This article is about the configuration option in modern communication systems. For the classical encryption method, see Null cipher.
In modern cryptography, null encryption (or selecting null cipher or NONE cipher) is choosing not to use encryption in a system where various encryption options are offered. When this option is used, the text is the same before and after encryption, which can be practical for testing/debugging, or authentication-only communication. In mathematics such a function is known as the identity function.
Examples of this are the "eNULL" and "aNULL" cipher suite in OpenSSL,[1] and the "NULL Encryption Algorithm" in IPSec.[2]
^"ciphers - SSL cipher display and cipher list tool". OpenSSL. Retrieved 2014-12-10.
^RFC 2410 - The NULL Encryption Algorithm and Its Use With IPsec
cryptography, nullencryption (or selecting null cipher or NONE cipher) is choosing not to use encryption in a system where various encryption options are...
A null cipher, also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material...
of a type conversion function labeled as a "null function": _NULLF - null function. The NULLEncryption Algorithm and Its Use With IPsec. IETF. November...
RFC 2405: The ESP DES-CBC Cipher Algorithm With Explicit IV RFC 2410: The NULLEncryption Algorithm and Its Use With IPsec RFC 2451: The ESP CBC-Mode Cipher...
require that the final block be padded before encryption. Several padding schemes exist. The simplest is to add null bytes to the plaintext to bring its length...
Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in...
block is multiplied by the inverse of the matrix used for encryption. The matrix used for encryption is the cipher key, and it should be chosen randomly from...
requiring encryption), PS is a byte string of k − m L e n − 2 ⋅ h L e n − 2 {\displaystyle k-\mathrm {mLen} -2\cdot \mathrm {hLen} -2} null-bytes. ⊕ is...
Key management Key stream KSD-64 Link encryption MISTY1 Multiplex link encryption Net control station (NCS) Null cipher One-time pad Over the Air Rekeying...
The small letter a resulting from the encipherment of the number 2 is a null and must be discarded in the decipherment. After enciphering a few letters...
transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (transposition) without changing...
plaintext blocks of 16 bytes. Encryption of shorter blocks is possible only by padding the source bytes, usually with null bytes. This can be accomplished...
The Linux Unified Key Setup (LUKS) is a disk encryption specification created by Clemens Fruhwirth in 2004 and originally intended for Linux. LUKS implements...
cryptographic security, and is often cited as a canonical example of weak encryption. ROT13 was used in online forums as a means of hiding spoilers, punchlines...
"Panel at East end of Chapel slides". A dot or pinprick null cipher is a common classical encryption method in which dot or pinprick is placed above or below...
of transposition cipher. It derives its name from the manner in which encryption is performed, in analogy to a fence built with horizontal rails. In the...
key. If multiple collating orders are available, which one was used in encryption can be used as a key, but this does not provide significantly more security...
positions, although it did not move during encryption. In the Abwehr Enigma, the reflector stepped during encryption in a manner similar to the other wheels...
Opportunistic Encryption with IPsec. Version 3.16, which was released in December 2015, had support for Opportunistic IPsec using AUTH-NULL which is based...
then uses this state to perform a block encryption using part of the key, and uses the result of that encryption (which is more accurate at hashing) to...
"polybius cipher" would lead to the reordered square below. There are several encryption methods using the Polybius square. Three of them are described below....
of Signal Messenger LLC. He is also a co-author of the Signal Protocol encryption used by Signal, WhatsApp, Google Messages, Facebook Messenger, and Skype...