Knowledge

CRYPTREC

Source đź“ť

226:(Hitachi) as stream ciphers. However, only KCipher-2 has been listed on the "e-Government Recommended Ciphers List". The reason why most Japanese ciphers have not been selected as "Recommended Ciphers" is not that these ciphers are necessarily unsafe, but that these ciphers are not widely used in commercial products, open-source projects, governmental systems, or international standards. There is the possibility that ciphers listed on "Candidate Recommended Ciphers List" will be moved to the "e-Government Recommended Ciphers List" when they are utilized more widely. 3430: 61:
There is some overlap, and some conflict, between the NESSIE selections and the CRYPTREC draft recommendations. Both efforts include some of the best cryptographers in the world therefore conflicts in their selections and recommendations should be examined with care. For instance, CRYPTREC recommends
205:
In the revised release of 2013, the list was divided into three: "e-Government Recommended Ciphers List", "Candidate Recommended Ciphers List", and "Monitored Ciphers List". Most of the Japanese ciphers listed in the previous list (except for Camellia) have moved from the "Recommended Ciphers List"
121:
It is also the organization that provides technical evaluation and recommendations concerning regulations that implement Japanese laws. Examples include the Electronic Signatures and Certification Services (Law 102 of FY2000, taking effect as from April 2001), the Basic Law on the Formulation of an
78:
protocols; nevertheless, CRYPTREC recommended that it only be used with 128-bit keys. Essentially the same consideration led to CRYPTREC's inclusion of 160-bit message digest algorithms, despite their suggestion that they be avoided in new system designs. Also, CRYPTREC was unusually careful to
62:
several 64 bit block ciphers while NESSIE selected none, but CRYPTREC was obliged by its terms of reference to take into account existing standards and practices, while NESSIE was not. Similar differences in terms of reference account for CRYPTREC recommending at least one
122:
Advanced Information and Telecommunications Network Society of 2000 (Law 144 of FY2000), and the Public Individual Certification Law of December 2002. Furthermore, CRYPTEC has responsibilities with regard to the Japanese contribution to the
99:. It was started in May 2000 by combining efforts from several agencies who were investigating methods and techniques for implementing 'e-Government' in Japan. Presently, it is sponsored by 79:
examine variants and modifications of the techniques, or at least to discuss their care in doing so; this resulted in particularly detailed recommendations regarding them.
3410: 3240: 1202: 912: 592: 223: 1330: 123: 47: 3093: 3013: 2340: 1421: 1325: 643: 421: 2401: 812: 2430: 1054: 537: 436: 426: 127: 1233: 1227: 2167: 1523: 473: 3029: 2157: 1651: 1351: 905: 431: 2320: 2294: 2162: 2058: 43: 2790: 2135: 969: 2957: 3086: 1037: 994: 877:
The list of ciphers that should be referred to in the procurement for the e-Government system (CRYPTREC Ciphers List)
332: 959: 2304: 1414: 949: 898: 237:
are listed on "Monitored Ciphers List". These are unsafe and only permitted to remain compatible with old systems.
