encryption

(redirected from Cipher algorithm)
Also found in: Dictionary, Thesaurus, Financial, Encyclopedia.
Related to Cipher algorithm: ciphered

en·cryp·tion

(en-krip'shŭn)
The scrambling of electronic information being stored and sent so that if someone wrongly receives such information it will not be readable.
References in periodicals archive ?
RC4 is a symmetric stream cipher algorithm of variable key developed by Ron Rivest for RSA in 1987.
Qinghai, "The scheme for improving the efficiency of block cipher algorithm," in Proceedings of the 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA), pp.
The RC4 design avoids the use of Linear Feedback Shift Registers (LFSRs), while many stream cipher algorithms depend on it, especially in the hardware.
Modules Algorithms {Block cipher algorithm: AES, Blowfish, DES, Symmetric Algorithm Triple DES, Serpent, Twofish, Camellia, CAST-128, IDEA, RC2, RC5, SEED, Skipjack TEA XTEA} {Stream cipher algorithm: RC4} Hash Algorithm GOST, HAVAL, MD2, MD4, MD5, PANAMA, RadioGatun, RIPEMD, RIPEMD-160, RIPEMD-128, RIPEMD-320, SHA-0, SHA-1, SHA-2, SHA-3, Tiger, WHIRLPOOL Asymmetric Encryption RSA, ElGamal, Rabin, ECC Algorithm Signing Algorithm RSA, ElGamal, DSA, ECDSA, GMR, Schnorr Key Negotiation Algorithm DH, SRP, EKE, J-PAKE Message Authentication HMAC, CMAC, GMAC, DAA Algorithm Key Generation Algorithms PBKDF2, KDF Table 4.
Clearly the quantum linear feedback shift register is essential in building the quantum stream cipher algorithm. The quantum feedback shift register represents the outputs of the quantum CNOT function and is positioned in the final state (qubit) of quantum register.
As a result of this application, when the cipher algorithm was applied, in 10,000 attempts, the average implementation time was approximately 0.078 seconds longer than when it was not applied (refer to Table 1).
The basic idea in suggesting a method to solve the problem in privacy protection which is referred to in Section 2 is to encrypt information by using block cipher algorithms (e.g., AES, Blowfish, etc.), which is commonly known as a field which includes patient ID.
Tokyo, Jan 26, 2012 - (JCN Newswire) - Sony Corporation has been working to standardize 'CLEFIA,' the block cipher algorithm it developed and presented as a state-of-the-art cryptography technique in 2007, and announced today that after final ISO/IEC(1) approval, 'CLEFIA' was adopted as one of the ISO/IEC 29192(20 International Standards in lightweight cryptography.
A cipher is used for the encryption and decryption process and, in many cases, a "key" is used to modify the cipher algorithm. Having the correct key will allow the algorithm to function properly.
Stream cipher algorithm is responsible for generating a cryptographically strong keystream to perform encryption operations on a given plaintext.
From practical point of view, the Vernam cipher algorithm needs: (a) a pure randomness of a key bit stream and unpredictability of random bits, (b) a key with a length enough to encrypt practical amounts of data, and (c) how to pass safely the key from the sender to receiver and protect the key.
Nippon Telegraph and Telephone Corporation (NTT) and Mitsubishi Electric Corporation (Mitsubishi) jointly developed in 2000 the 128-bit block cipher algorithm "Camellia." On this occasion, as the first Japanese encryption algorithm, Camellia was adopted as a new standard encryption algorithm in three major Internet secure protocols, SSL/TLS, S/MIME, and XML.