Global Information Lookup Global Information

Hasty Pudding cipher information


Hasty Pudding Cipher
General
DesignersRichard Schroeppel
First publishedJune 1998
Cipher detail
Key sizesVariable
Block sizesVariable

The Hasty Pudding cipher (HPC) is a variable-block-size block cipher designed by Richard Schroeppel, which was an unsuccessful candidate in the competition for selecting the U.S. Advanced Encryption Standard (AES). It has a number of unusual properties for a block cipher: its input block size and key length are variable, and it includes an additional input parameter called the "spice" for use as a secondary, non-secret key. The Hasty Pudding cipher was the only AES candidate designed exclusively by U.S. cryptographers.[1][2]

The Hasty Pudding cipher is in the public domain.[3]

  1. ^ Eli Biham, A Note on Comparing the AES Candidates, April 1999, public comment on AES.
  2. ^ Susan Landau, Communications Security for the Twenty-first Century: The Advanced Encryption Standard, Notices of the AMS, vol. 47, number 4, 2000.
  3. ^ Cite error: The named reference hpc-overview was invoked but never defined (see the help page).

and 17 Related for: Hasty Pudding cipher information

Request time (Page generated in 1.3911 seconds.)

Hasty Pudding cipher

Last Update:

The Hasty Pudding cipher (HPC) is a variable-block-size block cipher designed by Richard Schroeppel, which was an unsuccessful candidate in the competition...

Word Count : 1304

Advanced Encryption Standard

Last Update:

Standards and Technology (NIST) in 2001. AES is a variant of the Rijndael block cipher developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen...

Word Count : 5609

Block cipher mode of operation

Last Update:

In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or...

Word Count : 5906

Cryptography

Last Update:

plaintext. A cipher (or cypher) is a pair of algorithms that carry out the encryption and the reversing decryption. The detailed operation of a cipher is controlled...

Word Count : 10726

Block cipher

Last Update:

cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks. Block ciphers are the elementary building...

Word Count : 6475

Feistel cipher

Last Update:

cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the...

Word Count : 1316

Initialization vector

Last Update:

between (potentially similar) segments of the encrypted message. For block ciphers, the use of an IV is described by the modes of operation. Some cryptographic...

Word Count : 1779

Product cipher

Last Update:

In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the individual...

Word Count : 278

International Data Encryption Algorithm

Last Update:

Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described...

Word Count : 1499

CRYPTREC

Last Update:

"e-Government Recommended Ciphers List", "Candidate Recommended Ciphers List", and "Monitored Ciphers List". Most of the Japanese ciphers listed in the previous...

Word Count : 974

RC2

Last Update:

is a symmetric-key block cipher designed by Ron Rivest in 1987. "RC" stands for "Ron's Code" or "Rivest Cipher"; other ciphers designed by Rivest include...

Word Count : 423

Boomerang attack

Last Update:

block ciphers based on differential cryptanalysis. The attack was published in 1999 by David Wagner, who used it to break the COCONUT98 cipher. The boomerang...

Word Count : 864

XSL attack

Last Update:

Sparse Linearization (XSL) attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002 by researchers Nicolas Courtois...

Word Count : 1777

Weak key

Last Update:

cryptography, a weak key is a key, which, used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually represent a very...

Word Count : 1304

Key schedule

Last Update:

In cryptography, the so-called product ciphers are a certain kind of cipher, where the (de-)ciphering of data is typically done as an iteration of rounds...

Word Count : 402

RC5

Last Update:

is a symmetric-key block cipher notable for its simplicity. Designed by Ronald Rivest in 1994, RC stands for "Rivest Cipher", or alternatively, "Ron's...

Word Count : 1461

Triple DES

Last Update:

Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The 56-bit key...

Word Count : 2946

PDF Search Engine © AllGlobal.net