Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer...
6 KB (819 words) - 05:08, 24 March 2025
work in cryptography concerns cryptographic primitives—algorithms with basic cryptographic properties—and their relationship to other cryptographic problems...
99 KB (10,975 words) - 11:30, 14 May 2025
Most cryptographic hash functions are designed to take a string of any length as input and produce a fixed-length hash value. A cryptographic hash function...
49 KB (6,299 words) - 20:13, 4 May 2025
Security level (redirect from Cryptographic strength)
In cryptography, security level is a measure of the strength that a cryptographic primitive — such as a cipher or hash function — achieves. Security level...
13 KB (1,332 words) - 01:56, 12 March 2025
In cryptographic protocol design, cryptographic agility or crypto-agility is the ability to switch between multiple cryptographic primitives. A cryptographically...
12 KB (1,222 words) - 11:18, 7 February 2025
Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself or...
24 KB (2,852 words) - 05:01, 2 May 2025
Black-box obfuscation (category Cryptographic primitives)
In cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that...
7 KB (979 words) - 14:23, 8 March 2025
it suitable for use in cryptography. It is also referred to as a cryptographic random number generator (CRNG). Most cryptographic applications require random...
29 KB (3,633 words) - 08:24, 16 April 2025
A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences...
9 KB (1,015 words) - 07:59, 25 April 2025
Sponge function (redirect from Cryptographic sponge)
uses. They can be used to model or implement many cryptographic primitives, including cryptographic hashes, message authentication codes, mask generation...
7 KB (846 words) - 09:04, 19 April 2025
Encryption (redirect from Cryptographic algorithm)
types of keys in cryptographic systems are symmetric-key and public-key (also known as asymmetric-key). Many complex cryptographic algorithms often use...
34 KB (3,645 words) - 17:52, 2 May 2025
Digital signature (redirect from Cryptographic signature)
to the recipient. Digital signatures are a standard element of most cryptographic protocol suites, and are commonly used for software distribution, financial...
45 KB (5,315 words) - 16:52, 11 April 2025
stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be...
13 KB (1,524 words) - 21:51, 14 May 2025
Initialization vector (category Cryptography)
In cryptography, an initialization vector (IV) or starting variable is an input to a cryptographic primitive being used to provide the initial state....
14 KB (1,797 words) - 08:53, 7 September 2024
Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
22 KB (2,846 words) - 19:45, 6 February 2025
with other cryptographic primitives); in this case they are described as universal hash functions. Among the typical uses of non-cryptographic hash functions...
7 KB (796 words) - 00:45, 28 April 2025
Signcryption (category Public-key cryptography)
In cryptography, signcryption is a public-key primitive that simultaneously performs the functions of both digital signature and encryption. Encryption...
7 KB (918 words) - 20:22, 28 January 2025
Symmetric-key algorithm (redirect from Symmetric key cryptography)
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of...
15 KB (1,540 words) - 19:12, 22 April 2025
Panama is a cryptographic primitive which can be used both as a hash function and a stream cipher, but its hash function mode of operation has been broken...
4 KB (352 words) - 12:48, 29 July 2024
Block cipher (category Cryptographic primitives)
can be used to build other cryptographic primitives, such as those below. For these other primitives to be cryptographically secure, care has to be taken...
51 KB (6,569 words) - 08:42, 11 April 2025
"Modules In Process List - Cryptographic Module Validation Program | CSRC | CSRC". CSRC | NIST. Retrieved 2024-11-22. "Cryptographic Module Validation Program...
46 KB (1,565 words) - 06:44, 21 May 2025
In cryptography, the white-box model refers to an extreme attack scenario, in which an adversary has full unrestricted access to a cryptographic implementation...
20 KB (2,481 words) - 12:46, 21 October 2024
Block cipher mode of operation (category Cryptographic algorithms)
which combined confidentiality and data integrity into a single cryptographic primitive (an encryption algorithm). These combined modes are referred to...
52 KB (5,828 words) - 22:45, 25 April 2025
Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
63 KB (6,408 words) - 13:56, 6 May 2025
1991. L. Brown, Josef Pieprzyk and Jennifer Seberry, "LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications", in Advances in Cryptology...
6 KB (723 words) - 23:05, 27 March 2024
function is typically used. Such systems almost always use symmetric key cryptographic algorithms. The term PSK is used in Wi-Fi encryption such as Wired Equivalent...
3 KB (416 words) - 16:50, 23 January 2025
Multivariate cryptography is the generic term for asymmetric cryptographic primitives based on multivariate polynomials over a finite field F {\displaystyle...
8 KB (1,147 words) - 02:58, 17 April 2025
Muller, Phelix: Fast Encryption and Authentication in a Single Cryptographic Primitive (includes source code) T. Good, W. Chelton, M. Benaissa: Review...
8 KB (789 words) - 08:24, 28 November 2023
Benchmarking of Cryptographic Hashes – measurements of hash function speed on various platforms The ECRYPT Hash Function Website – A wiki for cryptographic hash...
16 KB (806 words) - 20:08, 6 August 2024
The Cryptographic Message Syntax (CMS) is the IETF's standard for cryptographically protected messages. It can be used by cryptographic schemes and protocols...
3 KB (322 words) - 07:10, 20 February 2025