This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Ciphertext expansion" – news · newspapers · books · scholar · JSTOR(July 2022) (Learn how and when to remove this message)
This article relies largely or entirely on a single source. Relevant discussion may be found on the talk page. Please help improve this article by introducing citations to additional sources. Find sources: "Ciphertext expansion" – news · newspapers · books · scholar · JSTOR(April 2024)
In cryptography, the term ciphertext expansion[1] refers to the length increase of a message when it is encrypted. Many modern cryptosystems cause some degree of expansion during the encryption process, for instance when the resulting ciphertext must include a message-unique Initialization Vector (IV). Probabilistic encryption schemes cause ciphertext expansion, as the set of possible ciphertexts is necessarily greater than the set of input plaintexts. Certain schemes, such as Cocks Identity Based Encryption, or the Goldwasser-Micali cryptosystem result in ciphertexts hundreds or thousands of times longer than the plaintext.
Ciphertext expansion may be offset or increased by other processes which compress or expand the message, e.g., data compression or error correction coding.
^Jain, V.K. Cryptography and Network Security. Khanna Book Publishing Co. p. 108. ISBN 9789380016801.
and 21 Related for: Ciphertext expansion information
term ciphertextexpansion refers to the length increase of a message when it is encrypted. Many modern cryptosystems cause some degree of expansion during...
blocks without resulting in any expansion of the ciphertext, at the cost of slightly increased complexity. Ciphertext stealing is a technique for encrypting...
number of equivalents. However, this is at the cost of a very large ciphertextexpansion.[original research?] A famous use of a book cipher is in the Beale...
scheme is not widely used in practice due to its high degree of ciphertextexpansion. However, it is currently one of the few IBE schemes which do not...
possible ciphertexts, with the consequence that a general ElGamal encryption produces a 1:2 expansion in size from plaintext to ciphertext. Encryption...
with the corresponding digit of the keystream, to give a digit of the ciphertext stream. Since encryption of each digit is dependent on the current state...
first converting it into an unreadable form ("ciphertext") using an encryption algorithm. The ciphertext is sent through an insecure channel to the recipient...
a string C of n bits. P is called the plaintext, and C is termed the ciphertext. For each K, the function EK(P) is required to be an invertible mapping...
the same message several times it will, in general, yield different ciphertexts. The term "probabilistic encryption" is typically used in reference to...
and the ciphertext difficult to understand (see Shannon's property of confusion). P-boxes are typically classified as compression, expansion, and straight...
the ciphertext, and combining the same key with the ciphertext regenerates the plaintext. Symbolically: Plaintext ⊕ Key = Ciphertext and Ciphertext ⊕ Key...
converting readable information (plaintext) to unintelligible nonsense text (ciphertext), which can only be read by reversing the process (decryption). The sender...
= ((A ^ B) <<< B) + S[2 * i] B = ((B ^ A) <<< A) + S[2 * i + 1] # The ciphertext block consists of the two-word wide block composed of A and B, in that...
another row as the ciphertext. To decrypt the message, the decrypter rotates the disks on his cylinder to produce the ciphertext along a row. Decryption...
stream of key characters using the XOR Boolean function to produce the ciphertext. In August 1941, a blunder by German operators led to the transmission...
rounds are applied to transform ciphertext back into the original plaintext using the same encryption key. KeyExpansion – round keys are derived from the...
shared random pad, and another transparency acts as the ciphertext. Normally, there is an expansion of space requirement in visual cryptography. But if one...
channel is not fully loaded, there is a good likelihood that one of the ciphertext streams will be just nulls. The NSA goes to great lengths to prevent keys...
XTS-Advanced Encryption Standard (XEX-based Tweaked CodeBook mode (TCB) with ciphertext stealing (CTS); the proper name should be XTC (XEX TCB CTS), but that...