Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Substitution–permutation network

Index Substitution–permutation network

In cryptography, an SP-network, or substitution–permutation network (SPN), is a series of linked mathematical operations used in block cipher algorithms such as AES (Rijndael), 3-Way, Kuznyechik, PRESENT, SAFER, SHARK, and Square. [1]

41 relations: Advanced Encryption Standard, Avalanche effect, Bijection, Bit, Block cipher, Bruce Schneier, Chosen-ciphertext attack, Chosen-plaintext attack, Ciphertext, Circular shift, Confusion and diffusion, Cryptography, Data Encryption Standard, Diffusion, Exclusive or, Execution unit, Feistel cipher, International Data Encryption Algorithm, Jon Callas, Key (cryptography), Known-plaintext attack, Kuznyechik, Malleability (cryptography), Mihir Bellare, Niels Ferguson, One-way function, Permutation, Permutation box, Plaintext, PRESENT, Product cipher, Pseudorandomness, S-box, SAFER, SHARK, Smart card, Square (cipher), Stefan Lucks, Substitution cipher, Transposition cipher, 3-Way.

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

New!!: Substitution–permutation network and Advanced Encryption Standard · See more »

Avalanche effect

In cryptography, the avalanche effect is the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein if an input is changed slightly (for example, flipping a single bit), the output changes significantly (e.g., half the output bits flip).

New!!: Substitution–permutation network and Avalanche effect · See more »

Bijection

In mathematics, a bijection, bijective function, or one-to-one correspondence is a function between the elements of two sets, where each element of one set is paired with exactly one element of the other set, and each element of the other set is paired with exactly one element of the first set.

New!!: Substitution–permutation network and Bijection · See more »

Bit

The bit (a portmanteau of binary digit) is a basic unit of information used in computing and digital communications.

New!!: Substitution–permutation network and Bit · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: Substitution–permutation network and Block cipher · See more »

Bruce Schneier

Bruce Schneier (born January 15, 1963, is an American cryptographer, computer security professional, privacy specialist and writer. He is the author of several books on general security topics, computer security and cryptography. Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute. He has been working for IBM since they acquired Resilient Systems where Schneier was CTO. He is also a contributing writer for The Guardian news organization.

New!!: Substitution–permutation network and Bruce Schneier · See more »

Chosen-ciphertext attack

A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis where the cryptanalyst can gather information by obtaining the decryptions of chosen ciphertexts.

New!!: Substitution–permutation network and Chosen-ciphertext attack · See more »

Chosen-plaintext attack

A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts.

New!!: Substitution–permutation network and Chosen-plaintext attack · See more »

Ciphertext

In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher.

New!!: Substitution–permutation network and Ciphertext · See more »

Circular shift

In combinatorial mathematics, a circular shift is the operation of rearranging the entries in a tuple, either by moving the final entry to the first position, while shifting all other entries to the next position, or by performing the inverse operation.

New!!: Substitution–permutation network and Circular shift · See more »

Confusion and diffusion

In cryptography, confusion and diffusion are two properties of the operation of a secure cipher identified by Claude Shannon in his 1945 classified report A Mathematical Theory of Cryptography. These properties, when present, work to thwart the application of statistics and other methods of cryptanalysis.

New!!: Substitution–permutation network and Confusion and diffusion · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: Substitution–permutation network and Cryptography · See more »

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.

New!!: Substitution–permutation network and Data Encryption Standard · See more »

Diffusion

Diffusion is the net movement of molecules or atoms from a region of high concentration (or high chemical potential) to a region of low concentration (or low chemical potential) as a result of random motion of the molecules or atoms.

New!!: Substitution–permutation network and Diffusion · See more »

Exclusive or

Exclusive or or exclusive disjunction is a logical operation that outputs true only when inputs differ (one is true, the other is false).

New!!: Substitution–permutation network and Exclusive or · See more »

Execution unit

In computer engineering, an execution unit (also called a functional unit) is a part of the central processing unit (CPU) that performs the operations and calculations as instructed by the computer program.

New!!: Substitution–permutation network and Execution unit · See more »

Feistel cipher

In cryptography, a Feistel cipher is a symmetric structure used in the construction of block ciphers, named after the German-born physicist and cryptographer Horst Feistel who did pioneering research while working for IBM (USA); it is also commonly known as a Feistel network.

