 Articles
594 results

ElGamal signature scheme
The ElGamal signature scheme is a digital signature scheme which is based on the difficulty of computing discrete logarithms. It was described by Taher ElGamal in 1984. The ElGamal signature algorithm described in this article 
Confusion and diffusion
Template:Refimprove In cryptography, confusion and diffusion are two properties of the operation of a secure cipher which were identified by Claude Shannon in his paper Communication Theory of Secrecy Systems, published in 1949. In 
SHA1
Template:Infobox cryptographic hash function In cryptography, SHA1 is a cryptographic hash function designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA 
MD5
Template:Infobox cryptographic hash function In cryptography, MD5 (MessageDigest algorithm 5) is a widely used cryptographic hash function with a 128bit hash value. Specified in RFC 1321, MD5 has been employed in a 
Linear feedback shift register
Template:Redirect Template:Refimprove Template:No footnotes A linear feedback shift register (LFSR) is a shift register whose input bit is a linear function of its previous state. 
Cryptographic hash function
A cryptographic hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixedsize bit string, the (cryptographic) hash value, such that an accidental or intentional change to the 
Vigenère cipher
The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution. The Vigenère 
Block cipher modes of operation
In cryptography, modes of operation enable the repeated and secure use of a block cipher under a single key. A block cipher by itself allows encryption only of a single data block of the cipher 
Advanced Encryption Standard
Template:Infobox block cipher The Advanced Encryption Standard (AES) is a symmetrickey encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES128, AES192 and AES256, adopted 
Cryptography
Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or λογία, logia, respectively) is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and 
Diffie–Hellman key exchange
Diffie–Hellman key exchange (D–H) is a specific method of exchanging keys. It is one of the earliest practical examples of Key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange 
Playfair cipher
Template:Refimprove The Playfair cipher or Playfair square is a manual symmetric encryption technique and was the first literal digraph substitution cipher. The scheme was invented in 1854 by Charles Wheatstone, but bears the name 
Caesar cipher
Template:Featured article Template:Infobox block cipher In cryptography, a Caesar cipher, also known as a Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most 
Ciphertext stealing
Template:No footnotes In cryptography, ciphertext stealing (CTS) is a general method of using a block cipher mode of operation that allows for processing of messages that are not evenly divisible into blocks without resulting 
Commitment scheme
Template:Confusing In cryptography, a commitment scheme allows one to commit to a value while keeping it hidden, with the ability to reveal the committed value later. Commitments are used to bind a party to 
AES implementations
There are various implementations of the Advanced Encryption Standard, also known as Rijndael. Template:External links 
Cryptographically secure pseudorandom number generator
A cryptographically secure pseudorandom number generator (CSPRNG) is a pseudorandom number generator (PRNG) with properties that make it suitable for use in cryptography. The "quality" of the randomness required for these applications varies 
Autokey cipher
An autokey cipher (also known as the autoclave cipher) is a cipher which incorporates the message (the plaintext) into the key. There are two forms of autokey cipher: key autokey and text autokey ciphers. A 
Feistel cipher
In cryptography, a Feistel cipher is a symmetric structure used in the construction of block ciphers, named after the Germanborn physicist and cryptographer Horst Feistel who did pioneering research while working for IBM (USA 
Primality test
A primality test is an algorithm for determining whether an input number is prime. Amongst other fields of mathematics, it is used for cryptography. Unlike integer factorization, primality tests do not generally give prime factors 
Pigpen cipher
The pigpen cipher (sometimes referred to as the masonic cipher, Freemason's cipher, or Rosicrucian cipher) is a geometric simple substitution cipher which exchanges letters for symbols which are fragments of a grid. The example 
Galois/Counter Mode
GCM mode (Galois/Counter Mode) is a mode of operation for symmetric key cryptographic block ciphers. It is an authenticated encryption algorithm designed to provide both authentication and secrecy. GCM mode is defined for block 
Rijndael mix columns
The MixColumns operation performed by the Rijndael cipher, along with the shiftrows step, is the primary source of diffusion in Rijndael. Each column is treated as a polynomial over GF(2) and is then 
Rabin cryptosystem
The Rabin cryptosystem is an asymmetric cryptographic technique, whose security, like that of RSA, is related to the difficulty of factorization. However the Rabin cryptosystem has the advantage that the problem on which it relies 
Padding (cryptography)
Template:Refimprove In cryptography, padding refers to a number of distinct practices. Official messages often start and end in predictable ways: My dear ambassador, Weather report, Sincerely yours, etc. The primary use of padding with
Related Community
Marvel Database
comics
200K
Pages200K
Images1K
Videos
With more than 200,000 articles, the Marvel Database is the largest Marvel Comics encyclopedia ever written, as well as being the 5th largest FANDOM wiki. The database covers comics, characters, teams, games, TV shows and movies. Browse one of over…