In theoretical computer science and cryptography, a trapdoor function is a function that is easy to compute in one direction, yet difficult to compute...
9 KB (1,316 words) - 00:34, 25 June 2024
mills, however, its list of uses has grown over time. The trapdoor has played a pivotal function in the operation of the gallows, cargo ships, trains, booby...
6 KB (592 words) - 18:25, 18 February 2025
existence of one-way functions. A trapdoor one-way function or trapdoor permutation is a special kind of one-way function. Such a function is hard to invert...
14 KB (1,956 words) - 16:22, 30 March 2025
based on a trapdoor function whose security, like that of RSA, is related to the difficulty of integer factorization. The Rabin trapdoor function has the...
14 KB (2,077 words) - 14:01, 26 March 2025
variant of the learning with errors lattice problem as its basic trapdoor function. It won the NIST competition for the first post-quantum cryptography...
15 KB (1,472 words) - 21:44, 9 May 2025
In cryptography, a pseudorandom function family, abbreviated PRF, is a collection of efficiently-computable functions which emulate a random oracle in...
8 KB (1,021 words) - 06:46, 31 March 2025
collision resistant" hash functions; it was employed to construct general digital signature schemes without trapdoor functions, and also within chosen-ciphertext...
2 KB (324 words) - 14:32, 6 February 2024
plaintext prior to asymmetric encryption. When combined with any secure trapdoor one-way permutation f {\displaystyle f} , this processing is proved in...
9 KB (1,460 words) - 01:31, 22 December 2024
In cryptography, a sponge function or sponge construction is any of a class of algorithms with finite internal state that take an input bit stream of any...
7 KB (846 words) - 09:04, 19 April 2025
or 1 depending on whether pi divides cs mod p. The security of the trapdoor function relies on the difficulty of the following multiplicative knapsack...
4 KB (565 words) - 17:03, 1 June 2024
Key management Key size Public-key cryptography Rabin cryptosystem Trapdoor function Namely, the values of m which are equal to −1, 0, or 1 modulo p while...
60 KB (7,787 words) - 23:29, 17 May 2025
Preimage attack (redirect from Hash function preimage)
attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash function should resist attacks on its...
7 KB (895 words) - 15:44, 13 April 2024
schemes. The first such scheme which is not built on trapdoor functions but rather on a family of function with a much weaker required property of one-way...
45 KB (5,315 words) - 16:52, 11 April 2025
secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network Mathematics Cryptographic hash function Block...
4 KB (391 words) - 16:20, 12 April 2025
Feistel cipher (redirect from F-function)
similar operations, and both consist of iteratively running a function called a "round function" a fixed number of times. Many modern symmetric block ciphers...
10 KB (1,316 words) - 19:41, 2 February 2025
a single key pair for one user. Choose an approved cryptographic hash function H {\displaystyle H} with output length | H | {\displaystyle |H|} bits....
16 KB (2,229 words) - 16:39, 21 April 2025
{\displaystyle e={\textrm {HASH}}(m)} . (Here HASH is a cryptographic hash function, such as SHA-2, with the output converted to an integer.) Let z {\displaystyle...
19 KB (2,833 words) - 08:53, 8 May 2025
m {\displaystyle m} of G {\displaystyle G} using a reversible mapping function. Choose an integer y {\displaystyle y} randomly from { 1 , … , q − 1 }...
10 KB (1,473 words) - 11:12, 31 March 2025
Cryptography (section Cryptographic hash functions)
cryptographic hash function is computed, and only the resulting hash is digitally signed. Cryptographic hash functions are functions that take a variable-length...
99 KB (10,975 words) - 11:30, 14 May 2025
secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network Mathematics Cryptographic hash function Block...
7 KB (920 words) - 14:16, 11 May 2025
{\displaystyle \mu =(L(g^{\lambda }{\bmod {n}}^{2}))^{-1}{\bmod {n}}} , where function L {\displaystyle L} is defined as L ( x ) = x − 1 n {\displaystyle L(x)={\frac...
13 KB (1,929 words) - 21:01, 7 December 2023
cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend against...
13 KB (1,533 words) - 12:18, 19 January 2025
Skein is a cryptographic hash function and one of five finalists in the NIST hash function competition. Entered as a candidate to become the SHA-3 standard...
9 KB (822 words) - 12:52, 13 April 2025
secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network Mathematics Cryptographic hash function Block...
7 KB (806 words) - 02:45, 2 February 2025
Message authentication code (redirect from Keyed hash function)
MAC functions are similar to cryptographic hash functions, they possess different security requirements. To be considered secure, a MAC function must...
16 KB (1,918 words) - 17:55, 22 January 2025
g, ga mod p, and gb mod p. Such a function that is easy to compute but hard to invert is called a one-way function. Once Alice and Bob compute the shared...
48 KB (5,437 words) - 16:48, 22 April 2025
the same hash value. The hash value in this case is derived from a hash function which takes a data input and returns a fixed length of bits. Although hash...
9 KB (1,142 words) - 10:46, 9 November 2024
type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. As with any MAC, it may be used to simultaneously...
18 KB (2,316 words) - 18:51, 16 April 2025
Security level (redirect from Broken hash function)
the strength that a cryptographic primitive — such as a cipher or hash function — achieves. Security level is usually expressed as a number of "bits of...
13 KB (1,332 words) - 01:56, 12 March 2025
non-malleability is achieved through the use of a universal one-way hash function and additional computations, resulting in a ciphertext which is twice as...
7 KB (1,125 words) - 17:33, 23 July 2024