Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Serpent (cipher)

Index Serpent (cipher)

Serpent is a symmetric key block cipher that was a finalist in the Advanced Encryption Standard (AES) contest, where it was ranked second to Rijndael. [1]

33 relations: Advanced Encryption Standard, Advanced Encryption Standard process, Bit slicing, Block cipher, Block size (cryptography), Boomerang attack, Brute-force attack, Cipher, Computer Laboratory, University of Cambridge, Cryptanalysis, Data Encryption Standard, Eli Biham, Fast Software Encryption, GNU General Public License, Key size, Lars Ramkilde Knudsen, Linear cryptanalysis, MARS (cryptography), Meet-in-the-middle attack, Parallel computing, Patent, Public domain, Public-domain software, Ross J. Anderson, S-box, Square (cipher), Substitution–permutation network, Symmetric-key algorithm, The New York Times, Tiger (cryptography), Twofish, Word (computer architecture), XSL attack.

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

New!!: Serpent (cipher) and Advanced Encryption Standard · See more »

Advanced Encryption Standard process

The Advanced Encryption Standard (AES), the symmetric block cipher ratified as a standard by National Institute of Standards and Technology of the United States (NIST), was chosen using a process lasting from 1997 to 2000 that was markedly more open and transparent than its predecessor, the Data Encryption Standard (DES).

New!!: Serpent (cipher) and Advanced Encryption Standard process · See more »

Bit slicing

Bit slicing is a technique for constructing a processor from modules of processors of smaller bit width, for the purpose of increasing the word length; in theory to make an arbitrary n-bit CPU.

New!!: Serpent (cipher) and Bit slicing · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: Serpent (cipher) and Block cipher · See more »

Block size (cryptography)

In modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers.

New!!: Serpent (cipher) and Block size (cryptography) · See more »

Boomerang attack

In cryptography, the boomerang attack is a method for the cryptanalysis of block ciphers based on differential cryptanalysis.

New!!: Serpent (cipher) and Boomerang attack · See more »

Brute-force attack

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.

New!!: Serpent (cipher) and Brute-force attack · See more »

Cipher

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

New!!: Serpent (cipher) and Cipher · See more »

Computer Laboratory, University of Cambridge

The Computer Laboratory is the computer science department of the University of Cambridge.

New!!: Serpent (cipher) and Computer Laboratory, University of Cambridge · See more »

Cryptanalysis

Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems.

New!!: Serpent (cipher) and Cryptanalysis · See more »

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.

New!!: Serpent (cipher) and Data Encryption Standard · See more »

Eli Biham

Eli Biham (אלי ביהם) is an Israeli cryptographer and cryptanalyst, currently a professor at the Technion Israeli Institute of Technology Computer Science department.

New!!: Serpent (cipher) and Eli Biham · See more »

Fast Software Encryption

Fast Software Encryption, often abbreviated FSE, is a workshop for cryptography research, focused on symmetric-key cryptography with an emphasis on fast, practical techniques, as opposed to theory.

New!!: Serpent (cipher) and Fast Software Encryption · See more »

GNU General Public License

The GNU General Public License (GNU GPL or GPL) is a widely used free software license, which guarantees end users the freedom to run, study, share and modify the software.

New!!: Serpent (cipher) and GNU General Public License · See more »

Key size

In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher).

New!!: Serpent (cipher) and Key size · See more »

Lars Ramkilde Knudsen

Lars Ramkilde Knudsen (born 21 February 1962) is a Danish researcher in cryptography, particularly interested in the design and analysis of block ciphers, hash functions and message authentication codes (MACs).

New!!: Serpent (cipher) and Lars Ramkilde Knudsen · See more »

Linear cryptanalysis

In cryptography, linear cryptanalysis is a general form of cryptanalysis based on finding affine approximations to the action of a cipher.

New!!: Serpent (cipher) and Linear cryptanalysis · See more »

MARS (cryptography)

MARS is a block cipher that was IBM's submission to the Advanced Encryption Standard process.

New!!: Serpent (cipher) and MARS (cryptography) · See more »

Meet-in-the-middle attack

The meet-in-the-middle attack (MITM) is a generic space–time tradeoff cryptographic attack against encryption schemes which rely on performing multiple encryption operations in sequence.

New!!: Serpent (cipher) and Meet-in-the-middle attack · See more »

Parallel computing

Parallel computing is a type of computation in which many calculations or the execution of processes are carried out concurrently.

New!!: Serpent (cipher) and Parallel computing · See more »

Patent

A patent is a set of exclusive rights granted by a sovereign state or intergovernmental organization to an inventor or assignee for a limited period of time in exchange for detailed public disclosure of an invention.

New!!: Serpent (cipher) and Patent · See more »

Public domain

The public domain consists of all the creative works to which no exclusive intellectual property rights apply.

New!!: Serpent (cipher) and Public domain · See more »

Public-domain software

Public-domain software is software that has been placed in the public domain: in other words, there is absolutely no ownership such as copyright, trademark, or patent.

New!!: Serpent (cipher) and Public-domain software · See more »

Ross J. Anderson

Ross John Anderson, FRS, FREng (born 15 September 1956) is a researcher, writer, and industry consultant in security engineering.

New!!: Serpent (cipher) and Ross J. Anderson · See more »

S-box

In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution.

New!!: Serpent (cipher) and S-box · See more »

Square (cipher)

In cryptography, Square (sometimes written SQUARE) is a block cipher invented by Joan Daemen and Vincent Rijmen.

New!!: Serpent (cipher) and Square (cipher) · See more »

Substitution–permutation network

In cryptography, an SP-network, or substitution–permutation network (SPN), is a series of linked mathematical operations used in block cipher algorithms such as AES (Rijndael), 3-Way, Kuznyechik, PRESENT, SAFER, SHARK, and Square.

New!!: Serpent (cipher) and Substitution–permutation network · See more »

Symmetric-key algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

New!!: Serpent (cipher) and Symmetric-key algorithm · See more »

The New York Times

The New York Times (sometimes abbreviated as The NYT or The Times) is an American newspaper based in New York City with worldwide influence and readership.

New!!: Serpent (cipher) and The New York Times · See more »

Tiger (cryptography)

In cryptography, Tiger is a cryptographic hash function designed by Ross Anderson and Eli Biham in 1995 for efficiency on 64-bit platforms.

New!!: Serpent (cipher) and Tiger (cryptography) · See more »

Twofish

In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.

New!!: Serpent (cipher) and Twofish · See more »

Word (computer architecture)

In computing, a word is the natural unit of data used by a particular processor design.

New!!: Serpent (cipher) and Word (computer architecture) · See more »

XSL attack

In cryptography, the eXtended Sparse Linearization (XSL) attack is a method of cryptanalysis for block ciphers.

New!!: Serpent (cipher) and XSL attack · See more »

Redirects here:

Serpent encryption algorithm.

References

[1] https://en.wikipedia.org/wiki/Serpent_(cipher)

OutgoingIncoming
Hey! We are on Facebook now! »