Global Information Lookup Global Information

Product cipher information


In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the individual components to make it resistant to cryptanalysis.[1] The product cipher combines a sequence of simple transformations such as substitution (S-box), permutation (P-box), and modular arithmetic. The concept of product ciphers is due to Claude Shannon, who presented the idea in his foundational paper, Communication Theory of Secrecy Systems. A particular product cipher design where all the constituting transformation functions have the same structure is called an iterative cipher with the term "rounds" applied to the functions themselves.[2]

For transformation involving reasonable number of n message symbols, both of the foregoing cipher systems (the S-box and P-box) are by themselves wanting. Shannon suggested using a combination of S-box and P-box transformation—a product cipher. The combination could yield a cipher system more powerful than either one alone. This approach of alternatively applying substitution and permutation transformation has been used by IBM in the Lucifer cipher system, and has become the standard for national data encryption standards such as the Data Encryption Standard and the Advanced Encryption Standard. A product cipher that uses only substitutions and permutations is called a SP-network. Feistel ciphers are an important class of product ciphers.

  1. ^ Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. Fifth Printing (August 2001) page 251.
  2. ^ Biryukov 2005.

and 19 Related for: Product cipher information

Request time (Page generated in 1.2441 seconds.)

Product cipher

Last Update:

In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the individual...

Word Count : 278

Block cipher

Last Update:

cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks. Block ciphers are the elementary building...

Word Count : 6475

Block cipher mode of operation

Last Update:

In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or...

Word Count : 5878

Advanced Encryption Standard

Last Update:

Standards and Technology (NIST) in 2001. AES is a variant of the Rijndael block cipher developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen...

Word Count : 5609

Key schedule

Last Update:

In cryptography, the so-called product ciphers are a certain kind of cipher, where the (de-)ciphering of data is typically done as an iteration of rounds...

Word Count : 402

Avalanche effect

Last Update:

takes advantage of the butterfly effect. This is why most block ciphers are product ciphers. It is also why hash functions have large data blocks. Both of...

Word Count : 568

Feistel cipher

Last Update:

cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the...

Word Count : 1316

Classical cipher

Last Update:

In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern...

Word Count : 2528

Cipher Data Products

Last Update:

Cipher Data Products, Inc., was an American computer company based in San Diego, California, and active from 1968 to 1992. The company was once a leading...

Word Count : 2339

Cryptography

Last Update:

plaintext. A cipher (or cypher) is a pair of algorithms that carry out the encryption and the reversing decryption. The detailed operation of a cipher is controlled...

Word Count : 10712

Outline of cryptography

Last Update:

Caesar cipher ROT13 Affine cipher Atbash cipher Keyword cipher Polyalphabetic substitution Vigenère cipher Autokey cipher Homophonic substitution cipher Polygraphic...

Word Count : 1876

SAFER

Last Update:

(Secure And Fast Encryption Routine) is the name of a family of block ciphers designed primarily by James Massey (one of the designers of IDEA) on behalf...

Word Count : 838

MISTY1

Last Update:

In cryptography, MISTY1 (or MISTY-1) is a block cipher designed in 1995 by Mitsuru Matsui and others for Mitsubishi Electric. MISTY1 is one of the selected...

Word Count : 455

KASUMI

Last Update:

KASUMI is a block cipher used in UMTS, GSM, and GPRS mobile communications systems. In UMTS, KASUMI is used in the confidentiality (f8) and integrity algorithms...

Word Count : 2555

CRYPTREC

Last Update:

"Recommended Ciphers" is not that these ciphers are necessarily unsafe, but that these ciphers are not widely used in commercial products, open-source...

Word Count : 974

International Data Encryption Algorithm

Last Update:

Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described...

Word Count : 1499

RC6

Last Update:

In cryptography, RC6 (Rivest cipher 6) is a symmetric key block cipher derived from RC5. It was designed by Ron Rivest, Matt Robshaw, Ray Sidney, and...

Word Count : 714

KHAZAD

Last Update:

In cryptography, KHAZAD /xɑːˈzɑːd/ is a block cipher designed by Paulo S. L. M. Barreto together with Vincent Rijmen, one of the designers of the Advanced...

Word Count : 291

SHARK

Last Update:

In cryptography, SHARK is a block cipher identified as one of the predecessors of Rijndael (the Advanced Encryption Standard). SHARK has a 64-bit block...

Word Count : 224

PDF Search Engine © AllGlobal.net