Search results
Jump to navigation
Jump to search
- '''ZUC''' is a stream [[cipher]] included in the [[Long Term Evolution]] standards used in 3GPP s [[Category:Stream ciphers]] ...1 KB (174 words) - 08:10, 14 February 2024
- ...he other one or two. This type of attack is very difficult, so most of the ciphers and encryption schemes in use were not designed to resist it.{{Citation nee ...18 May 1995</ref><ref name="golic">Golic, J., "Cryptanalysis of Alleged A5 Stream Cipher" Lecture Notes in Computer Science, Advances in Cryptology – EUROCRY ...13 KB (2,300 words) - 20:11, 18 February 2025
- {{Short description|Stream cipher}} The '''Grain 128a''' [[stream cipher]] was first purposed at Symmetric Key Encryption Workshop (SKEW) in ...6 KB (1,068 words) - 20:17, 30 March 2024
- ...andom permutation]] that can be used to construct a [[hash function]] or [[stream cipher]] by using it in a [[sponge construction]].<ref name="spec">{{cite w {{Cryptography navbox | stream}} ...5 KB (655 words) - 10:56, 27 November 2024
- ...in the [[cryptanalysis]] of the [[summation generator|summation combiner]] stream cipher (the reason Goresky and Klapper invented them<ref name="FCSR1" />), ...ime complexity. It follows that, as with LFSRs and linear complexity, any stream cipher whose ''N''-adic complexity is low should not be used for cryptograp ...8 KB (1,224 words) - 03:18, 5 July 2023
- ...While some Boolean functions are vulnerable to correlation attacks, stream ciphers generated using such functions are not inherently insecure. ...lain text <math>p_1, p_2, p_3, \ldots</math> which has been encrypted by a stream cipher using a Geffe generator as its keystream generator, i.e. <math>c_i = ...15 KB (2,286 words) - 17:22, 16 February 2025
- ...sh]]es, [[message authentication codes]], [[mask generation function]]s, [[stream cipher]]s, [[pseudo-random number generator]]s, and [[authenticated encrypt | title=Spritz – a spongy RC4-like stream cipher and hash function ...7 KB (988 words) - 02:38, 6 February 2025
- ...the [[Lorenz cipher|SZ40 and SZ42]] teleprinter [[Rotor machine|rotor]] [[stream cipher]] machines, one of the [[Germans]]' ''Geheimschreiber'' (secret writ ...], allowed the derivation of that key. Turingery was applied to such a key stream to derive the cam settings.<ref>{{Harvnb|Copeland|2006| p=381 }}</ref> ...18 KB (2,596 words) - 07:11, 19 February 2025
- ...vertible S-box cannot be constructed directly from bent functions, and a [[stream cipher]] using a bent combining function is vulnerable to a [[correlation a ...valence class]]es of bent functions on six variables.<ref name=haval/> The stream cipher [[Grain (cipher)|Grain]] uses an [[NLFSR]] whose nonlinear feedback ...23 KB (3,243 words) - 01:09, 14 November 2024
- ...ed Kingdom]] withheld export licenses from exporters unless they used weak ciphers or short keys, and generally discouraged practical public cryptography.<ref '''[[A5/1]]''' is a [[stream cipher]] used to provide over-the-air communication [[privacy]] in the [[Gl ...37 KB (5,170 words) - 07:12, 18 February 2025
- ...Ratcliff: Delusions of Intelligence: Enigma, Ultra, and the End of Secure Ciphers. Oct 2006, p 36</ref><ref>John Ferris: Intelligence and Strategy: Selected ...Ratcliff: Delusions of Intelligence: Enigma, Ultra, and the End of Secure Ciphers. Oct 2006, p. 38-40</ref> ...132 KB (20,397 words) - 23:35, 17 November 2024
- ...the [[Lorenz cipher|Lorenz SZ]] [[teleprinter]] [[Rotor machine|rotor]] [[stream cipher]] attachments. Decrypts of this traffic became an important source o ...ting)|character]] using various online ''Geheimschreiber'' (secret writer) stream cipher machines at both ends of a [[Electrical telegraph|telegraph]] link u ...81 KB (11,914 words) - 23:26, 8 December 2024
- ...7 (saying "extras" may be standardized in the future).</ref> and [[AEAD]] ciphers Keyak and Ketje.<ref name="ketje">{{Cite web|url=https://competitions.cr.yp ...52 KB (7,730 words) - 18:17, 7 February 2025