<--- Back to Details
First PageDocument Content
Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher
Date: 2007-02-27 09:35:26
Block cipher
Symmetric-key algorithm
Playfair cipher
Ciphertext
Cipher
One-time pad
Keystream
Cryptanalysis
Cryptographic hash function
Cryptography
Stream ciphers
Substitution cipher

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 1,66 MB

Share Document on Facebook

Similar Documents

Influence of first two keystream bytes 2−7 Bias 1 Bias 3 Bias 5

Influence of first two keystream bytes 2−7 Bias 1 Bias 3 Bias 5

DocID: 1xV86 - View Document

Keystream distribution at byte

Keystream distribution at byte

DocID: 1xTZC - View Document

Probability of keystream value

Probability of keystream value

DocID: 1xTVG - View Document

Fluhrer−McGrew biases in initial keystream bytes 2−6.5 (0, 0) (0, 1) (0,i+1)

Fluhrer−McGrew biases in initial keystream bytes 2−6.5 (0, 0) (0, 1) (0,i+1)

DocID: 1xTHJ - View Document

Biases in the RC4 keystream (128 bit uniform keys) Nadhem AlFardan and Dan Bernstein and Kenny Paterson and Bertram Poettering and Jacob Schuldt Royal Holloway, University of London University of Illinois at Chicago

Biases in the RC4 keystream (128 bit uniform keys) Nadhem AlFardan and Dan Bernstein and Kenny Paterson and Bertram Poettering and Jacob Schuldt Royal Holloway, University of London University of Illinois at Chicago

DocID: 1tSaM - View Document