46 relations: Adi Shamir, Advanced Encryption Standard process, Alex Biryukov, ARIA (cipher), Backdoor (computing), Bart Preneel, BLAKE (hash function), Blowfish (cipher), Bruce Schneier, Cipher, Cryptographic hash function, Cryptography, Data Encryption Standard, DFC (cipher), Differential cryptanalysis, Dual EC DRBG, E (mathematical constant), Edward Snowden, Eli Biham, Entropy (information theory), Fractional part, Golden ratio, Internet Key Exchange, KASUMI, Katholieke Universiteit Leuven, Key schedule, Magic (illusion), MD5, National Institute of Standards and Technology, National Security Agency, NewDES, Normal number, Portable Document Format, Positional notation, PostScript, Prime number, RC5, Ron Rivest, S-box, SHA-1, SHA-2, SHA-3, Sine, Square root, United States Declaration of Independence, Wired (website).

## Adi Shamir

Adi Shamir (עדי שמיר; born July 6, 1952) is an Israeli cryptographer.

New!!: Nothing up my sleeve number and Adi Shamir ·

## Advanced Encryption Standard process

The Advanced Encryption Standard (AES), the symmetric block cipher ratified as a standard by National Institute of Standards and Technology of the United States (NIST), was chosen using a process lasting from 1997 to 2000 that was markedly more open and transparent than its predecessor, the aging Data Encryption Standard (DES).

New!!: Nothing up my sleeve number and Advanced Encryption Standard process ·

## Alex Biryukov

Alex Biryukov is a cryptographer, currently an associate professor at the University of Luxembourg.

New!!: Nothing up my sleeve number and Alex Biryukov ·

## ARIA (cipher)

In cryptography, ARIA is a block cipher designed in 2003 by a large group of South Korean researchers.

New!!: Nothing up my sleeve number and ARIA (cipher) ·

## Backdoor (computing)

A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing unauthorized remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.

New!!: Nothing up my sleeve number and Backdoor (computing) ·

## Bart Preneel

Bart Preneel (born October 15, 1963) is a Belgian cryptographer and cryptanalyst.

New!!: Nothing up my sleeve number and Bart Preneel ·

## BLAKE (hash function)

BLAKE and BLAKE2 are cryptographic hash functions.

New!!: Nothing up my sleeve number and BLAKE (hash function) ·

## Blowfish (cipher)

Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products.

New!!: Nothing up my sleeve number and Blowfish (cipher) ·

## Bruce Schneier

Bruce Schneier (born January 15, 1963) is an American cryptographer, computer security and privacy specialist, and writer.

New!!: Nothing up my sleeve number and Bruce Schneier ·

## Cipher

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

New!!: Nothing up my sleeve number and Cipher ·

## Cryptographic hash function

A cryptographic hash function is a hash function which is considered practically impossible to invert, that is, to recreate the input data from its hash value alone.

New!!: Nothing up my sleeve number and Cryptographic hash function ·

## Cryptography

Cryptography or cryptology; from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).

New!!: Nothing up my sleeve number and Cryptography ·

## Data Encryption Standard

The Data Encryption Standard (DES, or) was once a predominant symmetric-key algorithm for the encryption of electronic data.

New!!: Nothing up my sleeve number and Data Encryption Standard ·

## DFC (cipher)

In cryptography, DFC (Decorrelated Fast Cipher) is a symmetric block cipher which was created in 1998 by a group of researchers from École Normale Supérieure, CNRS, and France Télécom (including Jacques Stern and Serge Vaudenay) and submitted to the AES competition.

New!!: Nothing up my sleeve number and DFC (cipher) ·

## Differential cryptanalysis

Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions.

New!!: Nothing up my sleeve number and Differential cryptanalysis ·

## Dual EC DRBG

Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG) is an algorithm from the branch of cryptography known as elliptic curve cryptography that implements a cryptographically secure pseudorandom number generator (CSPRNG) capable of generating a random bit stream.

New!!: Nothing up my sleeve number and Dual EC DRBG ·

## E (mathematical constant)

The number is an important mathematical constant that is the base of the natural logarithm.

New!!: Nothing up my sleeve number and E (mathematical constant) ·

## Edward Snowden

Edward Joseph "Ed" Snowden (born June 21, 1983) is an American privacy activist, computer professional, former CIA employee, and former government contractor who leaked classified information from the U.S. National Security Agency (NSA) in 2013.

New!!: Nothing up my sleeve number and Edward Snowden ·

## Eli Biham

Eli Biham (אלי ביהם) is an Israeli cryptographer and cryptanalyst, currently a professor at the Technion Israeli Institute of Technology Computer Science department.

New!!: Nothing up my sleeve number and Eli Biham ·

## Entropy (information theory)

In information theory, entropy (more specifically, Shannon entropy) is the expected value (average) of the information contained in each message received.

New!!: Nothing up my sleeve number and Entropy (information theory) ·

## Fractional part

The fractional part of a non‐negative real number x is the excess beyond that number integer part: \operatorname (x).

