Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

SAFER

Index SAFER

In cryptography, SAFER (Secure And Fast Encryption Routine) is the name of a family of block ciphers designed primarily by James Massey (one of the designers of IDEA) on behalf of Cylink Corporation. [1]

31 relations: Advanced Encryption Standard process, Alex Biryukov, Block cipher, Block size (cryptography), Bluetooth, Confusion and diffusion, Cryptography, Encryption, Exclusive or, Exponentiation, Fast Software Encryption, International Cryptology Conference, International Data Encryption Algorithm, James Massey, Journal of Cryptology, Key (cryptography), Key schedule, Key size, Lars Ramkilde Knudsen, Logarithm, Message authentication code, NESSIE, Pseudo-Hadamard transform, RSA Security, S-box, Sean Murphy (cryptographer), Singapore, Substitution–permutation network, Tom Berson, Twofish, 40-bit encryption.

Advanced Encryption Standard process

The Advanced Encryption Standard (AES), the symmetric block cipher ratified as a standard by National Institute of Standards and Technology of the United States (NIST), was chosen using a process lasting from 1997 to 2000 that was markedly more open and transparent than its predecessor, the Data Encryption Standard (DES).

New!!: SAFER and Advanced Encryption Standard process · See more »

Alex Biryukov

Alex Biryukov is a cryptographer, currently a full professor at the University of Luxembourg.

New!!: SAFER and Alex Biryukov · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: SAFER and Block cipher · See more »

Block size (cryptography)

In modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers.

New!!: SAFER and Block size (cryptography) · See more »

Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485GHz) from fixed and mobile devices, and building personal area networks (PANs).

New!!: SAFER and Bluetooth · See more »

Confusion and diffusion

In cryptography, confusion and diffusion are two properties of the operation of a secure cipher identified by Claude Shannon in his 1945 classified report A Mathematical Theory of Cryptography. These properties, when present, work to thwart the application of statistics and other methods of cryptanalysis.

New!!: SAFER and Confusion and diffusion · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: SAFER and Cryptography · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: SAFER and Encryption · See more »

Exclusive or

Exclusive or or exclusive disjunction is a logical operation that outputs true only when inputs differ (one is true, the other is false).

New!!: SAFER and Exclusive or · See more »

Exponentiation

Exponentiation is a mathematical operation, written as, involving two numbers, the base and the exponent.

New!!: SAFER and Exponentiation · See more »

Fast Software Encryption

Fast Software Encryption, often abbreviated FSE, is a workshop for cryptography research, focused on symmetric-key cryptography with an emphasis on fast, practical techniques, as opposed to theory.

New!!: SAFER and Fast Software Encryption · See more »

International Cryptology Conference

CRYPTO, the International Cryptology Conference, is one of the largest academic conferences in cryptography and cryptanalysis.

New!!: SAFER and International Cryptology Conference · See more »

International Data Encryption Algorithm

In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991.

New!!: SAFER and International Data Encryption Algorithm · See more »

James Massey

James Lee Massey (February 11, 1934 – June 16, 2013) was an information theorist and cryptographer, Professor Emeritus of Digital Technology at ETH Zurich.

New!!: SAFER and James Massey · See more »

Journal of Cryptology

The Journal of Cryptology is a scientific journal in the field of cryptology and cryptography.

New!!: SAFER and Journal of Cryptology · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

New!!: SAFER and Key (cryptography) · See more »

Key schedule

In cryptography, the so-called product ciphers are a certain kind of cipher, where the (de-)ciphering of data is typically done as an iteration of rounds.

New!!: SAFER and Key schedule · See more »

Key size

In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher).

New!!: SAFER and Key size · See more »

Lars Ramkilde Knudsen

Lars Ramkilde Knudsen (born 21 February 1962) is a Danish researcher in cryptography, particularly interested in the design and analysis of block ciphers, hash functions and message authentication codes (MACs).

New!!: SAFER and Lars Ramkilde Knudsen · See more »

Logarithm

In mathematics, the logarithm is the inverse function to exponentiation.

New!!: SAFER and Logarithm · See more »

Message authentication code

In cryptography, a message authentication code (MAC), sometimes known as a tag, is a short piece of information used to authenticate a message—in other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed.

New!!: SAFER and Message authentication code · See more »

NESSIE

NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a European research project funded from 2000–2003 to identify secure cryptographic primitives.

New!!: SAFER and NESSIE · See more »

Pseudo-Hadamard transform

The pseudo-Hadamard transform is a reversible transformation of a bit string that provides cryptographic diffusion.

New!!: SAFER and Pseudo-Hadamard transform · See more »

RSA Security

RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and network security company.

New!!: SAFER and RSA Security · See more »

S-box

In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution.

New!!: SAFER and S-box · See more »

Sean Murphy (cryptographer)

Sean Murphy is a cryptographer, currently a professor at Royal Holloway, University of London.

New!!: SAFER and Sean Murphy (cryptographer) · See more »

Singapore

Singapore, officially the Republic of Singapore, is a sovereign city-state and island country in Southeast Asia.

New!!: SAFER and Singapore · See more »

Substitution–permutation network

In cryptography, an SP-network, or substitution–permutation network (SPN), is a series of linked mathematical operations used in block cipher algorithms such as AES (Rijndael), 3-Way, Kuznyechik, PRESENT, SAFER, SHARK, and Square.

New!!: SAFER and Substitution–permutation network · See more »

Tom Berson

Thomas Alan Berson (born 1946) is a cryptographer and computer security researcher.

New!!: SAFER and Tom Berson · See more »

Twofish

In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.

New!!: SAFER and Twofish · See more »

40-bit encryption

40-bit encryption refers to a key size of forty bits, or five bytes, for symmetric encryption; this represents a relatively low level of security.

New!!: SAFER and 40-bit encryption · See more »

Redirects here:

SAFER (cipher), SAFER SK, SAFER plus, SAFER plus plus, SAFER+, SAFER++, SAFER-K, Secure And Fast Encryption Routine.

References

[1] https://en.wikipedia.org/wiki/SAFER

OutgoingIncoming
Hey! We are on Facebook now! »