Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!

In cryptography, 3-Way is a block cipher designed in 1994 by Joan Daemen. [1]

23 relations: BaseKing, Bit, Block cipher, Block size (cryptography), Bruce Schneier, Chosen-plaintext attack, Cipher, Computer hardware, Cryptanalysis, Cryptography, David A. Wagner, Gzip, Joan Daemen, John Kelsey (cryptanalyst), Key size, NOEKEON, PDF, PostScript, Power of two, Related-key attack, Springer Science+Business Media, Substitution–permutation network, Word (computer architecture).


In cryptography, BaseKing is a block cipher designed in 1994 by Joan Daemen.

New!!: 3-Way and BaseKing · See more »


The bit (a portmanteau of binary digit) is a basic unit of information used in computing and digital communications.

New!!: 3-Way and Bit · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: 3-Way and Block cipher · See more »

Block size (cryptography)

In modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers.

New!!: 3-Way and Block size (cryptography) · See more »

Bruce Schneier

Bruce Schneier (born January 15, 1963, is an American cryptographer, computer security professional, privacy specialist and writer. He is the author of several books on general security topics, computer security and cryptography. Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute. He has been working for IBM since they acquired Resilient Systems where Schneier was CTO. He is also a contributing writer for The Guardian news organization.

New!!: 3-Way and Bruce Schneier · See more »

Chosen-plaintext attack

A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts.

New!!: 3-Way and Chosen-plaintext attack · See more »


In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

New!!: 3-Way and Cipher · See more »

Computer hardware

Computer hardware includes the physical parts or components of a computer, such as the central processing unit, monitor, keyboard, computer data storage, graphic card, sound card and motherboard.

New!!: 3-Way and Computer hardware · See more »


Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems.

New!!: 3-Way and Cryptanalysis · See more »


Cryptography or cryptology (from κρυπτός|translit.

New!!: 3-Way and Cryptography · See more »

David A. Wagner

David A. Wagner (born 1974) is a Professor of Computer Science at the University of California, Berkeley and a well-known researcher in cryptography and computer security.

New!!: 3-Way and David A. Wagner · See more »


gzip is a file format and a software application used for file compression and decompression.

New!!: 3-Way and Gzip · See more »

Joan Daemen

Joan Daemen (born 1965) is a Belgian cryptographer who co-designed the Rijndael cipher with Vincent Rijmen, which was selected as the Advanced Encryption Standard (AES) in 2001.

New!!: 3-Way and Joan Daemen · See more »

John Kelsey (cryptanalyst)

John Kelsey is a cryptographer who works at NIST.

New!!: 3-Way and John Kelsey (cryptanalyst) · See more »

Key size

In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher).

New!!: 3-Way and Key size · See more »


NOEKEON is a family of two block ciphers designed by Joan Daemen, Michaël Peeters, Gilles Van Assche and Vincent Rijmen and submitted to the NESSIE project in September 2000.

New!!: 3-Way and NOEKEON · See more »


The Portable Document Format (PDF) is a file format developed in the 1990s to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems.

New!!: 3-Way and PDF · See more »


PostScript (PS) is a page description language in the electronic publishing and desktop publishing business.

New!!: 3-Way and PostScript · See more »

Power of two

In mathematics, a power of two is a number of the form where is an integer, i.e. the result of exponentiation with number two as the base and integer as the exponent.

New!!: 3-Way and Power of two · See more »

Related-key attack

In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the keys is known to the attacker.

New!!: 3-Way and Related-key attack · See more »

Springer Science+Business Media

Springer Science+Business Media or Springer, part of Springer Nature since 2015, is a global publishing company that publishes books, e-books and peer-reviewed journals in science, humanities, technical and medical (STM) publishing.

New!!: 3-Way and Springer Science+Business Media · See more »

Substitution–permutation network

In cryptography, an SP-network, or substitution–permutation network (SPN), is a series of linked mathematical operations used in block cipher algorithms such as AES (Rijndael), 3-Way, Kuznyechik, PRESENT, SAFER, SHARK, and Square.

New!!: 3-Way and Substitution–permutation network · See more »

Word (computer architecture)

In computing, a word is the natural unit of data used by a particular processor design.

New!!: 3-Way and Word (computer architecture) · See more »

Redirects here:

3-WAY, 3-Way (cipher), 3-way, 3-way (cipher), 3Way, 3way Logistics.


[1] https://en.wikipedia.org/wiki/3-Way

Hey! We are on Facebook now! »