Block cipher/Related Articles
Jump to navigation
Jump to search
- See also changes related to Block cipher, or pages that link to Block cipher or to this page or whose text contains "Block cipher".
Parent topics
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
Subtopics
- Advanced Encryption Standard [r]: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
- Avalanche (cryptography) [r]: A desirable property for operations in a cipher or hash, where a small change (even a single bit) quickly builds up to creating large effects. [e]
- Data Encryption Standard [r]: A block cipher specification issued by the U.S. government in 1976, intended for sensitive but unclassified data. It is now obsolescent, succeeded by the Advanced Encryption Standard, but still used in commercial systems. [e]
- Round (cryptography) [r]: A relatively simple operation which, when repeated many times, can be used to build an iterated cipher or hash. [e]
- S-box (cryptography) [r]: A substitution box or lookup table. [e]
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Hash (cryptography [r]: Add brief definition or description
- Linearity (cryptography) [r]: Add brief definition or description. A general discussion of nonlinearity would be part of this.
- Key (cryptography) [r]: Characteristics and generation of data which, in combination with a cryptographic algorithm, introduces or removes the concealment applied to plaintext or taken to ciphertext; key management is arelated but separate discipline of secure distribution of keys and entering them into cryptosystems [e]
- Key management (cryptography [r]: Add brief definition or description
- Stream cipher [r]: A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step. [e]