• cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks. Block ciphers are the elementary...
    51 KB (6,569 words) - 07:54, 3 August 2025
  • Thumbnail for Block cipher mode of operation
    In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or...
    52 KB (5,830 words) - 02:15, 29 July 2025
  • Thumbnail for Feistel cipher
    cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the...
    10 KB (1,316 words) - 19:41, 2 February 2025
  • Thumbnail for Stream cipher
    stream. Stream ciphers represent a different approach to symmetric encryption from block ciphers. Block ciphers operate on large blocks of digits with...
    23 KB (2,231 words) - 21:32, 1 July 2025
  • In cryptography, the Iraqi block cipher was a block cipher published in C source code form by anonymous FTP upload around July 1999, and widely distributed...
    4 KB (428 words) - 13:29, 10 July 2025
  • Thumbnail for GOST (block cipher)
    GOST block cipher (Magma), defined in the standard GOST 28147-89 (RFC 5830), is a Soviet and Russian government standard symmetric key block cipher with...
    14 KB (1,469 words) - 19:58, 18 July 2025
  • Thumbnail for Cipher
    In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a...
    18 KB (2,152 words) - 16:42, 23 July 2025
  • Thumbnail for Symmetric-key algorithm
    use either stream ciphers or block ciphers. Stream ciphers encrypt the digits (typically bytes), or letters (in substitution ciphers) of a message one...
    15 KB (1,540 words) - 21:14, 19 June 2025
  • that securely combining separate confidentiality and authentication block cipher operation modes could be error prone and difficult. This was confirmed...
    19 KB (2,087 words) - 13:23, 24 July 2025
  • Thumbnail for Cryptography
    1976. Symmetric key ciphers are implemented as either block ciphers or stream ciphers. A block cipher enciphers input in blocks of plaintext as opposed...
    101 KB (11,144 words) - 05:17, 7 August 2025
  • Thumbnail for One-way compression function
    One-way compression functions are often built from block ciphers. Some methods to turn any normal block cipher into a one-way compression function are Davies–Meyer...
    24 KB (3,977 words) - 11:37, 24 March 2025
  • In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with...
    30 KB (4,039 words) - 04:59, 7 August 2025
  • RC4 (redirect from RC4 Cipher)
    In cryptography, RC4 (Rivest Cipher 4, also known as ARC4 or ARCFOUR, meaning Alleged RC4, see below) is a stream cipher. While it is remarkable for its...
    45 KB (5,091 words) - 05:33, 18 July 2025
  • modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers. Block ciphers operate on a fixed length string of...
    3 KB (371 words) - 04:03, 4 December 2024
  • In cryptography, residual block termination is a variation of cipher block chaining mode (CBC) that does not require any padding. It does this by effectively...
    1 KB (147 words) - 22:53, 1 June 2025
  • Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in many cipher suites and encryption products. Blowfish provides...
    18 KB (2,000 words) - 15:11, 16 April 2025
  • distinct ciphers: a block cipher and a stream cipher. When used in encryption mode the data are first encrypted using the 64-bit block cipher in CBC mode...
    9 KB (1,222 words) - 00:48, 24 May 2024
  • In cryptography, the S-1 block cipher was a block cipher posted in source code form on Usenet on 11 August 1995. Although incorrect security markings...
    2 KB (191 words) - 07:39, 27 April 2022
  • Thumbnail for Advanced Encryption Standard
    Standards and Technology (NIST) in 2001. AES is a variant of the Rijndael block cipher developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen...
    50 KB (5,679 words) - 04:23, 27 July 2025
  • Galois/Counter Mode (category Block cipher modes of operation)
    Galois/Counter Mode (GCM) is a mode of operation for symmetric-key cryptographic block ciphers which is widely adopted for its performance. GCM throughput rates for...
    23 KB (3,051 words) - 16:00, 1 July 2025
  • cryptography, Lucifer was the name given to several of the earliest civilian block ciphers, developed by Horst Feistel and his colleagues at IBM. Lucifer was a...
    6 KB (749 words) - 15:35, 22 November 2023
  • method of using a block cipher mode of operation that allows for processing of messages that are not evenly divisible into blocks without resulting in...
    17 KB (2,269 words) - 14:13, 13 January 2024
  • Thumbnail for Vigenère cipher
    The Vigenère cipher (French pronunciation: [viʒnɛːʁ]) is a method of encrypting alphabetic text where each letter of the plaintext is encoded with a different...
    46 KB (6,098 words) - 04:13, 15 July 2025
  • Thumbnail for Ciphertext
    Ciphertext (redirect from Cipher text)
    algorithms can either be block ciphers or stream ciphers. Block ciphers operate on fixed-length groups of bits, called blocks, with an unvarying transformation...
    9 KB (1,133 words) - 21:23, 27 July 2025
  • Thumbnail for International Data Encryption Algorithm
    called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described...
    12 KB (1,499 words) - 19:07, 14 April 2024
  • Thumbnail for Cryptanalysis
    distinguish the cipher from a random permutation. Academic attacks are often against weakened versions of a cryptosystem, such as a block cipher or hash function...
    44 KB (5,206 words) - 14:03, 20 July 2025
  • Caesar cipher ROT13 Affine cipher Atbash cipher Keyword cipher Polyalphabetic substitution Vigenère cipher Autokey cipher Homophonic substitution cipher Polygraphic...
    20 KB (1,901 words) - 17:17, 17 July 2025
  • In cryptography, Square (sometimes written SQUARE) is a block cipher invented by Joan Daemen and Vincent Rijmen. The design, published in 1997, is a forerunner...
    2 KB (125 words) - 03:34, 28 April 2024
  • (Modular Multiplication-based Block cipher) is a block cipher designed by Joan Daemen as an improved replacement for the IDEA cipher. Modular multiplication...
    3 KB (204 words) - 18:21, 25 September 2023
  • the block cipher's security parameter (this usually means the effort required should be about the same as a brute force search through the cipher's key...
    10 KB (1,303 words) - 13:43, 26 May 2025