138:
In the first release in 2003, many Japanese ciphers were selected for the "e-Government Recommended Ciphers List":
3458: 2394: 2183: 1113: 1027: 974: 327: 3289: 2998: 2483: 2435: 2361: 1138: 167: 2785: 1022: 3463: 3079: 3003: 1451: 1279: 1212: 355: 3468: 3405: 3360: 3173: 2772: 2414: 2410: 2247: 1407: 1376: 1269: 1118: 1032: 954: 287: 3284: 2387: 2264: 2174: 2152: 1465: 1128: 1017: 999: 3400: 2668: 2269: 2125: 2078: 1553: 1381: 1361: 2473: 1264: 3390: 3380: 3235: 3008: 2844: 2543: 2538: 2335: 2217: 2092: 1461: 1320: 1091: 75: 3385: 3375: 3178: 3138: 3131: 3121: 3116: 2931: 2751: 2274: 2063: 1434: 1274: 921: 3126: 3039: 2425: 2366: 2242: 2237: 2189: 1356: 1207: 1146: 1081: 876: 819: 3433: 3279: 3225: 3054: 2704: 2658: 2548: 2506: 2491: 2356: 2179: 2038: 1616: 1222: 979: 936: 3395: 3319: 2724: 2628: 2578: 2553: 2259: 2142: 2068: 1751: 1731: 1133: 944: 8: 3158: 3049: 2926: 2875: 2814: 2714: 2633: 2593: 2573: 2222: 2199: 1518: 1239: 456: 171: 159: 27: 3264: 3248: 3195: 2983: 2967: 2916: 2501: 2207: 2115: 1827: 1756: 1726: 1671: 1086: 1009: 989: 984: 964: 292: 206:
to the "Candidate Recommended Ciphers List". There were several new proposals, such as
34:
techniques for government and industrial use. It is comparable in many respects to the
3324: 3314: 3185: 2860: 1927: 1626: 1586: 1581: 1548: 1508: 1456: 1346: 1289: 1217: 1103: 360: 163: 3259: 2947: 2901: 2663: 2299: 2194: 2073: 1932: 1812: 1781: 1475: 1192: 92: 2962: 2911: 2906: 2694: 2409: 2146: 2130: 2119: 2053: 2012: 1977: 1907: 1887: 1761: 1641: 1636: 1591: 843: 572: 552: 175: 139: 106:
the Ministry of Public Management, Home Affairs and Post and Telecommunications,
3334: 3254: 3215: 3163: 3148: 2952: 2680: 2284: 2232: 2043: 2028: 1967: 1962: 1847: 1596: 35: 74:
that they had not selected any of those considered. RC4 is widely used in the
3452: 3415: 3370: 3329: 3309: 3205: 3168: 3143: 3044: 2921: 2279: 2227: 2106: 2088: 1877: 1852: 1842: 1666: 1656: 1503: 63: 51: 31: 2623: 3365: 3210: 3200: 3190: 3153: 3102: 2212: 2033: 1997: 1862: 1741: 1696: 1528: 1480: 1430: 1386: 1366: 240:
After the revision in 2013, there are several updates such as addition of
3344: 3034: 2880: 2809: 2805: 1822: 1817: 1701: 1284: 1161: 3304: 3274: 3269: 3230: 2254: 1972: 1912: 1796: 1791: 1736: 1606: 1469: 1310: 1042: 738: 710: 582: 557: 257: 179: 147: 96: 869: 3294: 2709: 2588: 1987: 1982: 1872: 1786: 1681: 1661: 1064: 602: 370: 215: 195: 2496: 3339: 3299: 2885: 2870: 2865: 2855: 2819: 2739: 2653: 2533: 2289: 2083: 1746: 1621: 1601: 1513: 1371: 1176: 1171: 1166: 1069: 1047: 487: 483: 451: 441: 245: 241: 88: 2824: 2780: 2558: 1992: 1942: 1902: 1892: 1837: 1832: 1676: 1485: 1197: 1156: 774: 199: 187: 151: 3220: 2993: 2734: 2729: 2699: 2689: 2648: 2643: 2638: 2618: 2613: 2583: 2568: 2528: 2330: 1952: 1947: 1882: 1867: 1857: 1802: 1776: 1771: 1766: 1646: 1631: 1315: 687: 577: 562: 317: 307: 302: 207: 183: 155: 39: 2719: 2608: 2563: 2511: 2468: 2463: 2457: 2048: 2007: 1957: 1937: 1922: 1711: 1691: 1611: 1576: 1151: 1108: 1076: 1059: 743: 396: 382: 297: 253: 249: 234: 2834: 2829: 2800: 2795: 2759: 1897: 1806: 1721: 1716: 1706: 1686: 1558: 1543: 597: 468: 219: 211: 191: 2603: 2598: 2451: 2002: 1917: 1538: 1533: 1244: 1098: 261: 230: 143: 67: 275: 70:, while the NESSIE report specifically said that it was 3241:
