• In cryptography, key size or key length refers to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the...
    29 KB (3,222 words) - 03:31, 9 April 2025
  • Thumbnail for Symmetric-key algorithm
    symmetric-key encryption algorithms are usually better for bulk encryption. With exception of the one-time pad they have a smaller key size, which means...
    15 KB (1,540 words) - 19:12, 22 April 2025
  • A key's security strength is dependent on its algorithm, the size of the key, the generation of the key, and the process of key exchange. The key is...
    13 KB (1,524 words) - 21:51, 14 May 2025
  • Thumbnail for Hex key
    are commonly sold in kits that include a variety of sizes. Key length typically increases with size but not necessarily proportionally so. Variants on...
    19 KB (2,130 words) - 05:10, 22 May 2025
  • Thumbnail for Advanced Encryption Standard
    different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths:...
    50 KB (5,675 words) - 00:20, 17 May 2025
  • Thumbnail for Cipher
    search for a key (i.e., "brute force" attack) substantially. Key size, i.e., the size of key used to encrypt a message. As the key size increases, so...
    18 KB (2,154 words) - 14:11, 15 May 2025
  • assumptions about the size of the key and the number of possible messages, there is an average ciphertext length where there is only one key (on average) that...
    7 KB (980 words) - 20:30, 21 April 2024
  • Thumbnail for Speck (cipher)
    variety of block and key sizes. A block is always two words, but the words may be 16, 24, 32, 48 or 64 bits in size. The corresponding key is 2, 3 or 4 words...
    23 KB (2,411 words) - 04:35, 11 December 2023
  • Thumbnail for YubiKey
    USB HID protocol. A YubiKey can also present itself as an OpenPGP card using 1024, 2048, 3072 and 4096-bit RSA (for key sizes over 2048 bits, GnuPG version...
    32 KB (2,957 words) - 02:48, 21 March 2025
  • theory Diffie–Hellman key exchange Digital Signature Algorithm Elliptic-curve cryptography Key exchange Key management Key size Public-key cryptography Rabin...
    60 KB (7,787 words) - 23:29, 17 May 2025
  • AES-128 (key size 128 bits) is designed to offer a 128-bit security level, which is considered roughly equivalent to a RSA using 3072-bit key. In this...
    13 KB (1,332 words) - 01:56, 12 March 2025
  • Thumbnail for Data Encryption Standard
    short 56-bit key size. In January 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and...
    60 KB (6,717 words) - 10:58, 20 May 2025
  • Thumbnail for Triple DES
    and 3DES encryption algorithms. This CVE, combined with the inadequate key size of 3DES, led to NIST deprecating 3DES in 2019 and disallowing all uses...
    23 KB (2,957 words) - 06:06, 5 May 2025
  • decryption, D. Both algorithms accept two inputs: an input block of size n bits and a key of size k bits; and both yield an n-bit output block. The decryption...
    51 KB (6,569 words) - 08:42, 11 April 2025
  • Thumbnail for CAST-128
    64-bit block size and a key size of between 40 and 128 bits (but only in 8-bit increments). The full 16 rounds are used when the key size is longer than...
    4 KB (378 words) - 19:55, 13 April 2024
  • large key sizes, the symmetric key cryptographic systems like AES and SNOW 3G are already resistant to attack by a quantum computer. Further, key management...
    63 KB (6,408 words) - 13:56, 6 May 2025
  • of the design include key-dependent S-boxes and a highly complex key schedule. Blowfish has a 64-bit block size and a variable key length from 32 bits up...
    18 KB (2,000 words) - 15:11, 16 April 2025
  • have 56-bit and 128-bit key sizes, respectively, providing a much higher level of security than the less secure 40-bit key size of CSS. The content scramble...
    12 KB (1,412 words) - 03:17, 2 May 2025
  • Thumbnail for Home key
    key is commonly found on desktop and laptop keyboards. The key has the opposite effect of the End key. In limited-size keyboards where the Home key is...
    4 KB (454 words) - 17:35, 21 December 2024
  • Elliptic-curve cryptography (category Public-key cryptography)
    such as RSA is a smaller key size, reducing storage and transmission requirements. For example, a 256-bit elliptic curve public key should provide comparable...
    39 KB (4,677 words) - 13:04, 20 May 2025
  • Thumbnail for Cryptography
    with typical key sizes. As a result, public-key cryptosystems are commonly hybrid cryptosystems, in which a fast high-quality symmetric-key encryption algorithm...
    99 KB (10,975 words) - 11:30, 14 May 2025
  • Thumbnail for EFF DES cracker
    cipher's key space – that is, to decrypt an encrypted message by trying every possible key. The aim in doing this was to prove that the key size of DES...
    10 KB (1,031 words) - 05:27, 28 February 2023
  • Rijndael, supports block and key sizes of 128, 192, and 256 bits, but in AES the block size is always 128 bits. The extra block sizes were not adopted by the...
    3 KB (371 words) - 04:03, 4 December 2024
  • the block size instead of the key size and therefore the actual security level is much less than the security level implied by the key size. CTR_DRBG...
    17 KB (1,979 words) - 23:02, 21 April 2025
  • Thumbnail for Key relevance
    and how similar the two keys are in size and shape. It can also refer to the measurable difference between a key and the size required to fit and operate...
    4 KB (478 words) - 13:22, 5 December 2024
  • implemented in software. While Triple-DES avoids the problem of a small key size, it is very slow even in hardware, it is unsuitable for limited-resource...
    10 KB (1,040 words) - 10:14, 4 January 2025
  • Thumbnail for RC6
    RC6 (section Key expansion)
    algorithm, patented by RSA Security. RC6 proper has a block size of 128 bits and supports key sizes of 128, 192, and 256 bits up to 2040-bits, but, like RC5...
    7 KB (732 words) - 12:34, 30 April 2025
  • Thumbnail for Key schedule
    the cipher key called a round key. A key schedule is an algorithm that calculates all the round keys from the key. Some ciphers have simple key schedules...
    3 KB (402 words) - 17:31, 15 March 2023
  • Thumbnail for Diffie–Hellman key exchange
    key exchange is a mathematical method of securely generating a symmetric cryptographic key over a public channel and was one of the first public-key protocols...
    48 KB (5,437 words) - 16:48, 22 April 2025
  • Thumbnail for Tiny Encryption Algorithm
    notably, it suffers from equivalent keys—each key is equivalent to three others, which means that the effective key size is only 126 bits. As a result, TEA...
    13 KB (1,189 words) - 03:44, 16 March 2025