Back to Results
First PageMeta Content
Block cipher / DES-X / Differential cryptanalysis / S-box / Key size / Triple DES / Key schedule / Advanced Encryption Standard / Advantage / Cryptography / Data Encryption Standard / ICE


Chapter 2 Block Ciphers Blockciphers are the central tool in the design of protocols for shared-key cryptography (aka. symmetric) cryptography. They are the main available “technology” we have at our disposal. This c
Add to Reading List

Document Date: 2009-09-20 20:41:13


Open Document

File Size: 180,60 KB

Share Result on Facebook

Company

IBM / the AES / /

Currency

USD / /

Facility

American National Standards Institute / National Institute of Standards and Technology / /

IndustryTerm

exhaustive key-search take / exhaustive search take / slow-down software implementations / exhaustive key search attack / software implementations / well-engineered algorithm / search machine / exhaustive key search / public specified algorithm / specialpurpose hardware / exhaustive search / search space / encryption algorithm / above-discussed key-search engines / /

Organization

National Institute of Standards and Technology / National Bureau of Standards / American Bankers Association / American National Standards Institute / ConsE / Electronic Frontier Foundation / /

Person

Don Coppersmith / Horst Feistel / /

Technology

Encryption / 2.2 Construction The DES algorithm / cryptography / 8 BLOCK CIPHERS algorithm / VLSI chip / encryption algorithm / 57 / 000 chips / public specified algorithm / remarkably well-engineered algorithm / ATM / weak algorithm / 2.2 Data Encryption / KeySchedule algorithm / /

SocialTag