19 relations: Affine transformation, Block cipher, Block size (cryptography), Bryant Tuckerman, Chosen-plaintext attack, CRC Press, Cryptography, Data Encryption Standard, Edna Grossman, Feistel cipher, IBM, John Wiley & Sons, Key (cryptography), Key size, Lucifer (cipher), Nibble, Permutation, S-box, Slide attack.
Affine transformation
In geometry, an affine transformation, affine mapBerger, Marcel (1987), p. 38.
New!!: New Data Seal and Affine transformation · See more »
Block cipher
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.
New!!: New Data Seal and Block cipher · See more »
Block size (cryptography)
In modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers.
New!!: New Data Seal and Block size (cryptography) · See more »
Bryant Tuckerman
Louis Bryant Tuckerman, III (November 28, 1915 – May 19, 2002) was an American mathematician, born in Lincoln, Nebraska.
New!!: New Data Seal and Bryant Tuckerman · See more »
Chosen-plaintext attack
A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts.
New!!: New Data Seal and Chosen-plaintext attack · See more »
CRC Press
The CRC Press, LLC is a publishing group based in the United States that specializes in producing technical books.
New!!: New Data Seal and CRC Press · See more »
Cryptography
Cryptography or cryptology (from κρυπτός|translit.
New!!: New Data Seal and Cryptography · See more »
Data Encryption Standard
The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.
New!!: New Data Seal and Data Encryption Standard · See more »
Edna Grossman
Edna Grossman (born Edna Kalka) is an American mathematician.
New!!: New Data Seal and Edna Grossman · See more »
Feistel cipher
In cryptography, a Feistel cipher is a symmetric structure used in the construction of block ciphers, named after the German-born physicist and cryptographer Horst Feistel who did pioneering research while working for IBM (USA); it is also commonly known as a Feistel network.
New!!: New Data Seal and Feistel cipher · See more »
IBM
The International Business Machines Corporation (IBM) is an American multinational technology company headquartered in Armonk, New York, United States, with operations in over 170 countries.
New!!: New Data Seal and IBM · See more »
John Wiley & Sons
John Wiley & Sons, Inc., also referred to as Wiley, is a global publishing company that specializes in academic publishing.
New!!: New Data Seal and John Wiley & Sons · See more »
Key (cryptography)
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.
New!!: New Data Seal and Key (cryptography) · See more »
Key size
In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher).
New!!: New Data Seal and Key size · See more »
Lucifer (cipher)
In cryptography, Lucifer was the name given to several of the earliest civilian block ciphers, developed by Horst Feistel and his colleagues at IBM.
New!!: New Data Seal and Lucifer (cipher) · See more »
Nibble
In computing, a nibble (occasionally nybble or nyble to match the spelling of byte) is a four-bit aggregation, or half an octet.
New!!: New Data Seal and Nibble · See more »
Permutation
In mathematics, the notion of permutation relates to the act of arranging all the members of a set into some sequence or order, or if the set is already ordered, rearranging (reordering) its elements, a process called permuting.
New!!: New Data Seal and Permutation · See more »
S-box
In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution.
New!!: New Data Seal and S-box · See more »
Slide attack
The slide attack is a form of cryptanalysis designed to deal with the prevailing idea that even weak ciphers can become very strong by increasing the number of rounds, which can ward off a differential attack.
New!!: New Data Seal and Slide attack · See more »