Akelarre (cipher)
Akelarre is a block cipher proposed in 1996, combining the basic design of IDEA with ideas from RC5. It was shown to be susceptible to a ciphertext-only attack in 1997. Akelarre is a 128-bit block cip...
MD2 (cryptography)
The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers. MD2 is specified in RFC 1319. Although MD2 is no l...
Wired Equivalent Privacy
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to provide da...
SHA-1
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST...
MD4
The MD4 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1990. The digest length is 128 bits. The algorithm has influenced later designs, such as the MD5, SHA-1 ...
Fluhrer, Mantin and Shamir attack
In cryptography, the Fluhrer, Mantin and Shamir attack is a particular stream cipher attack, a dedicated form of cryptanalysis for attacking the widely used stream cipher RC4. The attack allows an att...
Panama (cryptography)
Panama is a cryptography primitive which can be used both as a hash function and a stream cipher. Based on StepRightUp, it was designed by Joan Daemen and Craig Clapp and presented in the paper Fast H...
Panama (cryptography) - Wikipedia
Phelix
Phelix is a high-speed stream cipher with a built-in single-pass message authentication code (MAC) functionality, submitted in 2004 to the eSTREAM contest by Doug Whiting, Bruce Schneier, Stefan Lucks...
Lorenz cipher
The Lorenz SZ40, SZ42A and SZ42B were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz AG in Berlin. The model name SZ was derived fro...
Lorenz cipher - Wikipedia
MD5
The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has bee...
E0 (cipher)
E0 is a stream cipher used in the Bluetooth protocol. It generates a sequence of pseudorandom numbers and combines it with the data using the XOR operator. The key length may vary, but is generally 12...
EMV
EMV, which stands for Europay, MasterCard, and Visa, is a global standard for inter-operation of integrated circuit cards (IC cards or "chip cards") and IC card capable point of sale (POS) terminals a...
Crypt (Unix)
In Unix computing, crypt is the name of a utility program used for encryption, that is largely obsolete.
Robert Morris wrote crypt, which first appeared in Version 3 Unix, to encourage codebreakin...
MS-CHAP
MS-CHAP is the Microsoft version of the Challenge-Handshake Authentication Protocol, CHAP. The protocol exists in two versions, MS-CHAPv1 (defined in RFC 2433) and MS-CHAPv2 (defined in RFC 2759). MS-...
High-bandwidth Digital Content Protection
High-bandwidth Digital Content Protection (HDCP), is a form of digital copy protection developed by Intel Corporation to prevent copying of digital audio and video content as it travels across connect...
CIKS-1
In cryptography, CIKS-1 is a block cipher designed in 2002 by A.A. Moldovyan and N.A. Moldovyan. Like its predecessor, Spectr-H64, it relies heavily on permutations of bits, so is better suited to imp...
F-FCSR
In cryptography, F-FCSR is a stream cipher developed by Thierry Berger, François Arnault, and Cédric Lauradoux. The core of the cipher is a Feedback with Carry Shift Register (FCSR) automaton, which...
F-FCSR - Wikipedia
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also referenced as Rijndael (its original name), is a specification for the encryption of electronic data established by the U.S. National Institute of Standard...
BassOmatic
In cryptography, BassOmatic was the symmetric-key cipher designed by Phil Zimmermann as part of his email encryption software, PGP (in the first release, version 1.0). Comments in the source code indi...
Enigma machine
An Enigma machine was any of several electro-mechanical rotor cipher machines used in the twentieth century for enciphering and deciphering secret messages. Enigma was invented by the German engineer ...
Enigma machine - Wikipedia
Snefru
Snefru is a cryptographic hash function invented by Ralph Merklein 1990 while working at Xerox PARC.The function supports 128-bit and 256-bit output. It was named after the Egyptian Pharaoh Sneferu, c...
Snefru - Wikipedia
Terminal verification results
Terminal verification results (TVR) is an EMV data object. The TVR is a series of bits set by the terminal reading an EMV card, based on logical tests (for example has the card expired). This data o...
Wi-Fi Protected Setup
Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config) is a network security standard that attempts to allow users to easily secure a wireless home network but could fall to brute-force attacks i...
Wi-Fi Protected Setup - Wikipedia