Cryptographically secure pseudorandom number generator
509: 1429: 882: 844:"Specifications of e-Government Recommended Ciphers" 109:
the Telecommunications Advancement Organization, and
3450: 24:Cryptography Research and Evaluation Committees 48:National Institute of Standards and Technology 3087: 2395: 1415: 906: 112:the Information-Technology Promotion Agency. 920: 103:the Ministry of Economy Trade and Industry, 3094: 3080: 2402: 2388: 1422: 1408: 913: 899: 82: 667: 56: 267: 190:) as 128 bit block ciphers, and finally 87:CRYPTREC includes members from Japanese 813:"e-Government recommended ciphers list" 214:) as a 128 bit block cipher as well as 3451: 818:. CRYPTREC. 2003-02-20. Archived from 16:Japanese cryptography research project 3075: 2383: 1403: 894: 276:e-Government Recommended Ciphers List 1234:Naccache–Stern knapsack cryptosystem 44:Advanced Encryption Standard process 260:to Monitored list, and deletion of 130:JTC 1/SC27 standardization effort. 116: 13: 510:Candidate Recommended Ciphers List 14: 3480: 861: 3429: 3428: 3101: 1265:Discrete logarithm cryptography 761:Authenticated encryption modes 630:Authenticated encryption modes 448:Authenticated encryption modes 3290:Information-theoretic security 2999:NIST hash function competition 836: 805: 168:Nippon Telegraph and Telephone 1: 798: 771:Message authentication codes 640:Message authentication codes 465:Message authentication codes 3004:Password Hashing Competition 2415:message authentication codes 2411:Cryptographic hash functions 1280:Non-commutative cryptography 133: 7: 3406:Message authentication code 3361:Cryptographic hash function 3174:Cryptographic hash function 2958:Merkle–DamgĂĄrd construction 1377:Identity-based cryptography 1270:Elliptic-curve cryptography 162:) as 64 bit block ciphers, 10: 3485: 3285:Harvest now, decrypt later 30:to evaluate and recommend 3424: 3401:Post-quantum cryptography 3353: 3109: 3071: 3022: 2976: 2940: 2894: 2843: 2771: 2748: 2677: 2521: 2482: 2444: 2421: 2379: 2349: 2313: 2305:Time/memory/data tradeoff 2102: 2021: 1567: 1494: 1442: 1399: 1382:Post-quantum cryptography 1339: 1331:Post-Quantum Cryptography 1298: 1257: 1185: 1127: 1008: 935: 928: 890: 886: 781:Authenticated encryption 650:Authenticated encryption 480:Authenticated encryption 3391:Quantum key distribution 3381:Authenticated encryption 3236:Random number generation 2752:key derivation functions 2093:Whitening transformation 3386:Public-key cryptography 3376:Symmetric-key algorithm 3179:Key derivation function 3139:Cryptographic primitive 3132:Authentication protocol 3122:Outline of cryptography 3117:History of cryptography 3030:Hash-based cryptography 2932:Length extension attack 2064:Confusion and diffusion 1275:Hash-based cryptography 922:Public-key cryptography 83:Background and sponsors 3459:Cryptography standards 3127:Cryptographic protocol 3040:Message authentication 846:. CRYPTREC. 2018-07-02 789:Entity authentication 717:128-bit block ciphers 704:Symmetric key ciphers 668:Monitored Ciphers List 658:Entity authentication 569:128-bit block ciphers 546:Symmetric key ciphers 494:Entity authentication 352:128-bit block ciphers 341:Symmetric key ciphers 272:As of March 2023 57:Comparison with NESSIE 3280:End-to-end encryption 3226:Cryptojacking malware 2357:Initialization vector 937:Integer factorization 707:64-bit block ciphers 549:64-bit block ciphers 344:64-bit block ciphers 268:CRYPTREC Ciphers List 229:In addition, 128 bit 202:) as stream ciphers. 