Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!
New! Keep your interests! » Create account

In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution. [1]

32 relations: Backdoor (computing), Bent function, Bijection, Bit, Block cipher, Blowfish (cipher), Boolean function, Brighton, Carlisle Adams, Cipher, Ciphertext, Claude Shannon, Confusion and diffusion, Cryptanalysis, Cryptography, Data Encryption Standard, Differential cryptanalysis, Eurocrypt, John Wiley & Sons, Kaisa Nyberg, Key (cryptography), Lookup table, Nothing up my sleeve number, Permutation box, Portable Document Format, PostScript, Queen's University, Rijndael S-box, Selected Areas in Cryptography, Substitution cipher, Symmetric-key algorithm, Twofish.

A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing unauthorized remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.

New!!: S-box and Backdoor (computing) · See more »

In the mathematical field of combinatorics, a bent function is a special type of Boolean function.

New!!: S-box and Bent function · See more »

In mathematics, a bijection, bijective function or one-to-one correspondence is a function between the elements of two sets, where every element of one set is paired with exactly one element of the other set, and every element of the other set is paired with exactly one element of the first set.

New!!: S-box and Bijection · See more »

A bit is the basic unit of information in computing and digital communications.

New!!: S-box and Bit · See more »

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key.

New!!: S-box and Block cipher · See more »

Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products.

New!!: S-box and Blowfish (cipher) · See more »

In mathematics and logic, a (finitary) Boolean function (or switching function) is a function of the form ƒ: Bk → B, where B.

New!!: S-box and Boolean function · See more »

Brighton is a seaside resort and the largest part of the city of Brighton and Hove situated in East Sussex, England.

New!!: S-box and Brighton · See more »

Carlisle M. Adams is a cryptographer and computer security researcher.

New!!: S-box and Carlisle Adams · See more »

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

New!!: S-box and Cipher · See more »

In cryptography, ciphertext (or cyphertext) is the result of encryption performed on plaintext using an algorithm, called a cipher.

New!!: S-box and Ciphertext · See more »

Claude Elwood Shannon (April 30, 1916 – February 24, 2001) was an American mathematician, electronic engineer, and cryptographer known as "the father of information theory".

New!!: S-box and Claude Shannon · See more »

In cryptography, confusion and diffusion are two properties of the operation of a secure cipher which were identified by Claude Shannon in his paper Communication Theory of Secrecy Systems, published in 1949.

New!!: S-box and Confusion and diffusion · See more »

Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems.

New!!: S-box and Cryptanalysis · See more »

Cryptography or cryptology; from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).

New!!: S-box and Cryptography · See more »

The Data Encryption Standard (DES, or) was once a predominant symmetric-key algorithm for the encryption of electronic data.

New!!: S-box and Data Encryption Standard · See more »

Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions.

New!!: S-box and Differential cryptanalysis · See more »

Eurocrypt (or EUROCRYPT) is a conference for cryptography research.

New!!: S-box and Eurocrypt · See more »

John Wiley & Sons, Inc., also referred to as Wiley, is a global publishing company that specializes in academic publishing and markets its products to professionals and consumers, students and instructors in higher education, and researchers and practitioners in scientific, technical, medical, and scholarly fields.

New!!: S-box and John Wiley & Sons · See more »

Kaisa Nyberg is a cryptographer and computer security researcher, currently a professor at Aalto University School of Science.

New!!: S-box and Kaisa Nyberg · See more »

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher.

New!!: S-box and Key (cryptography) · See more »

In computer science, a lookup table is an array that replaces runtime computation with a simpler array indexing operation.

New!!: S-box and Lookup table · See more »

In cryptography, nothing up my sleeve numbers are any numbers which, by their construction, are above suspicion of hidden properties.

New!!: S-box and Nothing up my sleeve number · See more »

In cryptography, a permutation box (or P-box) is a method of bit-shuffling used to permute or transpose bits across S-boxes inputs, retaining diffusion while transposing.

New!!: S-box and Permutation box · See more »

Portable Document Format (PDF) is a file format used to present documents in a manner independent of application software, hardware and operating systems.

New!!: S-box and Portable Document Format · See more »

PostScript (PS) is a computer language for creating vector graphics.

New!!: S-box and PostScript · See more »

Queen's University at Kingston (commonly shortened to Queen's University or Queen's) is a public research university located in Kingston, Ontario, Canada.

New!!: S-box and Queen's University · See more »

The Rijndael S-box is a matrix (square array of numbers) used in the Rijndael cipher, which the Advanced Encryption Standard (AES) cryptographic algorithm was based on.

New!!: S-box and Rijndael S-box · See more »

Selected Areas in Cryptography (SAC) is an international cryptography conference (originally a workshop) held every August in Canada since 1994.

New!!: S-box and Selected Areas in Cryptography · See more »

In cryptography, a substitution cipher is a method of encoding by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth.

New!!: S-box and Substitution cipher · See more »

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

New!!: S-box and Symmetric-key algorithm · See more »

In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.

New!!: S-box and Twofish · See more »

Redirects here:

Cryptography/s-box, S Box, S box, S-Box, S-boxes, S-table, SBox, Sbox, Substitution box, Substitution boxes.


[1] https://en.wikipedia.org/wiki/S-box

Hey! We are on Facebook now! »