CIKS-1
In cryptography, CIKS-1 is a block cipher designed in 2002 by A.A. Moldovyan and N.A. Moldovyan. Like its predecessor, Spectr-H64, it relies heavily on permutations of bits, so is better suited to imp...
Akelarre (cipher)
Akelarre is a block cipher proposed in 1996, combining the basic design of IDEA with ideas from RC5. It was shown to be susceptible to a ciphertext-only attack in 1997. Akelarre is a 128-bit block cip...
Wired Equivalent Privacy
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to provide da...
Churning (cipher)
Churning is an encryption function used to scramble downstream user data of the ATM passive optical network system defined by the ITU G.983.1 standard.The standard states that churning "offers a low l...
Temporal Key Integrity Protocol
Temporal Key Integrity Protocol or TKIP /tiːˈkɪp/ was a stopgap security protocol used in the IEEE 802.11 wireless networking standard. TKIP was designed by the IEEE 802.11i task group and the Wi-Fi A...
SHA-1
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST...
MD4
The MD4 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1990. The digest length is 128 bits. The algorithm has influenced later designs, such as the MD5, SHA-1 ...
Lorenz cipher
The Lorenz SZ40, SZ42A and SZ42B were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz AG in Berlin. The model name SZ was derived fro...
Lorenz cipher - Wikipedia
EMV
EMV, which stands for Europay, MasterCard, and Visa, is a global standard for inter-operation of integrated circuit cards (IC cards or "chip cards") and IC card capable point of sale (POS) terminals a...
MD2 (cryptography)
The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers. MD2 is specified in RFC 1319. Although MD2 is no l...
MD5
The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has bee...
E0 (cipher)
E0 is a stream cipher used in the Bluetooth protocol. It generates a sequence of pseudorandom numbers and combines it with the data using the XOR operator. The key length may vary, but is generally 12...
Crypt (Unix)
In Unix computing, crypt is the name of a utility program used for encryption, that is largely obsolete.
Robert Morris wrote crypt, which first appeared in Version 3 Unix, to encourage codebreakin...
Snefru
Snefru is a cryptographic hash function invented by Ralph Merklein 1990 while working at Xerox PARC.The function supports 128-bit and 256-bit output. It was named after the Egyptian Pharaoh Sneferu, c...
Snefru - Wikipedia
3-Way
In cryptography, 3-Way is a block cipher designed in 1994 by Joan Daemen. It is closely related to BaseKing; indeed, the two are variants of the same general cipher technique.3-Way has a block size of...
MS-CHAP
MS-CHAP is the Microsoft version of the Challenge-Handshake Authentication Protocol, CHAP. The protocol exists in two versions, MS-CHAPv1 (defined in RFC 2433) and MS-CHAPv2 (defined in RFC 2759). MS-...
High-bandwidth Digital Content Protection
High-bandwidth Digital Content Protection (HDCP), is a form of digital copy protection developed by Intel Corporation to prevent copying of digital audio and video content as it travels across connect...
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also referenced as Rijndael (its original name), is a specification for the encryption of electronic data established by the U.S. National Institute of Standard...
F-FCSR
In cryptography, F-FCSR is a stream cipher developed by Thierry Berger, François Arnault, and Cédric Lauradoux. The core of the cipher is a Feedback with Carry Shift Register (FCSR) automaton, which...
F-FCSR - Wikipedia
GOST (hash function)
The GOST hash function, defined in the standards GOST R 34.11-94 , GOST 34.311-95, and GOST R 34.11-2012 is a 256-bit cryptographic hash function. It was initially defined in the Russian national stan...
GOST (hash function) - Wikipedia
BassOmatic
In cryptography, BassOmatic was the symmetric-key cipher designed by Phil Zimmermann as part of his email encryption software, PGP (in the first release, version 1.0). Comments in the source code indi...
Panama (cryptography)
Panama is a cryptography primitive which can be used both as a hash function and a stream cipher. Based on StepRightUp, it was designed by Joan Daemen and Craig Clapp and presented in the paper Fast H...
Panama (cryptography) - Wikipedia
Issuer action codes
Issuer action codes (IAC)s are EMV data objects. EMV cards store three issuer action codes:Each IAC contains a series of bits, set by the card issuer, which correspond to the bits in the Terminal ver...
Enigma machine
An Enigma machine was any of several electro-mechanical rotor cipher machines used in the twentieth century for enciphering and deciphering secret messages. Enigma was invented by the German engineer ...
Enigma machine - Wikipedia