3396:Quantum cryptography 3320:Trusted timestamping 2136:3-subset MITM attack 1752:Intel Cascade Cipher 1732:Hasty Pudding cipher 3464:Government research 3159:Cryptographic nonce 2927:Side-channel attack 2175:Differential-linear 1240:Three-pass protocol 750:Modes of operation 673:Public key ciphers 619:Modes of operation 515:Public key ciphers 415:Modes of operation 281:Public key ciphers 172:Mitsubishi Electric 160:Mitsubishi Electric 42:project and to the 28:Japanese Government 3469:Standards of Japan 3265:Subliminal channel 3249:Pseudorandom noise 3196:Key (cryptography) 2984:CAESAR Competition 2968:HAIFA construction 2917:Brute-force attack 2248:Differential-fault 1466:internal mechanics 1010:Discrete logarithm 3446: 3445: 3442: 3441: 3325:Key-based routing 3315:Trapdoor function 3186:Digital signature 3067: 3066: 3063: 3062: 2861:ChaCha20-Poly1305 2678:Password hashing/ 2375: 2374: 2362:Mode of operation 2039:Lai–Massey scheme 1395: 1394: 1347:Digital signature 1290:Trapdoor function 1253: 1252: 970:Goldwasser–Micali 753:Encryption modes 622:Encryption modes 418:Encryption modes 308:RSASSA-PKCS1-v1_5 3476: 3432: 3431: 3260:Insecure channel 3096: 3089: 3082: 3073: 3072: 2948:Avalanche effect 2902:Collision attack 2445:Common functions 2404: 2397: 2390: 2381: 2380: 2233:Power-monitoring 2074:Avalanche effect 1782:Khufu and Khafre 1435:security summary 1424: 1417: 1410: 1401: 1400: 1236: 1137: 1132: 1092:signature scheme 995:Okamoto–Uchiyama 933: 932: 915: 908: 901: 892: 891: 888: 887: 884: 883: 873: 872: 870:Official website 855: 854: 852: 851: 840: 834: 833: 831: 830: 824: 817: 809: 711:3-key Triple DES 688:RSAES-PKCS1-v1_5 684:Confidentiality 526:Confidentiality 314:Confidentiality 117:Responsibilities 3484: 3483: 3479: 3478: 3477: 3475: 3474: 3473: 3449: 3448: 3447: 3438: 3420: 3349: 3105: 3100: 3059: 3018: 2977:Standardization 2972: 2963:Sponge function 2936: 2912:Birthday attack 2907:Preimage attack 2890: 2846: 2839: 2767: 2750: 2749:General purpose 2744: 2679: 2673: 2522:Other functions 2517: 2484:SHA-3 finalists 2478: 2440: 2417: 2408: 2371: 2345: 2314:Standardization 2309: 2238:Electromagnetic 2190:Integral/Square 2147:Piling-up lemma 2131:Biclique attack 2120:EFF DES cracker 2104: 2098: 2029:Feistel network 2017: 1642:CIPHERUNICORN-E 1637:CIPHERUNICORN-A 1569: 1563: 1496: 1490: 1444: 1438: 1428: 1391: 1335: 1299:Standardization 1294: 1249: 1232: 1181: 1129:Lattice/SVP/CVP 1123: 1004: 950:Blum–Goldwasser 924: 919: 868: 867: 864: 859: 858: 849: 847: 842: 841: 837: 828: 826: 822: 815: 811: 810: 806: 801: 735:Hash functions 725:Stream ciphers 670: 611:Hash functions 589:Stream ciphers 573:CIPHERUNICORN-A 553:CIPHERUNICORN-E 512: 379:Hash functions 367:Stream ciphers 278: 270: 182:(Toshiba), and 176:CIPHERUNICORN-A 140:CIPHERUNICORN-E 136: 119: 85: 59: 17: 12: 11: 5: 3482: 3472: 3471: 3466: 3461: 3444: 3443: 3440: 3439: 3437: 3436: 3425: 3422: 3421: 3419: 3418: 3413: 3411:Random numbers 3408: 3403: 3398: 3393: 3388: 3383: 3378: 