Data Encryption Standard/Related Articles: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
Pat Palmer (talk | contribs) m (Text replacement - "{{r|U.S. intelligence activities in the Americas}}" to "") |
||
Line 40: | Line 40: | ||
{{r|Software-defined radio}} | {{r|Software-defined radio}} | ||
{{r|Brute force attack}} | {{r|Brute force attack}} | ||
Latest revision as of 13:13, 28 November 2024
- See also changes related to Data Encryption Standard, or pages that link to Data Encryption Standard or to this page or whose text contains "Data Encryption Standard".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Data Encryption Standard. Needs checking by a human.
- AES competition [r]: A competition run by the US National Institute of Standards and Technology to chose a block cipher to become the Advanced Encryption Standard. [e]
- Advanced Encryption Standard [r]: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
- Advanced Encryption System [r]: An encryption system, selected by the U.S. government after a public review process, that is a stronger replacement for the Data Encryption Standard [e]
- Block cipher [r]: A symmetric cipher that operates on fixed-size blocks of plaintext, giving a block of ciphertext for each [e]
- Brute force attack [r]: An attempt to break a cipher by trying all possible keys; long enough keys make this impractical. [e]
- Cipher [r]: A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key [e]
- Cryptography controversy [r]: The "crypto wars", political controversies and legal cases involving the use of cryptography. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- DEAL (cipher) [r]: A block cipher derived from the Data Encryption Standard (DES), from a design proposed in a report by Lars Knudsen in 1998. [e]
- DES (disambiguation) [r]: Add brief definition or description
- GOST cipher [r]: A Soviet and Russian government standard symmetric key block cipher; also based on this block cipher is the GOST hash function. [e]
- Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- History of cryptography [r]: The development, since antiquity, of means of concealing communications from other than the intended recipient [e]
- LOKI (cipher) [r]: Block ciphers (LOKI89 and LOKI91) designed as possible replacements for the Data Encryption Standard (DES). [e]
- National Security Agency [r]: An organization within the United States Department of Defense, with the dual roles of the principal signals intelligence agency in the United States intelligence community , but also having the responsibility for information assurance of military, diplomatic, and other critical communications. [e]
- Signals intelligence from 1990 to the present [r]: Add brief definition or description
- Symmetric key cryptography [r]: A cryptographic system in which there is only one key; the same secret key is used for encryption and decryption. [e]
- Triple DES [r]: The common name for the Triple Data Encryption Algorithm (TDEA) block cipher, named because it applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. [e]
- United States intelligence community [r]: Add brief definition or description
- Software-defined radio [r]: Radio communication system where components that have typically been implemented in hardware are instead implemented using software on a personal computer or other embedded computing devices. [e]
- Brute force attack [r]: An attempt to break a cipher by trying all possible keys; long enough keys make this impractical. [e]
Categories:
- Subpages
- Related Article Subpages
- Computers Related Article Subpages
- Mathematics Related Article Subpages
- Military Related Article Subpages
- All Content
- Computers Content
- Mathematics Content
- Military Content
- Military tag
- Security tag
- Bot-created Related Articles subpages
- Computers Bot-created Related Articles subpages
- Mathematics Bot-created Related Articles subpages
- Military Bot-created Related Articles subpages