Приклади вживання Block cipher Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Symmetric Block Cipher Algorithms.
Hash functions based on block ciphers.
However, modern block ciphers are only partially one-way.
Dq, each of length n, suitable for the block cipher.
For block ciphers, it is generally the cipher's block size.
RC6 is a symmetric block cipher derived from RC5.
A standard block cipher such as Advanced Encryption Standard AES can be used in place of these custom block ciphers;
Blowfish is a symmetric 64-bit block cipher with a variable-length key.
A standard block cipher such as AES can be used in place of these custom block ciphers;
The Speck and Simon light-weight Block ciphers, published in 2013.
RC5 is a fast block cipher designed by Rivest for RSA Data Security.
They are the modes of operation andmust be carefully considered when using a block cipher in a cryptosystem.
Commercial code(communications) Block cipher modes of operation The Code Book.
A block cipher works on units of a fixed size(known as a block size), but messages come in a variety of lengths.
CFB- Cipher Feedback(CFB) mode, a close relative of CBC, makes a block cipher into a self-synchronizing stream cipher. .
Thus, to turn a block cipher into a one-way compression function some extra operations have to be added.
Also, many hash functions(including SHA-1 and SHA-2)are built by using a special-purpose block cipher in a Davies- Meyer or other construction.
Rijndael is an iterated block cipher with a variable block length and a variable key length.
An SP-network, or substitution-permutation network(SPN),is a series of linked mathematical operations used in block cipher algorithms such as AES.
(When the block cipher is DES, this is equivalent to the algorithm specified in FIPS PUB 113 Computer Data Authentication.[2]).
In cryptography, a cipher block chaining message authentication code(CBC-MAC)is a technique for constructing a message authentication code from a block cipher.
If the same block cipher uses a block size of 128 bits then the input and output hash values in each round is 128 bits.
Paulo S. L. M. Barreto(born 1965) is a Brazilian cryptographer andone of the designers of the Whirlpool hash function and the block ciphers Anubis and KHAZAD, together with Vincent Rijmen.
If the block cipher used is secure(meaning that it is a pseudorandom permutation), then CBC-MAC is secure for fixed-length messages.
ISO/IEC 9797-1 Information technology- Security techniques- Message Authentication Codes(MACs)- Part 1:Mechanisms using a block cipher[1] is an international standard that defines methods for calculating a message authentication code(MAC) over data.
If the block cipher has different block and key sizes the hash value(Hi-1) will have the wrong size for use as the key.
The Data Encryption Standard(DES) and the Advanced Encryption Standard(AES) are block cipher designs which have been designated cryptography standards by the US government(though DES's designation was finally withdrawn after the AES was adopted).
Only one key is required, K.(When the block cipher is DES, this is equivalent to the algorithm specified in FIPS PUB 113 Computer Data Authentication.).
However, because the plaintext orciphertext is only used for the final XOR, the block cipher operations may be performed in advance, allowing the final step to be performed in parallel once the plaintext or ciphertext is available.