3373: 3368: 3363: 3357: 3355: 3351: 3350: 3348: 3347: 3342: 3337: 3335:Garlic routing 3332: 3327: 3322: 3317: 3312: 3307: 3302: 3297: 3292: 3287: 3282: 3277: 3272: 3267: 3262: 3257: 3255:Secure channel 3252: 3246: 3245: 3244: 3233: 3228: 3223: 3218: 3216:Key stretching 3213: 3208: 3203: 3198: 3193: 3188: 3183: 3182: 3181: 3176: 3166: 3164:Cryptovirology 3161: 3156: 3151: 3149:Cryptocurrency 3146: 3141: 3136: 3135: 3134: 3124: 3119: 3113: 3111: 3107: 3106: 3099: 3098: 3091: 3084: 3076: 3069: 3068: 3065: 3064: 3061: 3060: 3058: 3057: 3052: 3047: 3042: 3037: 3032: 3026: 3024: 3020: 3019: 3017: 3016: 3011: 3006: 3001: 2996: 2991: 2986: 2980: 2978: 2974: 2973: 2971: 2970: 2965: 2960: 2955: 2953:Hash collision 2950: 2944: 2942: 2938: 2937: 2935: 2934: 2929: 2924: 2919: 2914: 2909: 2904: 2898: 2896: 2892: 2891: 2889: 2888: 2883: 2878: 2873: 2868: 2863: 2858: 2852: 2850: 2841: 2840: 2838: 2837: 2832: 2827: 2822: 2817: 2812: 2803: 2798: 2793: 2788: 2783: 2777: 2775: 2769: 2768: 2766: 2765: 2762: 2756: 2754: 2746: 2745: 2743: 2742: 2737: 2732: 2727: 2722: 2717: 2712: 2707: 2702: 2697: 2692: 2686: 2684: 2681:key stretching 2675: 2674: 2672: 2671: 2666: 2661: 2656: 2651: 2646: 2641: 2636: 2631: 2626: 2621: 2616: 2611: 2606: 2601: 2596: 2591: 2586: 2581: 2576: 2571: 2566: 2561: 2556: 2551: 2546: 2541: 2536: 2531: 2525: 2523: 2519: 2518: 2516: 2515: 2509: 2504: 2499: 2494: 2488: 2486: 2480: 2479: 2477: 2476: 2471: 2466: 2461: 2455: 2448: 2446: 2442: 2441: 2439: 2438: 2433: 2428: 2422: 2419: 2418: 2407: 2406: 2399: 2392: 2384: 2377: 2376: 2373: 2372: 2370: 2369: 2364: 2359: 2353: 2351: 2347: 2346: 2344: 2343: 2338: 2333: 2328: 2323: 2317: 2315: 2311: 2310: 2308: 2307: 2302: 2297: 2292: 2287: 2282: 2277: 2272: 2267: 2262: 2257: 2252: 2251: 2250: 2245: 2240: 2235: 2230: 2220: 2215: 2210: 2205: 2197: 2192: 2187: 2180:Distinguishing 2177: 2172: 2171: 2170: 2165: 2160: 2150: 2140: 2139: 2138: 2133: 2123: 2112: 2110: 2100: 2099: 2097: 2096: 2086: 2081: 2076: 2071: 2066: 2061: 2056: 2051: 2046: 2044:Product cipher 2041: 2036: 2031: 2025: 2023: 2019: 2018: 2016: 2015: 2010: 2005: 2000: 1995: 1990: 1985: 1980: 1975: 1970: 1965: 1960: 1955: 1950: 1945: 1940: 1935: 1930: 1925: 1920: 1915: 1910: 1905: 1900: 1895: 1890: 1885: 1880: 1875: 1870: 1865: 1860: 1855: 1850: 1845: 1840: 1835: 1830: 1825: 1820: 1815: 1810: 1799: 1794: 1789: 1784: 1779: 1774: 1769: 1764: 1759: 1754: 1749: 1744: 1739: 1734: 1729: 1724: 1719: 1714: 1709: 1704: 1699: 1694: 1689: 1684: 1679: 1674: 1672:Cryptomeria/C2 1669: 1664: 1659: 1654: 1649: 1644: 1639: 1634: 1629: 1624: 1619: 1614: 1609: 1604: 1599: 1594: 1589: 1584: 1579: 1573: 1571: 1565: 1564: 1562: 1561: 1556: 1551: 1546: 1541: 1536: 1531: 1526: 1521: 1516: 1511: 1506: 1500: 1498: 1492: 1491: 1489: 1488: 1483: 1478: 1473: 1459: 1454: 1448: 1446: 1440: 1439: 1427: 1426: 1419: 1412: 1404: 1397: 1396: 1393: 1392: 1390: 1389: 1384: 1379: 1374: 1369: 1364: 1359: 1354: 1349: 1343: 1341: 1337: 1336: 1334: 1333: 1328: 1323: 1318: 1313: 1308: 1302: 1300: 1296: 1295: 1293: 1292: 1287: 1282: 1277: 1272: 1267: 1261: 1259: 1255: 1254: 1251: 1250: 1248: 1247: 1242: 1237: 1230: 1228:Merkle–Hellman 1225: 1220: 1215: 1210: 1205: 1200: 1195: 1189: 1187: 1183: 1182: 1180: 1179: 1174: 1169: 1164: 1159: 1154: 1149: 