• Authenticated encryption (AE) is any encryption scheme which simultaneously assures the data confidentiality (also known as privacy: the encrypted message...
    19 KB (2,087 words) - 13:23, 24 July 2025
  • Thumbnail for Block cipher mode of operation
    single cryptographic primitive (an encryption algorithm). These combined modes are referred to as authenticated encryption, AE or "authenc". Examples of AE...
    52 KB (5,830 words) - 02:15, 29 July 2025
  • Chaining Message Authentication Code Protocol (Counter Mode CBC-MAC Protocol) or CCM mode Protocol (CCMP) is an authenticated encryption protocol designed...
    5 KB (594 words) - 05:39, 11 December 2024
  • Thumbnail for Encryption
    a message authentication code (MAC) or a digital signature usually done by a hashing algorithm or a PGP signature. Authenticated encryption algorithms...
    34 KB (3,645 words) - 19:23, 28 July 2025
  • The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) is a competition organized by a group of international cryptologic...
    3 KB (217 words) - 10:20, 27 March 2025
  • achieved by using message authentication codes (MACs), authenticated encryption (AE), or digital signatures. The message authentication code, also known as...
    6 KB (609 words) - 13:36, 10 July 2025
  • m} (by symmetric encryption of m {\displaystyle m} ) encrypted with the key k {\displaystyle k} (using an authenticated encryption scheme) as follows:...
    6 KB (966 words) - 17:32, 28 November 2024
  • operation Encryption modes N/A Authenticated encryption modes N/A Message authentication codes PC-MAC-AES Authenticated encryption N/A Entity authentication N/A...
    8 KB (974 words) - 00:22, 19 August 2023
  • Thumbnail for Digest access authentication
    or more rarely Basic access authentication. These weak cleartext protocols used together with HTTPS network encryption resolve many of the threats that...
    25 KB (2,879 words) - 04:06, 25 May 2025
  • ChaCha20-Poly1305 (category Authenticated-encryption schemes)
    an authenticated encryption with associated data (AEAD) algorithm, that combines the ChaCha20 stream cipher with the Poly1305 message authentication code...
    13 KB (1,509 words) - 15:01, 13 June 2025
  • support for authenticated encryption ciphers, used mainly for Galois/Counter Mode (GCM) and CCM mode of Advanced Encryption Standard (AES) encryption. TLS Extensions...
    179 KB (17,586 words) - 04:56, 29 July 2025
  • Checksum CMAC HMAC (hash-based message authentication code) MAA MMH-Badger MAC Poly1305 Authenticated encryption UMAC VMAC SipHash KMAC IEEE Standard for...
    16 KB (1,918 words) - 14:30, 11 July 2025
  • Thumbnail for Public-key cryptography
    password-authenticated key agreement techniques Paillier cryptosystem RSA encryption algorithm (PKCS#1) Cramer–Shoup cryptosystem YAK authenticated key agreement...
    40 KB (4,551 words) - 23:23, 28 July 2025
  • design authenticated encryption schemes NIST hash function competition Post-Quantum Cryptography Standardization "cryptology:: The Data Encryption Standard...
    10 KB (1,040 words) - 10:14, 4 January 2025
  • In cryptography, SAFER (Secure and Fast Encryption Routine) is the name of a family of block ciphers designed primarily by James Massey (one of the designers...
    7 KB (842 words) - 16:23, 27 May 2025
  • Thumbnail for Symmetric-key algorithm
    algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical...
    15 KB (1,540 words) - 21:14, 19 June 2025
  • authenticity (integrity) and confidentiality and belongs to the class of authenticated encryption with associated data (AEAD) methods. This means that as input it...
    23 KB (3,051 words) - 16:00, 1 July 2025
  • CCM mode (category Authenticated-encryption schemes)
    message authentication code; counter with CBC-MAC) is a mode of operation for cryptographic block ciphers. It is an authenticated encryption algorithm...
    8 KB (934 words) - 04:53, 27 July 2025
  • wide-block. While the authenticated encryption scheme IAPM provides encryption as well as an authentication tag, the encryption component of the IAPM...
    30 KB (3,772 words) - 11:25, 5 December 2024
  • Thumbnail for Sponge function
    hashes, message authentication codes, mask generation functions, stream ciphers, pseudo-random number generators, and authenticated encryption. A sponge function...
    7 KB (846 words) - 09:04, 19 April 2025
  • Thumbnail for International Data Encryption Algorithm
    cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block...
    12 KB (1,499 words) - 19:07, 14 April 2024
  • version) NTRU encryption scheme This document includes a number of password-authenticated key agreement schemes, and a password-authenticated key retrieval...
    6 KB (629 words) - 03:54, 31 July 2024
  • for encryption as well as authentication, though newer designs exist that combine both security solutions in so-called authenticated encryption modes...
    14 KB (1,797 words) - 08:53, 7 September 2024
  • Thumbnail for HMAC
    cryptographic hash function. m {\displaystyle m} is the message to be authenticated. K {\displaystyle K} is the secret key. K ′ {\displaystyle K'} is a...
    18 KB (2,327 words) - 01:15, 2 August 2025
  • Thumbnail for Tiny Encryption Algorithm
    In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable for its simplicity of description and implementation, typically a few lines...
    13 KB (1,189 words) - 16:09, 1 July 2025
  • not (yet) standardized by NIST, including a stream cipher, an authenticated encryption system, a "tree" hashing scheme for faster hashing on certain architectures...
    52 KB (5,727 words) - 13:30, 29 July 2025
  • or establishment Entity authentication, perhaps using a authentication protocol Symmetric encryption and message authentication key material construction...
    9 KB (1,021 words) - 21:24, 23 July 2025
  • Thumbnail for Cryptography
    ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks. There are two main...
    101 KB (11,138 words) - 15:26, 1 August 2025
  • PBKDF2 (category Password authentication)
    PBKDF2 implementations Raeburn, Kenneth (2005). "Advanced Encryption Standard (AES) Encryption for Kerberos 5". tools.ietf.org. doi:10.17487/RFC3962. RFC 3962...
    13 KB (1,337 words) - 12:18, 2 June 2025
  • is used in digital signature such as RSASSA-PSS or RSA-FDH, public-key encryption of very short messages (almost always a single-use symmetric key in a...
    68 KB (8,447 words) - 02:37, 31 July 2025