• ciphertext from random data. Block cipher Hash function security summary Time/memory/data tradeoff attack Transport Layer Security Bullrun (decryption program)...
    15 KB (801 words) - 01:34, 22 August 2024
  • cryptography, security level is a measure of the strength that a cryptographic primitive — such as a cipher or hash function — achieves. Security level is...
    13 KB (1,332 words) - 16:46, 24 June 2025
  • function Collision attack Preimage attack Length extension attack Cipher security summary Tao Xie; Fanbao Liu; Dengguo Feng (25 March 2013). "Fast Collision...
    17 KB (1,063 words) - 06:46, 25 May 2025
  • Thumbnail for Block cipher mode of operation
    In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or...
    52 KB (5,830 words) - 02:15, 29 July 2025
  • Thumbnail for Symmetric-key algorithm
    use either stream ciphers or block ciphers. Stream ciphers encrypt the digits (typically bytes), or letters (in substitution ciphers) of a message one...
    15 KB (1,540 words) - 21:14, 19 June 2025
  • used to build block ciphers. Examples of such block ciphers are BEAR and LION. Cipher security summary Topics in cryptography XOR cipher Cusick, Thomas W...
    51 KB (6,569 words) - 07:54, 3 August 2025
  • Thumbnail for Cryptography
    cryptographic scheme (including ciphers) should remain secure even if the adversary fully understands the cipher algorithm itself. Security of the key used should...
    101 KB (11,138 words) - 15:26, 1 August 2025
  • MARS is a block cipher that was IBM's submission to the Advanced Encryption Standard process. MARS was selected as an AES finalist in August 1999, after...
    4 KB (359 words) - 03:17, 10 January 2024
  • In cryptography, Khufu and Khafre are two block ciphers designed by Ralph Merkle in 1989 while working at Xerox's Palo Alto Research Center. Along with...
    9 KB (839 words) - 12:48, 9 June 2024
  • The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project. The cipher has security levels...
    18 KB (1,805 words) - 21:49, 19 June 2025
  • Thumbnail for SM4 (cipher)
    Authentication and Privacy Infrastructure), and with Transport Layer Security. SM4 was a cipher proposed for the IEEE 802.11i standard, but it has so far been...
    9 KB (958 words) - 16:44, 2 February 2025
  • In cryptography, the Iraqi block cipher was a block cipher published in C source code form by anonymous FTP upload around July 1999, and widely distributed...
    4 KB (428 words) - 13:29, 10 July 2025
  • Thumbnail for Advanced Encryption Standard
    packages, and is the first (and only) publicly accessible cipher approved by the U.S. National Security Agency (NSA) for top secret information when used in...
    50 KB (5,679 words) - 04:23, 27 July 2025
  • Thumbnail for Tiny Encryption Algorithm
    In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable for its simplicity of description and implementation, typically a few lines...
    13 KB (1,189 words) - 16:09, 1 July 2025
  • KASUMI (redirect from Kasumi (cipher))
    instead of developing a new cipher, SAGE agreed with 3GPP technical specification group (TSG) for system aspects of 3G security (SA3) to base the development...
    17 KB (2,555 words) - 01:42, 17 October 2023
  • KHAZAD (redirect from Khazad (cipher))
    In cryptography, KHAZAD is a block cipher designed by Paulo S. L. M. Barreto together with Vincent Rijmen, one of the designers of the Advanced Encryption...
    3 KB (298 words) - 17:47, 22 April 2025
  • Thumbnail for Feistel cipher
    cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the...
    10 KB (1,316 words) - 19:41, 2 February 2025
  • Lucifer was the name given to several of the earliest civilian block ciphers, developed by Horst Feistel and his colleagues at IBM. Lucifer was a direct...
    6 KB (749 words) - 15:35, 22 November 2023
  • Thumbnail for RC6
    RC6 (redirect from RC6 cipher)
    In cryptography, RC6 (Rivest cipher 6) is a symmetric key block cipher derived from RC5. It was designed by Ron Rivest, Matt Robshaw, Ray Sidney, and...
    7 KB (712 words) - 20:00, 7 July 2025
  • In cryptography, Skipjack is a block cipher—an algorithm for encryption—developed by the U.S. National Security Agency (NSA). Initially classified, it...
    12 KB (1,134 words) - 16:36, 18 June 2025
  • SHARK (redirect from Shark (cipher))
    In cryptography, SHARK is a block cipher identified as one of the predecessors of Rijndael (the Advanced Encryption Standard). SHARK has a 64-bit block...
    3 KB (224 words) - 16:45, 4 November 2024
  • Thumbnail for ICE (cipher)
    cryptography, ICE (Information Concealment Engine) is a symmetric-key block cipher published by Matthew Kwan in 1997. The algorithm is similar in structure...
    4 KB (483 words) - 21:37, 21 March 2024
  • SAVILLE (redirect from Saville (cipher))
    Mode (also known as Key-Auto-KEY or KAK) and Autoclave Mode (also known as Cipher-Text Auto Key or CTAK). On the AIM microchip, it runs at 4% of the clock...
    3 KB (247 words) - 05:21, 9 January 2024
  • Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in many cipher suites and encryption products. Blowfish provides...
    18 KB (2,000 words) - 15:11, 16 April 2025
  • Thumbnail for Speck (cipher)
    Speck is a family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013. Speck has been optimized for performance...
    23 KB (2,411 words) - 07:38, 25 May 2025
  • Thumbnail for CAST-128
    CAST-128 (category Block ciphers)
    (alternatively CAST5) is a symmetric-key block cipher used in a number of products, notably as the default cipher in some versions of GPG and PGP. It has also...
    4 KB (378 words) - 19:55, 13 April 2024
  • Secure and Fast Encryption Routine (category Block ciphers)
    (Secure and Fast Encryption Routine) is the name of a family of block ciphers designed primarily by James Massey (one of the designers of IDEA) on behalf...
    7 KB (842 words) - 16:23, 27 May 2025
  • In cryptography, Square (sometimes written SQUARE) is a block cipher invented by Joan Daemen and Vincent Rijmen. The design, published in 1997, is a forerunner...
    2 KB (125 words) - 03:34, 28 April 2024
  • The Advanced Encryption Standard (AES), the symmetric block cipher ratified as a standard by National Institute of Standards and Technology of the United...
    10 KB (1,040 words) - 10:14, 4 January 2025
  • Thumbnail for Substitution–permutation network
    Substitution–permutation network (category Block ciphers)
    network (SPN), is a series of linked mathematical operations used in block cipher algorithms such as AES (Rijndael), 3-Way, Kalyna, Kuznyechik, PRESENT, SAFER...
    7 KB (958 words) - 10:15, 4 January 2025