Global Information Lookup Global Information

Ciphertext expansion information


In cryptography, the term ciphertext expansion[1] refers to the length increase of a message when it is encrypted. Many modern cryptosystems cause some degree of expansion during the encryption process, for instance when the resulting ciphertext must include a message-unique Initialization Vector (IV). Probabilistic encryption schemes cause ciphertext expansion, as the set of possible ciphertexts is necessarily greater than the set of input plaintexts. Certain schemes, such as Cocks Identity Based Encryption, or the Goldwasser-Micali cryptosystem result in ciphertexts hundreds or thousands of times longer than the plaintext.

Ciphertext expansion may be offset or increased by other processes which compress or expand the message, e.g., data compression or error correction coding.

  1. ^ Jain, V.K. Cryptography and Network Security. Khanna Book Publishing Co. p. 108. ISBN 9789380016801.

and 21 Related for: Ciphertext expansion information

Request time (Page generated in 0.8361 seconds.)

Ciphertext expansion

Last Update:

term ciphertext expansion refers to the length increase of a message when it is encrypted. Many modern cryptosystems cause some degree of expansion during...

Word Count : 132

Ciphertext stealing

Last Update:

blocks without resulting in any expansion of the ciphertext, at the cost of slightly increased complexity. Ciphertext stealing is a technique for encrypting...

Word Count : 2269

Book cipher

Last Update:

number of equivalents. However, this is at the cost of a very large ciphertext expansion.[original research?] A famous use of a book cipher is in the Beale...

Word Count : 1960

Clifford Cocks

Last Update:

scheme is not widely used in practice due to its high degree of ciphertext expansion. However, it is currently one of the few IBE schemes which do not...

Word Count : 1034

ElGamal encryption

Last Update:

possible ciphertexts, with the consequence that a general ElGamal encryption produces a 1:2 expansion in size from plaintext to ciphertext. Encryption...

Word Count : 1476

Index of cryptography articles

Last Update:

Acoustic cryptanalysis • Adaptive chosen-ciphertext attack • Adaptive chosen plaintext and chosen ciphertext attack • Advantage (cryptography) • ADFGVX...

Word Count : 2933

Stream cipher

Last Update:

with the corresponding digit of the keystream, to give a digit of the ciphertext stream. Since encryption of each digit is dependent on the current state...

Word Count : 2217

Cryptanalysis

Last Update:

first converting it into an unreadable form ("ciphertext") using an encryption algorithm. The ciphertext is sent through an insecure channel to the recipient...

Word Count : 5178

Block cipher

Last Update:

a string C of n bits. P is called the plaintext, and C is termed the ciphertext. For each K, the function EK(P) is required to be an invertible mapping...

Word Count : 6475

Probabilistic encryption

Last Update:

the same message several times it will, in general, yield different ciphertexts. The term "probabilistic encryption" is typically used in reference to...

Word Count : 583

Permutation box

Last Update:

and the ciphertext difficult to understand (see Shannon's property of confusion). P-boxes are typically classified as compression, expansion, and straight...

Word Count : 118

Cryptanalysis of the Lorenz cipher

Last Update:

the ciphertext, and combining the same key with the ciphertext regenerates the plaintext. Symbolically: Plaintext ⊕ Key = Ciphertext and Ciphertext ⊕ Key...

Word Count : 8714

Cryptography

Last Update:

converting readable information (plaintext) to unintelligible nonsense text (ciphertext), which can only be read by reversing the process (decryption). The sender...

Word Count : 10712

RC5

Last Update:

= ((A ^ B) <<< B) + S[2 * i] B = ((B ^ A) <<< A) + S[2 * i + 1] # The ciphertext block consists of the two-word wide block composed of A and B, in that...

Word Count : 1461

Key stretching

Last Update:

now, decrypt later Information-theoretic security Plaintext Codetext Ciphertext Shared secret Trapdoor function Trusted timestamping Key-based routing...

Word Count : 1782

Jefferson disk

Last Update:

another row as the ciphertext. To decrypt the message, the decrypter rotates the disks on his cylinder to produce the ciphertext along a row. Decryption...

Word Count : 1596

Colossus computer

Last Update:

stream of key characters using the XOR Boolean function to produce the ciphertext. In August 1941, a blunder by German operators led to the transmission...

Word Count : 7148

Advanced Encryption Standard

Last Update:

rounds are applied to transform ciphertext back into the original plaintext using the same encryption key. KeyExpansion – round keys are derived from the...

Word Count : 5609

Visual cryptography

Last Update:

shared random pad, and another transparency acts as the ciphertext. Normally, there is an expansion of space requirement in visual cryptography. But if one...

Word Count : 1301

Stream cipher attacks

Last Update:

channel is not fully loaded, there is a good likelihood that one of the ciphertext streams will be just nulls. The NSA goes to great lengths to prevent keys...

Word Count : 1029

IEEE P1619

Last Update:

XTS-Advanced Encryption Standard (XEX-based Tweaked CodeBook mode (TCB) with ciphertext stealing (CTS); the proper name should be XTC (XEX TCB CTS), but that...

Word Count : 828

PDF Search Engine © AllGlobal.net