Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption...
15 KB (1,540 words) - 19:12, 22 April 2025
of security inherent in the key length). Most symmetric-key algorithms are designed to have security equal to their key length. However, after design...
29 KB (3,222 words) - 03:31, 9 April 2025
processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties...
13 KB (1,506 words) - 07:19, 22 April 2025
intensive than symmetric ones, it is common to use a public/private asymmetric key-exchange algorithm to encrypt and exchange a symmetric key, which is then...
40 KB (4,512 words) - 17:51, 26 March 2025
Advanced Encryption Standard (redirect from Rijndael encryption algorithm)
(DES), which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting...
50 KB (5,675 words) - 11:39, 17 March 2025
wrapping key Symmetric key wrapping keys are used to encrypt other keys using symmetric key algorithms. Key wrapping keys are also known as key encrypting...
10 KB (1,385 words) - 07:18, 12 October 2023
Kerberos (protocol) (category Symmetric-key algorithms)
described in RFC 3244. In case of symmetric cryptography adoption (Kerberos can work using symmetric or asymmetric (public-key) cryptography), since all authentications...
27 KB (3,023 words) - 18:22, 15 April 2025
Ratchet Algorithm's design is based on the DH ratchet that was introduced by Off-the-Record Messaging (OTR) and combines it with a symmetric-key ratchet...
15 KB (1,391 words) - 09:37, 22 April 2025
Cipher (section Key size and vulnerability)
same key is used for both encryption and decryption (symmetric key algorithms), or if a different key is used for each (asymmetric key algorithms). If...
18 KB (2,166 words) - 09:30, 26 April 2025
key. In real-world situations, it is often also used with encryption using symmetric key algorithms like the Advanced Encryption Standard algorithm....
103 KB (11,879 words) - 02:19, 29 April 2025
key exchange is a mathematical method of securely generating a symmetric cryptographic key over a public channel and was one of the first public-key protocols...
48 KB (5,437 words) - 16:48, 22 April 2025
Data Encryption Standard (redirect from Data Encryption Algorithm)
Standard (DES /ˌdiːˌiːˈɛs, dɛz/) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure...
60 KB (6,714 words) - 15:08, 11 April 2025
(AES). Ronald L. Rivest, US, MIT, inventor of RC cipher series and MD algorithm series. Bruce Schneier, US, inventor of Blowfish and co-inventor of Twofish...
21 KB (2,423 words) - 00:41, 17 April 2025
Private-key cryptography (symmetric key algorithm): one shared key is used for encryption and decryption Public-key cryptography (asymmetric key algorithm):...
9 KB (1,139 words) - 21:45, 22 March 2025
Pretty Good Privacy (redirect from PGP key pair)
symmetric-key encryption and public-key encryption. The message is encrypted using a symmetric encryption algorithm, which requires a symmetric key generated...
56 KB (6,196 words) - 05:15, 7 April 2025
types of keys, with some systems using more than one. These may include symmetric keys or asymmetric keys. In a symmetric key algorithm the keys involved...
34 KB (3,512 words) - 09:26, 24 March 2025
Message authentication code (redirect from Message Authentication Algorithm)
generation algorithm selects a key from the key space uniformly at random. A MAC generation algorithm efficiently returns a tag given the key and the message...
16 KB (1,918 words) - 17:55, 22 January 2025
generate keys is called a key generator or keygen. Modern cryptographic systems include symmetric-key algorithms (such as DES and AES) and public-key algorithms...
5 KB (688 words) - 03:18, 21 December 2024
International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by...
12 KB (1,499 words) - 19:07, 14 April 2024
In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable for its simplicity of description and implementation, typically a few lines...
13 KB (1,189 words) - 03:44, 16 March 2025
WEP-protected network shares the same WEP key. Encryption uses the RC4 algorithm, a stream cipher. It is essential that the same key never be used twice with a stream...
5 KB (688 words) - 10:33, 3 January 2025
cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic-curve cryptography...
19 KB (2,833 words) - 20:45, 21 March 2025
ElGamal encryption (redirect from ElGamal encryption algorithm)
encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie–Hellman key exchange. It was described by...
10 KB (1,473 words) - 11:12, 31 March 2025
cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a master key, a password...
13 KB (1,640 words) - 18:48, 30 April 2025
Blowfish (cipher) (redirect from Blowfish encryption algorithm)
Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in many cipher suites and encryption products. Blowfish provides...
18 KB (2,000 words) - 15:11, 16 April 2025
the cipher key called a round key. A key schedule is an algorithm that calculates all the round keys from the key. Some ciphers have simple key schedules...
3 KB (402 words) - 17:31, 15 March 2023
The Cayley–Purser algorithm was a public-key cryptography algorithm published in early 1999 by 16-year-old Irishwoman Sarah Flannery, based on an unpublished...
7 KB (1,139 words) - 08:53, 19 October 2022
conversations. OTR uses a combination of AES symmetric-key algorithm with 128 bits key length, the Diffie–Hellman key exchange with 1536 bits group size, and...
21 KB (1,884 words) - 13:33, 7 March 2025
confidentiality (encryption). Typically, a cryptosystem consists of three algorithms: one for key generation, one for encryption, and one for decryption. The term...
4 KB (497 words) - 22:26, 16 January 2025
Cryptography (section Symmetric-key cryptography)
types of cryptosystems: symmetric and asymmetric. In symmetric systems, the only ones known until the 1970s, the same secret key encrypts and decrypts a...
99 KB (10,975 words) - 20:28, 3 April 2025