• Thumbnail for Symmetric-key algorithm
    Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption...
    15 KB (1,540 words) - 19:12, 22 April 2025
  • of security inherent in the key length). Most symmetric-key algorithms are designed to have security equal to their key length. However, after design...
    29 KB (3,222 words) - 03:31, 9 April 2025
  • processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties...
    13 KB (1,506 words) - 07:19, 22 April 2025
  • Thumbnail for Public-key cryptography
    intensive than symmetric ones, it is common to use a public/private asymmetric key-exchange algorithm to encrypt and exchange a symmetric key, which is then...
    40 KB (4,512 words) - 17:51, 26 March 2025
  • Thumbnail for Advanced Encryption Standard
    (DES), which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting...
    50 KB (5,675 words) - 11:39, 17 March 2025
  • wrapping key Symmetric key wrapping keys are used to encrypt other keys using symmetric key algorithms. Key wrapping keys are also known as key encrypting...
    10 KB (1,385 words) - 07:18, 12 October 2023
  • Kerberos (protocol) (category Symmetric-key algorithms)
    described in RFC 3244. In case of symmetric cryptography adoption (Kerberos can work using symmetric or asymmetric (public-key) cryptography), since all authentications...
    27 KB (3,023 words) - 18:22, 15 April 2025
  • Thumbnail for Double Ratchet Algorithm
    Ratchet Algorithm's design is based on the DH ratchet that was introduced by Off-the-Record Messaging (OTR) and combines it with a symmetric-key ratchet...
    15 KB (1,391 words) - 09:37, 22 April 2025
  • Thumbnail for Cipher
    same key is used for both encryption and decryption (symmetric key algorithms), or if a different key is used for each (asymmetric key algorithms). If...
    18 KB (2,166 words) - 09:30, 26 April 2025
  • key. In real-world situations, it is often also used with encryption using symmetric key algorithms like the Advanced Encryption Standard algorithm....
    103 KB (11,879 words) - 02:19, 29 April 2025
  • Thumbnail for Diffie–Hellman key exchange
    key exchange is a mathematical method of securely generating a symmetric cryptographic key over a public channel and was one of the first public-key protocols...
    48 KB (5,437 words) - 16:48, 22 April 2025
  • Thumbnail for Data Encryption Standard
    Standard (DES /ˌdiːˌiːˈɛs, dɛz/) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure...
    60 KB (6,714 words) - 15:08, 11 April 2025
  • (AES). Ronald L. Rivest, US, MIT, inventor of RC cipher series and MD algorithm series. Bruce Schneier, US, inventor of Blowfish and co-inventor of Twofish...
    21 KB (2,423 words) - 00:41, 17 April 2025
  • Thumbnail for Ciphertext
    Private-key cryptography (symmetric key algorithm): one shared key is used for encryption and decryption Public-key cryptography (asymmetric key algorithm):...
    9 KB (1,139 words) - 21:45, 22 March 2025
  • symmetric-key encryption and public-key encryption. The message is encrypted using a symmetric encryption algorithm, which requires a symmetric key generated...
    56 KB (6,196 words) - 05:15, 7 April 2025
  • types of keys, with some systems using more than one. These may include symmetric keys or asymmetric keys. In a symmetric key algorithm the keys involved...
    34 KB (3,512 words) - 09:26, 24 March 2025
  • generation algorithm selects a key from the key space uniformly at random. A MAC generation algorithm efficiently returns a tag given the key and the message...
    16 KB (1,918 words) - 17:55, 22 January 2025
  • generate keys is called a key generator or keygen. Modern cryptographic systems include symmetric-key algorithms (such as DES and AES) and public-key algorithms...
    5 KB (688 words) - 03:18, 21 December 2024
  • Thumbnail for International Data Encryption Algorithm
    International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by...
    12 KB (1,499 words) - 19:07, 14 April 2024
  • Thumbnail for Tiny Encryption Algorithm
    In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable for its simplicity of description and implementation, typically a few lines...
    13 KB (1,189 words) - 03:44, 16 March 2025
  • WEP-protected network shares the same WEP key. Encryption uses the RC4 algorithm, a stream cipher. It is essential that the same key never be used twice with a stream...
    5 KB (688 words) - 10:33, 3 January 2025
  • cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic-curve cryptography...
    19 KB (2,833 words) - 20:45, 21 March 2025
  • encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie–Hellman key exchange. It was described by...
    10 KB (1,473 words) - 11:12, 31 March 2025
  • Thumbnail for Key derivation function
    cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a master key, a password...
    13 KB (1,640 words) - 18:48, 30 April 2025
  • Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in many cipher suites and encryption products. Blowfish provides...
    18 KB (2,000 words) - 15:11, 16 April 2025
  • Thumbnail for Key schedule
    the cipher key called a round key. A key schedule is an algorithm that calculates all the round keys from the key. Some ciphers have simple key schedules...
    3 KB (402 words) - 17:31, 15 March 2023
  • The Cayley–Purser algorithm was a public-key cryptography algorithm published in early 1999 by 16-year-old Irishwoman Sarah Flannery, based on an unpublished...
    7 KB (1,139 words) - 08:53, 19 October 2022
  • conversations. OTR uses a combination of AES symmetric-key algorithm with 128 bits key length, the Diffie–Hellman key exchange with 1536 bits group size, and...
    21 KB (1,884 words) - 13:33, 7 March 2025
  • confidentiality (encryption). Typically, a cryptosystem consists of three algorithms: one for key generation, one for encryption, and one for decryption. The term...
    4 KB (497 words) - 22:26, 16 January 2025
  • Thumbnail for Cryptography
    types of cryptosystems: symmetric and asymmetric. In symmetric systems, the only ones known until the 1970s, the same secret key encrypts and decrypts a...
    99 KB (10,975 words) - 20:28, 3 April 2025