27 relations: Block cipher, Cipher security summary, Cryptanalysis, Cryptanalytic computer, Crypto Wars, Custom hardware attack, Data Encryption Standard, DES Challenges, Distributed.net, Don Hopkins, Index of cryptography articles, John Gilmore (activist), Key size, Key space (cryptography), MS-CHAP, National Cryptologic Museum, Password cracking, Password strength, Paul Kocher, Penelope Ann Miller, RSA Secret-Key Challenge, Supercomputer, Supercomputer architecture, Timeline of Electronic Frontier Foundation actions, Whitfield Diffie, 40-bit encryption, 56-bit encryption.
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.
This article summarizes publicly known attacks against block ciphers and stream ciphers.
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems.
A cryptanalytic computer is a computer designed to be used for cryptanalysis, which nowadays involves massive statistical analysis and multiple trial decryptions that since before World War II are possible only with automated equipment.
The Crypto Wars is an unofficial name for the U.S. and allied governments' attempts to limit the public's and foreign nations' access to cryptography strong enough to resist decryption by national intelligence agencies (especially USA's NSA).
In cryptography, a custom hardware attack uses specifically designed application-specific integrated circuits (ASIC) to decipher encrypted messages.
The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.
The DES Challenges were a series of brute force attack contests created by RSA Security to highlight the lack of security provided by the Data Encryption Standard.
distributed.net is a distributed computing effort that is attempting to solve large scale problems using otherwise idle CPU or GPU time.
Don Hopkins is an artist and programmer specializing in human computer interaction and computer graphics and an alumnus of the University of Maryland and a former member of the University of Maryland Human–Computer Interaction Lab.
Articles related to cryptography include.
John Gilmore (born 1955) is one of the founders of the Electronic Frontier Foundation, the Cypherpunks mailing list, and Cygnus Solutions.
In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher).
In cryptography, an algorithm's key space refers to the set of all possible permutations of a key.
MS-CHAP is the Microsoft version of the Challenge-Handshake Authentication Protocol, CHAP.
The National Cryptologic Museum (NCM) is an American museum of cryptologic history that is affiliated with the National Security Agency (NSA).
In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.
Password strength is a measure of the effectiveness of a password against guessing or brute-force attacks.
Paul Carl Kocher (born June 11, 1973) is an American cryptographer and cryptography consultant, currently the president and chief scientist of Cryptography Research, Inc.
Penelope Ann Miller (born Penelope Andrea Miller; January 13, 1964), sometimes credited as Penelope Miller, is an American actress.
The RSA Secret-Key Challenge consisted of a series of cryptographic contests organised by RSA Laboratories with the intent of helping to demonstrate the relative security of different encryption algorithms.
A supercomputer is a computer with a high level of performance compared to a general-purpose computer.
Approaches to supercomputer architecture have taken dramatic turns since the earliest systems were introduced in the 1960s.
The Electronic Frontier Foundation (EFF) is an international non-profit advocacy and legal organization based in the United States.
Bailey Whitfield 'Whit' Diffie (born June 5, 1944) is an American cryptographer and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle.
40-bit encryption refers to a key size of forty bits, or five bytes, for symmetric encryption; this represents a relatively low level of security.
In computing, 56-bit encryption refers to a key size of fifty-six bits, or seven bytes, for symmetric encryption.