Authenticated encryption (AE) is any encryption scheme which simultaneously assures the data confidentiality (also known as privacy: the encrypted message...
19 KB (2,087 words) - 13:23, 24 July 2025
Block cipher mode of operation (redirect from Encryption mode)
single cryptographic primitive (an encryption algorithm). These combined modes are referred to as authenticated encryption, AE or "authenc". Examples of AE...
52 KB (5,830 words) - 02:15, 29 July 2025
CCMP (cryptography) (redirect from CCMP (Encryption))
Chaining Message Authentication Code Protocol (Counter Mode CBC-MAC Protocol) or CCM mode Protocol (CCMP) is an authenticated encryption protocol designed...
5 KB (594 words) - 05:39, 11 December 2024
a message authentication code (MAC) or a digital signature usually done by a hashing algorithm or a PGP signature. Authenticated encryption algorithms...
34 KB (3,645 words) - 19:23, 28 July 2025
CAESAR Competition (redirect from Competition for Authenticated Encryption: Security, Applicability, and Robustness)
The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) is a competition organized by a group of international cryptologic...
3 KB (217 words) - 10:20, 27 March 2025
achieved by using message authentication codes (MACs), authenticated encryption (AE), or digital signatures. The message authentication code, also known as...
6 KB (609 words) - 13:36, 10 July 2025
m} (by symmetric encryption of m {\displaystyle m} ) encrypted with the key k {\displaystyle k} (using an authenticated encryption scheme) as follows:...
6 KB (966 words) - 17:32, 28 November 2024
operation Encryption modes N/A Authenticated encryption modes N/A Message authentication codes PC-MAC-AES Authenticated encryption N/A Entity authentication N/A...
8 KB (974 words) - 00:22, 19 August 2023
or more rarely Basic access authentication. These weak cleartext protocols used together with HTTPS network encryption resolve many of the threats that...
25 KB (2,879 words) - 04:06, 25 May 2025
ChaCha20-Poly1305 (category Authenticated-encryption schemes)
an authenticated encryption with associated data (AEAD) algorithm, that combines the ChaCha20 stream cipher with the Poly1305 message authentication code...
13 KB (1,509 words) - 15:01, 13 June 2025
Transport Layer Security (redirect from Transport layer encryption)
support for authenticated encryption ciphers, used mainly for Galois/Counter Mode (GCM) and CCM mode of Advanced Encryption Standard (AES) encryption. TLS Extensions...
179 KB (17,586 words) - 04:56, 29 July 2025
Checksum CMAC HMAC (hash-based message authentication code) MAA MMH-Badger MAC Poly1305 Authenticated encryption UMAC VMAC SipHash KMAC IEEE Standard for...
16 KB (1,918 words) - 14:30, 11 July 2025
Public-key cryptography (redirect from Asymmetric key encryption algorithm)
password-authenticated key agreement techniques Paillier cryptosystem RSA encryption algorithm (PKCS#1) Cramer–Shoup cryptosystem YAK authenticated key agreement...
40 KB (4,551 words) - 23:23, 28 July 2025
design authenticated encryption schemes NIST hash function competition Post-Quantum Cryptography Standardization "cryptology:: The Data Encryption Standard...
10 KB (1,040 words) - 10:14, 4 January 2025
In cryptography, SAFER (Secure and Fast Encryption Routine) is the name of a family of block ciphers designed primarily by James Massey (one of the designers...
7 KB (842 words) - 16:23, 27 May 2025
Symmetric-key algorithm (redirect from Symmetric encryption)
algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical...
15 KB (1,540 words) - 21:14, 19 June 2025
Galois/Counter Mode (redirect from Galois Message Authentication Code)
authenticity (integrity) and confidentiality and belongs to the class of authenticated encryption with associated data (AEAD) methods. This means that as input it...
23 KB (3,051 words) - 16:00, 1 July 2025
CCM mode (category Authenticated-encryption schemes)
message authentication code; counter with CBC-MAC) is a mode of operation for cryptographic block ciphers. It is an authenticated encryption algorithm...
8 KB (934 words) - 04:53, 27 July 2025
wide-block. While the authenticated encryption scheme IAPM provides encryption as well as an authentication tag, the encryption component of the IAPM...
30 KB (3,772 words) - 11:25, 5 December 2024
hashes, message authentication codes, mask generation functions, stream ciphers, pseudo-random number generators, and authenticated encryption. A sponge function...
7 KB (846 words) - 09:04, 19 April 2025
cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block...
12 KB (1,499 words) - 19:07, 14 April 2024
IEEE P1363 (redirect from Integer Factorization Encryption Scheme)
version) NTRU encryption scheme This document includes a number of password-authenticated key agreement schemes, and a password-authenticated key retrieval...
6 KB (629 words) - 03:54, 31 July 2024
for encryption as well as authentication, though newer designs exist that combine both security solutions in so-called authenticated encryption modes...
14 KB (1,797 words) - 08:53, 7 September 2024
HMAC (redirect from Keyed-Hashing Message Authentication)
cryptographic hash function. m {\displaystyle m} is the message to be authenticated. K {\displaystyle K} is the secret key. K ′ {\displaystyle K'} is a...
18 KB (2,327 words) - 01:15, 2 August 2025
In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable for its simplicity of description and implementation, typically a few lines...
13 KB (1,189 words) - 16:09, 1 July 2025
not (yet) standardized by NIST, including a stream cipher, an authenticated encryption system, a "tree" hashing scheme for faster hashing on certain architectures...
52 KB (5,727 words) - 13:30, 29 July 2025
Cryptographic protocol (redirect from Encryption protocol)
or establishment Entity authentication, perhaps using a authentication protocol Symmetric encryption and message authentication key material construction...
9 KB (1,021 words) - 21:24, 23 July 2025
ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks. There are two main...
101 KB (11,138 words) - 15:26, 1 August 2025
PBKDF2 (category Password authentication)
PBKDF2 implementations Raeburn, Kenneth (2005). "Advanced Encryption Standard (AES) Encryption for Kerberos 5". tools.ietf.org. doi:10.17487/RFC3962. RFC 3962...
13 KB (1,337 words) - 12:18, 2 June 2025
RSA cryptosystem (redirect from RSA encryption)
is used in digital signature such as RSASSA-PSS or RSA-FDH, public-key encryption of very short messages (almost always a single-use symmetric key in a...
68 KB (8,447 words) - 02:37, 31 July 2025