In modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers. Block ciphers operate on a fixed length string...
3 KB (371 words) - 04:03, 4 December 2024
Block size can refer to: Block (data storage), the size of a block in data storage and file systems. Block size (cryptography), the minimal unit of data...
293 bytes (73 words) - 14:38, 30 January 2020
In cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks. Block ciphers are the elementary...
51 KB (6,569 words) - 07:54, 3 August 2025
In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or authenticity...
52 KB (5,830 words) - 02:15, 29 July 2025
Initialization vector (category Block cipher modes of operation)
for a nonce. The IV size depends on the cryptographic primitive used; for block ciphers it is generally the cipher's block-size. In encryption schemes...
14 KB (1,797 words) - 08:53, 7 September 2024
an additional block of zero bytes if the plaintext is already divisible by the block size.[citation needed] In public key cryptography, padding is the...
23 KB (3,308 words) - 22:09, 21 June 2025
Cryptography, or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study"...
101 KB (11,144 words) - 05:17, 7 August 2025
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
49 KB (6,300 words) - 10:48, 24 July 2025
Bletchley Park • Blinding (cryptography) • Blind signature • Block cipher • Block cipher mode of operation • Block size (cryptography) • Blowfish (cipher) •...
66 KB (2,911 words) - 02:58, 27 July 2025
it suitable for use in cryptography. It is also referred to as a cryptographic random number generator (CRNG). Most cryptographic applications require random...
29 KB (3,633 words) - 08:24, 16 April 2025
Symmetric-key algorithm (redirect from Symmetric key cryptography)
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of...
15 KB (1,540 words) - 21:14, 19 June 2025
Data Encryption Standard (redirect from DES (cryptography))
modern applications, it has been highly influential in the advancement of cryptography. Developed in the early 1970s at IBM and based on an earlier design by...
60 KB (6,704 words) - 20:26, 3 August 2025
larger than block size}}\\K&{\text{otherwise}}\end{cases}}\end{aligned}}} where H {\displaystyle \operatorname {H} } is a cryptographic hash function...
18 KB (2,327 words) - 01:15, 2 August 2025
following tables compare general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information...
16 KB (806 words) - 04:43, 24 May 2025
In cryptography, residual block termination is a variation of cipher block chaining mode (CBC) that does not require any padding. It does this by effectively...
1 KB (147 words) - 22:53, 1 June 2025
MMB (cipher) (category Cryptography stubs)
In cryptography, MMB (Modular Multiplication-based Block cipher) is a block cipher designed by Joan Daemen as an improved replacement for the IDEA cipher...
3 KB (204 words) - 18:21, 25 September 2023
Feistel cipher (redirect from Luby-Rackoff block cipher)
In cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named...
10 KB (1,316 words) - 19:41, 2 February 2025
In cryptography, key size or key length refers to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines...
29 KB (3,241 words) - 22:31, 5 August 2025
processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties...
13 KB (1,517 words) - 06:00, 3 August 2025
Soviet and Russian government standard symmetric key block cipher with a block size of 64 bits. The original standard, published in 1989, did not give the...
14 KB (1,469 words) - 20:04, 9 August 2025
and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines...
20 KB (1,901 words) - 17:17, 17 July 2025
Merkle tree (category Cryptographic hash functions)
cryptographic hash of a data block, and every node that is not a leaf (called a branch, inner node, or inode) is labelled with the cryptographic hash of the labels...
15 KB (1,785 words) - 00:31, 10 August 2025
In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
13 KB (1,527 words) - 22:35, 14 June 2025
Sponge function (redirect from Cryptographic sponge)
In cryptography, a sponge function or sponge construction is any of a class of algorithms with finite internal state that take an input bit stream of any...
7 KB (846 words) - 09:04, 19 April 2025
EFF DES cracker (category Cryptographic hardware)
In cryptography, the EFF DES cracker (nicknamed "Deep Crack") is a machine built by the Electronic Frontier Foundation (EFF) in 1998, to perform a brute...
10 KB (1,031 words) - 05:27, 28 February 2023
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC...
39 KB (4,677 words) - 07:29, 27 June 2025
Advanced Encryption Standard process (category Cryptography contests)
potential security issues connected with the (today comparatively small) block size of 64 bits. On January 2, 1997, NIST announced that they wished to choose...
10 KB (1,040 words) - 10:14, 4 January 2025
MARS (cipher) (redirect from MARS (cryptography))
advances in cryptographic mathematics. The Twofish team made a similar statement about its cipher. MARS has a 128-bit block size and a variable key size of between...
4 KB (359 words) - 03:17, 10 January 2024
Speck (cipher) (category Block ciphers)
supports a variety of block and key sizes. A block is always two words, but the words may be 16, 24, 32, 48 or 64 bits in size. The corresponding key...
23 KB (2,411 words) - 07:38, 25 May 2025
In cryptography, the Iraqi block cipher was a block cipher published in C source code form by anonymous FTP upload around July 1999, and widely distributed...
4 KB (428 words) - 13:29, 10 July 2025