88 relations: Adi Shamir, Advanced Encryption Standard process, AES instruction set, Affine transformation, Anubis (cipher), Asiacrypt, Belgium, Biclique attack, Bit, Black box, Block cipher, Block size (cryptography), Bruce Schneier, Brute-force attack, Cipher, Classified information, Communications Security Establishment, Confusion and diffusion, Cryptanalysis, Cryptographic Module Validation Program, CrypTool, CRYPTREC, Daniel J. Bernstein, Data Encryption Standard, David A. Wagner, Derangement, Differential fault analysis, Disk encryption, Distributed computing, Distributed.net, Encryption, Exclusive or, Fast Software Encryption, Federal government of the United States, Federal Information Processing Standards, Feistel cipher, Finite field, Finite field arithmetic, FIPS 140, FIPS 140-2, Grand Cru (cipher), Hexadecimal, Joan Daemen, John Kelsey (cryptanalyst), Josef Pieprzyk, Kendall rank correlation coefficient, Key (cryptography), Key size, Key-recovery attack, Known-key distinguishing attack, ..., Linear map, List of Intel Core i3 microprocessors, List of Intel Core i5 microprocessors, List of Intel Core i7 microprocessors, MDS matrix, Multiplicative inverse, National Institute of Standards and Technology, National Security Agency, NESSIE, Nicolas Courtois, Offset (computer science), OpenSSL, Pentium M, Pentium Pro, PostScript, RC5, Related-key attack, Rijndael key schedule, Rijndael MixColumns, Rijndael S-box, Row- and column-major order, Ryzen, S-box, SHA-1, Side-channel attack, Smart card, Springer Science+Business Media, Square (cipher), Stefan Lucks, Substitution–permutation network, Symmetric-key algorithm, Triple DES, Twofish, United States Secretary of Commerce, Vincent Rijmen, Whirlpool (cryptography), Wireless security, XSL attack. Expand index (38 more) » « Shrink index
Adi Shamir (עדי שמיר; born July 6, 1952) is an Israeli cryptographer.
The Advanced Encryption Standard (AES), the symmetric block cipher ratified as a standard by National Institute of Standards and Technology of the United States (NIST), was chosen using a process lasting from 1997 to 2000 that was markedly more open and transparent than its predecessor, the Data Encryption Standard (DES).
Advanced Encryption Standard instruction set (or the Intel Advanced Encryption Standard New Instructions; AES-NI) is an extension to the x86 instruction set architecture for microprocessors from Intel and AMD proposed by Intel in March 2008.
In geometry, an affine transformation, affine mapBerger, Marcel (1987), p. 38.
Anubis is a block cipher designed by Vincent Rijmen and Paulo S. L. M. Barreto as an entrant in the NESSIE project, a former research program initiated by the European Commission in 2000 for the identification of new cryptographic algorithms.
Asiacrypt (also ASIACRYPT) is an important international conference for cryptography research.
Belgium, officially the Kingdom of Belgium, is a country in Western Europe bordered by France, the Netherlands, Germany and Luxembourg.
A biclique attack is a variant of the meet-in-the-middle (MITM) method of cryptanalysis.
The bit (a portmanteau of binary digit) is a basic unit of information used in computing and digital communications.
In science, computing, and engineering, a black box is a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings.
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.
In modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers.
Bruce Schneier (born January 15, 1963, is an American cryptographer, computer security professional, privacy specialist and writer. He is the author of several books on general security topics, computer security and cryptography. Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute. He has been working for IBM since they acquired Resilient Systems where Schneier was CTO. He is also a contributing writer for The Guardian news organization.
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.
Classified information is material that a government body deems to be sensitive information that must be protected.
The Communications Security Establishment (CSE; Centre de la sécurité des télécommunications, CST), formerly called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national cryptologic agency.
In cryptography, confusion and diffusion are two properties of the operation of a secure cipher identified by Claude Shannon in his 1945 classified report A Mathematical Theory of Cryptography. These properties, when present, work to thwart the application of statistics and other methods of cryptanalysis.
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems.
The Cryptographic Module Validation Program (CMVP) is a joint American and Canadian security accreditation program for cryptographic modules.
CrypTool is an open source project.
CRYPTREC is the Cryptography Research and Evaluation Committees set up by the Japanese Government to evaluate and recommend cryptographic techniques for government and industrial use.
Daniel Julius Bernstein (sometimes known simply as djb; born October 29, 1971) is a German-American mathematician, cryptologist, and programmer.
The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.
David A. Wagner (born 1974) is a Professor of Computer Science at the University of California, Berkeley and a well-known researcher in cryptography and computer security.
In combinatorial mathematics, a derangement is a permutation of the elements of a set, such that no element appears in its original position.
Differential fault analysis (DFA) is a type of side channel attack in the field of cryptography, specifically cryptanalysis.
Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.
Distributed computing is a field of computer science that studies distributed systems.
distributed.net is a distributed computing effort that is attempting to solve large scale problems using otherwise idle CPU or GPU time.
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
Exclusive or or exclusive disjunction is a logical operation that outputs true only when inputs differ (one is true, the other is false).
Fast Software Encryption, often abbreviated FSE, is a workshop for cryptography research, focused on symmetric-key cryptography with an emphasis on fast, practical techniques, as opposed to theory.
The federal government of the United States (U.S. federal government) is the national government of the United States, a constitutional republic in North America, composed of 50 states, one district, Washington, D.C. (the nation's capital), and several territories.
Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States federal government for use in computer systems by non-military government agencies and government contractors.
