventually leading to the first experimental cryptanalysis...
    6 KB (812 words) - 13:20, 1 November 2023
  • Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk). This article presents...
    30 KB (3,772 words) - 11:25, 5 December 2024
  • codes Data Encryption Standard de facto standard de jure Defense Standard DIN DSSSL Charles Benjamin Dudley EAN EBCDIC ETSI Extended Industry Standard Architecture...
    3 KB (260 words) - 02:29, 26 December 2023
  • Brute Force: Cracking the Data Encryption Standard (2005, Copernicus Books ISBN 0387271600) is a book by Matt Curtin about cryptography. In this book,...
    2 KB (162 words) - 05:28, 28 April 2024
  • unauthorized people or processes. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume...
    17 KB (2,194 words) - 00:15, 20 June 2025
  • initiating research that culminated in the development of the Data Encryption Standard (DES) in the 1970s. The structure used in DES, called a Feistel...
    5 KB (423 words) - 12:36, 24 May 2025
  • Opportunistic Wireless Encryption (OWE) is a Wi-Fi standard which ensures that communication between a public hotspot and end devices is protected from...
    5 KB (493 words) - 13:40, 16 December 2024
  • volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for...
    37 KB (3,534 words) - 03:51, 24 April 2025
  • Thumbnail for Nothing-up-my-sleeve number
    motivated by early controversy over the U.S. Government's 1975 Data Encryption Standard, which came under criticism because no explanation was supplied...
    15 KB (1,562 words) - 18:19, 14 April 2025