New!!: Substitution–permutation network and Feistel cipher · See more »

International Data Encryption Algorithm

In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991.

New!!: Substitution–permutation network and International Data Encryption Algorithm · See more »

Jon Callas

Jon Callas is an American computer security expert, software engineer, user experience designer, and technologist who is the co-founder and former CTO of the global encrypted communications service Silent Circle.

New!!: Substitution–permutation network and Jon Callas · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

New!!: Substitution–permutation network and Key (cryptography) · See more »

Known-plaintext attack

The known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib), and its encrypted version (ciphertext).

New!!: Substitution–permutation network and Known-plaintext attack · See more »

Kuznyechik

Kuznyechik (Russian: Кузнечик) is a symmetric block cipher.

New!!: Substitution–permutation network and Kuznyechik · See more »

Malleability (cryptography)

Malleability is a property of some cryptographic algorithms.

New!!: Substitution–permutation network and Malleability (cryptography) · See more »

Mihir Bellare

Mihir Bellare is a cryptographer and professor at the University of California San Diego.

New!!: Substitution–permutation network and Mihir Bellare · See more »

Niels Ferguson

Niels T. Ferguson (born 10 December 1965, Eindhoven) is a Dutch cryptographer and consultant who currently works for Microsoft.

New!!: Substitution–permutation network and Niels Ferguson · See more »

One-way function

In computer science, a one-way function is a function that is easy to compute on every input, but hard to invert given the image of a random input.

New!!: Substitution–permutation network and One-way function · See more »

Permutation

In mathematics, the notion of permutation relates to the act of arranging all the members of a set into some sequence or order, or if the set is already ordered, rearranging (reordering) its elements, a process called permuting.

New!!: Substitution–permutation network and Permutation · See more »

Permutation box

In cryptography, a permutation box (or P-box) is a method of bit-shuffling used to permute or transpose bits across S-boxes inputs, retaining diffusion while transposing.

New!!: Substitution–permutation network and Permutation box · See more »

Plaintext

In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: Substitution–permutation network and Plaintext · See more »

PRESENT

PRESENT is a lightweight block cipher, developed by the Orange Labs (France), Ruhr University Bochum (Germany) and the Technical University of Denmark in 2007.

New!!: Substitution–permutation network and PRESENT · See more »

Product cipher

In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the individual components to make it resistant to cryptanalysis.

New!!: Substitution–permutation network and Product cipher · See more »

Pseudorandomness

A pseudorandom process is a process that appears to be random but is not.

New!!: Substitution–permutation network and Pseudorandomness · See more »

S-box

In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution.

New!!: Substitution–permutation network and S-box · See more »

SAFER

In cryptography, SAFER (Secure And Fast Encryption Routine) is the name of a family of block ciphers designed primarily by James Massey (one of the designers of IDEA) on behalf of Cylink Corporation.

New!!: Substitution–permutation network and SAFER · See more »

SHARK

In cryptography, SHARK is a block cipher identified as one of the predecessors of Rijndael (the Advanced Encryption Standard).

New!!: Substitution–permutation network and SHARK · See more »

Smart card

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.

New!!: Substitution–permutation network and Smart card · See more »

Square (cipher)

In cryptography, Square (sometimes written SQUARE) is a block cipher invented by Joan Daemen and Vincent Rijmen.

New!!: Substitution–permutation network and Square (cipher) · See more »

Stefan Lucks

Stefan Lucks is a researcher in the fields of communications security and cryptography.

New!!: Substitution–permutation network and Stefan Lucks · See more »

Substitution cipher

In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth.

New!!: Substitution–permutation network and Substitution cipher · See more »

Transposition cipher

In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext.

New!!: Substitution–permutation network and Transposition cipher · See more »

3-Way

In cryptography, 3-Way is a block cipher designed in 1994 by Joan Daemen.

New!!: Substitution–permutation network and 3-Way · See more »

Redirects here:

SP-network, Substitution-Permutation network, Substitution-permutation network.

References

[1] https://en.wikipedia.org/wiki/Substitution–permutation_network

OutgoingIncoming
Hey! We are on Facebook now! »