Примеры использования Block ciphers на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
One-way compression functions are often built from block ciphers.
GCM is defined for block ciphers with a block size of 128 bits.
There are two major types of symmetric encryption: Block ciphers and stream ciphers. .
For block ciphers, the use of an IV is described by the modes of operation.
The Speck and Simon light-weight Block ciphers, published in 2013.
As the name implies, block ciphers operate by encrypting in byte-sized blocks using the same key.
In cryptography, Hierocrypt-L1 and Hierocrypt-3 are block ciphers created by Toshiba in 2000.
As a result of the works, Block ciphers family was created which is currently widely used across the globe.
In cryptography, impossible differential cryptanalysis is a form of differential cryptanalysis for block ciphers.
In total, there are three block ciphers that AES is comprised of AES-128, AES-192 and AES-256.
Together with Eli Biham, he discovered differential cryptanalysis,a general method for attacking block ciphers.
It would be possible to define sector-wide block ciphers, unfortunately with degraded performance see below.
Block ciphers operate as important elementary components in the design of many cryptographic protocols, and are widely used to implement encryption of bulk data.
The authors have stated that,"LOKI97 is a non-proprietary algorithm, available for royalty-free use worldwide as a possible replacement for the DES orother existing block ciphers.
The most common block ciphers you will come across are AES and Blowfish, the former of which is often used in ransomware encryption.
A flaw was found in the way SSL 3.0 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining(CBC) mode.
NOEKEON/ˈnuːki. ɒn/ is a family of two block ciphers designed by Joan Daemen, Michaël Peeters, Gilles Van Assche and Vincent Rijmen and submitted to the NESSIE project in September 2000.
Paulo S. L. M. Barreto(born 1965) is a Brazilian cryptographer and one of the designers of the Whirlpool hash function and the block ciphers Anubis and KHAZAD, together with Vincent Rijmen.
As with all block ciphers, encryption and decryption of multiple blocks of data may be performed using a variety of modes of operation, which can generally be defined independently of the block cipher algorithm.
Galois/Counter Mode(GCM) is a mode of operation for symmetric key cryptographic block ciphers that has been widely adopted because of its efficiency and performance.
The publication contains the specification for three allegedly cryptographically secure pseudorandom number generators for use in cryptography: Hash_DRBG(based on hash functions),HMAC_DRBG(Based on Hash-based message authentication code), and CTR_DRBG based on block ciphers in counter mode.
His research includes the design andanalysis of stream and block ciphers and efficient hardware implementations of them; he participated in the design of CAST-256 and has published cryptanalyses of such block ciphers as RC5 and CIKS-1.
The considerations already listed make several well-known chaining modes unsuitable: ECB mode, which cannot be tweaked, andmodes that turn block ciphers into stream ciphers, such as the CTR mode.
Any time/ memory/ data tradeoff attack has the following parameters: N{\ displaystyle N} search space size P{\ displaystyle P} time required for the preprocessing phase T{\ displaystyle T} time required for the realtime phase M{\ displaystyle M} amount of memory available to the attacker D{\ displaystyle D}amount of realtime data available to the attacker For block ciphers, N{\ displaystyle N} is the total number of possible keys and also assume the number of possible plaintexts and ciphertexts to be N{\ displaystyle N.
Block cipher: symmetric encryption in blocks of bytes.
The block cipher process 64 bits blocks in 56 rounds.
Consider a hash function which uses an AES-like substitution-permutation block cipher as its compression function.
There are many different AES block cipher modes that are part of the AES specification.
In this mode, a block cipher is not an FPE.
To encrypt anything larger than 128 bits, AES uses a block cipher mode.