New!!: Nothing up my sleeve number and Fractional part ·

## Golden ratio

In mathematics, two quantities are in the golden ratio if their ratio is the same as the ratio of their sum to the larger of the two quantities.

New!!: Nothing up my sleeve number and Golden ratio ·

## Internet Key Exchange

In computing, Internet Key Exchange (IKE or IKEv2) is the protocol used to set up a security association (SA) in the IPsec protocol suite.

New!!: Nothing up my sleeve number and Internet Key Exchange ·

## KASUMI

KASUMI is a block cipher used in UMTS, GSM, and GPRS mobile communications systems.

New!!: Nothing up my sleeve number and KASUMI ·

## Katholieke Universiteit Leuven

The Katholieke Universiteit Leuven (Dutch for Catholic University of Leuven, but usually not translated into English), also known as KU Leuven or University of Leuven, is a Dutch-speaking university in Leuven, Flanders, Belgium.

New!!: Nothing up my sleeve number and Katholieke Universiteit Leuven ·

## Key schedule

In cryptography, the so-called product ciphers are a certain kind of ciphers, where the (de-)ciphering of data is done in "rounds".

New!!: Nothing up my sleeve number and Key schedule ·

## Magic (illusion)

Magic (sometimes referred to as stage magic to distinguish it from paranormal or ritual magic) is a performing art that entertains audiences by staging tricks or creating illusions of seemingly impossible or supernatural feats using natural means.

New!!: Nothing up my sleeve number and Magic (illusion) ·

## MD5

The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number.

New!!: Nothing up my sleeve number and MD5 ·

## National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST), known between 1901 and 1988 as the National Bureau of Standards (NBS), is a measurement standards laboratory, also known as a National Metrological Institute (NMI), which is a non-regulatory agency of the United States Department of Commerce.

New!!: Nothing up my sleeve number and National Institute of Standards and Technology ·

## National Security Agency

The National Security Agency (NSA) is an intelligence organization of the United States government, responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes – a discipline known as signals intelligence (SIGINT).

New!!: Nothing up my sleeve number and National Security Agency ·

## NewDES

In cryptography, NewDES is a symmetric key block cipher.

New!!: Nothing up my sleeve number and NewDES ·

## Normal number

In mathematics, a normal number is a real number whose infinite sequence of digits in every base b is distributed uniformly in the sense that each of the b digit values has the same natural density 1/b, also all possible b2 pairs of digits are equally likely with density b−2, all b3 triplets of digits equally likely with density b−3, etc.

New!!: Nothing up my sleeve number and Normal number ·

## Portable Document Format

Portable Document Format (PDF) is a file format used to present documents in a manner independent of application software, hardware and operating systems.

New!!: Nothing up my sleeve number and Portable Document Format ·

## Positional notation

Positional notation or place-value notation is a method of representing or encoding numbers.

New!!: Nothing up my sleeve number and Positional notation ·

## PostScript

PostScript (PS) is a computer language for creating vector graphics.

New!!: Nothing up my sleeve number and PostScript ·

## Prime number

A prime number (or a prime) is a natural number greater than 1 that has no positive divisors other than 1 and itself.

New!!: Nothing up my sleeve number and Prime number ·

## RC5

In cryptography, RC5 is a symmetric-key block cipher notable for its simplicity.

New!!: Nothing up my sleeve number and RC5 ·

## Ron Rivest

Ronald Linn Rivest (born May 6, 1947) is a cryptographer and an Institute Professor at MIT.

New!!: Nothing up my sleeve number and Ron Rivest ·

## S-box

In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution.

New!!: Nothing up my sleeve number and S-box ·

## SHA-1

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST.

New!!: Nothing up my sleeve number and SHA-1 ·

## SHA-2

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).

New!!: Nothing up my sleeve number and SHA-2 ·

## SHA-3

SHA-3 (Secure Hash Algorithm 3), a subset of the cryptographic primitive family Keccak, is a cryptographic hash function designed by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche, building upon RadioGatún.

New!!: Nothing up my sleeve number and SHA-3 ·

## Sine

Sine, in mathematics, is a trigonometric function of an angle.

New!!: Nothing up my sleeve number and Sine ·

## Square root

In mathematics, a square root of a number a is a number y such that, in other words, a number y whose square (the result of multiplying the number by itself, or) is a. For example, 4 and −4 are square roots of 16 because.

New!!: Nothing up my sleeve number and Square root ·

## United States Declaration of Independence

The Declaration of Independence is the statement adopted by the Continental Congress meeting at Philadelphia, Pennsylvania on July 4, 1776, which announced that the thirteen American colonies, then at war with Great Britain, regarded themselves as thirteen newly independent sovereign states, and no longer a part of the British Empire.

New!!: Nothing up my sleeve number and United States Declaration of Independence ·

## Wired (website)

The Wired website, formerly known as Wired News or HotWired, is an online technology news website that split off from Wired magazine when the magazine was purchased by Condé Nast Publishing in the 1990s.

New!!: Nothing up my sleeve number and Wired (website) ·

## Redirects here:

## References

[1] https://en.wikipedia.org/wiki/Nothing_up_my_sleeve_number