In cryptography, a Feistel cipher is a symmetric structure used in the construction of block ciphers, named after the German-born physicist and cryptographer Horst Feistel who did pioneering research while working for IBM (USA); it is also commonly known as a Feistel network.
In mathematics, a finite field or Galois field (so-named in honor of Évariste Galois) is a field that contains a finite number of elements.
In mathematics, finite field arithmetic is arithmetic in a finite field (a field containing a finite number of elements) as opposed to arithmetic in a field with an infinite number of elements, like the field of rational numbers.
The 140 series of Federal Information Processing Standards (FIPS) are U.S. government computer security standards that specify requirements for cryptography modules.
The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to approve cryptographic modules.
In cryptography, Grand Cru is a block cipher invented in 2000 by Johan Borst.
In mathematics and computing, hexadecimal (also base, or hex) is a positional numeral system with a radix, or base, of 16.
Joan Daemen (born 1965) is a Belgian cryptographer who co-designed the Rijndael cipher with Vincent Rijmen, which was selected as the Advanced Encryption Standard (AES) in 2001.
John Kelsey is a cryptographer who works at NIST.
Josef Pieprzyk (born 1949 in Poland) is currently a professor at Queensland University of Technology in Brisbane, Australia.
In statistics, the Kendall rank correlation coefficient, commonly referred to as Kendall's tau coefficient (after the Greek letter τ), is a statistic used to measure the ordinal association between two measured quantities.
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.
In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher).
A key-recovery attack is an adversary's attempt to recover the cryptographic key of an encryption scheme.
In cryptography, a known-key distinguishing attack is an attack model against symmetric ciphers, whereby an attacker who knows the key can find a structural property in cipher, where the transformation from plaintext to ciphertext is not random.
In mathematics, a linear map (also called a linear mapping, linear transformation or, in some contexts, linear function) is a mapping between two modules (including vector spaces) that preserves (in the sense defined below) the operations of addition and scalar multiplication.
The following is a list of Intel Core i3 brand microprocessors.
The following is a list of Intel Core i5 brand microprocessors.
The following is a list of Intel Core i7 brand microprocessors.
An MDS matrix (Maximum Distance Separable) is a matrix representing a function with certain diffusion properties that have useful applications in cryptography.
In mathematics, a multiplicative inverse or reciprocal for a number x, denoted by 1/x or x−1, is a number which when multiplied by x yields the multiplicative identity, 1.
The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.
NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a European research project funded from 2000–2003 to identify secure cryptographic primitives.
Nicolas Tadeusz Courtois (born 14 November 1971) is a cryptographer, a senior lecturer in computer science at University College London.
In computer science, an offset within an array or other data structure object is an integer indicating the distance (displacement) between the beginning of the object and a given element or point, presumably within the same object.
OpenSSL is a software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end.
The Pentium M is a family of mobile 32-bit single-core x86 microprocessors (with the modified Intel P6 microarchitecture) introduced in March 2003 and forming a part of the Intel Carmel notebook platform under the then new Centrino brand.
The Pentium Pro is a sixth-generation x86 microprocessor developed and manufactured by Intel introduced in November 1, 1995.
PostScript (PS) is a page description language in the electronic publishing and desktop publishing business.
In cryptography, RC5 is a symmetric-key block cipher notable for its simplicity.
In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the keys is known to the attacker.
AES (Rijndael) uses a key schedule to expand a short key into a number of separate round keys.
The MixColumns operation performed by the Rijndael cipher, along with the ShiftRows step, is the primary source of diffusion in Rijndael.
The Rijndael S-box is a square matrix (square array of numbers) used in the Rijndael cipher, which the Advanced Encryption Standard (AES) cryptographic algorithm was based on.
In computing, row-major order and column-major order are methods for storing multidimensional arrays in linear storage such as random access memory.
Ryzen is a brand of central processing units (CPUs) and accelerated processing units (APUs) marketed and designed by AMD (Advanced Micro Devices).
In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution.
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.
In computer security, a side-channel attack is any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs).
A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.
Springer Science+Business Media or Springer, part of Springer Nature since 2015, is a global publishing company that publishes books, e-books and peer-reviewed journals in science, humanities, technical and medical (STM) publishing.
In cryptography, Square (sometimes written SQUARE) is a block cipher invented by Joan Daemen and Vincent Rijmen.
Stefan Lucks is a researcher in the fields of communications security and cryptography.
In cryptography, an SP-network, or substitution–permutation network (SPN), is a series of linked mathematical operations used in block cipher algorithms such as AES (Rijndael), 3-Way, Kuznyechik, PRESENT, SAFER, SHARK, and Square.
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
In cryptography, Triple DES (3DES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block.
In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.
The United States Secretary of Commerce (SecCom) is the head of the United States Department of Commerce.
Vincent Rijmen (born 16 October 1970) is a Belgian cryptographer and one of the two designers of the Rijndael, the Advanced Encryption Standard.
In computer science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function.
Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.
In cryptography, the eXtended Sparse Linearization (XSL) attack is a method of cryptanalysis for block ciphers.
AES (cipher), AES 128, AES 192, AES 256, AES 256-bit, AES Key, AES cipher, AES encryption, AES-128, AES-192, AES-256, AES128, AES192, AES256, Advanced Encryption System, Advanced Encryption Technology, Advanced encryption standard, Aes 128, Aes 192, Aes 256, Aes-128, Aes-192, Aes-256, Aes128, Aes192, Aes256, FIPS 197, Rijndael, Rijndael algorithm, Rijndael cipher, Rijndael encryption algorithm, Rjindael.