1143: 1141: 1125: 1124: 1122: 1121: 1116: 1111: 1106: 1101: 1096: 1095: 1094: 1084: 1079: 1074: 1073: 1072: 1067: 1057: 1052: 1051: 1050: 1045: 1035: 1030: 1025: 1020: 1014: 1012: 1006: 1005: 1003: 1002: 997: 992: 987: 982: 977: 975:Naccache–Stern 972: 967: 962: 957: 952: 947: 941: 939: 930: 926: 925: 918: 917: 910: 903: 895: 881: 880: 874: 863: 862:External links 860: 857: 856: 835: 803: 802: 800: 797: 796: 795: 794: 793: 787: 786: 785: 779: 778: 777: 769: 768: 767: 766: 765: 759: 758: 757: 748: 747: 746: 741: 733: 732: 731: 730: 729: 723: 722: 721: 715: 714: 713: 702: 701: 700: 699: 698: 692: 691: 690: 682: 681: 680: 669: 666: 665: 664: 663: 662: 656: 655: 654: 648: 647: 646: 638: 637: 636: 635: 634: 628: 627: 626: 617: 616: 615: 609: 608: 607: 606: 605: 600: 595: 587: 586: 585: 580: 575: 567: 566: 565: 560: 555: 544: 543: 542: 541: 540: 532: 531: 530: 524: 523: 522: 511: 508: 507: 506: 505: 504: 503:ISO/IEC 9798-4 501: 500:ISO/IEC 9798-3 498: 497:ISO/IEC 9798-2 492: 491: 490: 478: 477: 476: 471: 463: 462: 461: 460: 459: 454: 446: 445: 444: 439: 434: 429: 424: 413: 412: 411: 408: 405: 402: 399: 394: 391: 388: 385: 377: 376: 375: 374: 373: 365: 364: 363: 358: 350: 349: 348: 339: 338: 337: 336: 335: 330: 322: 321: 320: 312: 311: 310: 305: 300: 295: 290: 277: 274: 269: 266: 135: 132: 118: 115: 114: 113: 110: 107: 104: 84: 81: 58: 55: 36:European Union 26:set up by the 15: 9: 6: 4: 3: 2: 3481: 3470: 3467: 3465: 3462: 3460: 3457: 3456: 3454: 3435: 3427: 3426: 3423: 3417: 3416:Steganography 3414: 3412: 3409: 3407: 3404: 3402: 3399: 3397: 3394: 3392: 3389: 3387: 3384: 3382: 3379: 3377: 3374: 3372: 3371:Stream cipher 3369: 3367: 3364: 3362: 3359: 3358: 3356: 3352: 3346: 3343: 3341: 3338: 3336: 3333: 3331: 3330:Onion routing 3328: 3326: 3323: 3321: 3318: 3316: 3313: 3311: 3310:Shared secret 3308: 3306: 3303: 3301: 3298: 3296: 3293: 3291: 3288: 3286: 3283: 3281: 3278: 3276: 3273: 3271: 3268: 3266: 3263: 3261: 3258: 3256: 3253: 3250: 3247: 3242: 3239: 3238: 3237: 3234: 3232: 3229: 3227: 3224: 3222: 3219: 3217: 3214: 3212: 3209: 3207: 3206:Key generator 3204: 3202: 3199: 3197: 3194: 3192: 3189: 3187: 3184: 3180: 3177: 3175: 3172: 3171: 3170: 3169:Hash function 3167: 3165: 3162: 3160: 3157: 3155: 3152: 3150: 3147: 3145: 3144:Cryptanalysis 3142: 3140: 3137: 3133: 3130: 3129: 3128: 3125: 3123: 3120: 3118: 3115: 3114: 3112: 3108: 3104: 3097: 3092: 3090: 3085: 3083: 3078: 3077: 3074: 3070: 3056: 3053: 3051: 3048: 3046: 3045:Proof of work 3043: 3041: 3038: 3036: 3033: 3031: 3028: 3027: 3025: 3021: 3015: 3012: 3010: 3007: 3005: 3002: 3000: 2997: 2995: 2992: 2990: 2987: 2985: 2982: 2981: 2979: 2975: 2969: 2966: 2964: 2961: 2959: 2956: 2954: 2951: 2949: 2946: 2945: 2943: 2939: 2933: 2930: 2928: 2925: 2923: 2922:Rainbow table 2920: 2918: 2915: 2913: 2910: 2908: 2905: 2903: 2900: 2899: 2897: 2893: 2887: 2884: 2882: 2879: 2877: 2874: 2872: 2869: 2867: 2864: 2862: 2859: 2857: 2854: 2853: 2851: 2848: 2845:Authenticated 2842: 2836: 2833: 2831: 2828: 2826: 2823: 2821: 2818: 2816: 2813: 2811: 2807: 2804: 2802: 2799: 2797: 2794: 2792: 2789: 2787: 2784: 2782: 2779: 2778: 2776: 2774: 2773:MAC functions 2770: 2763: 2761: 2758: 2757: 2755: 2753: 2747: 2741: 2738: 2736: 2733: 2731: 2728: 2726: 2723: 2721: 2718: 2716: 2713: 2711: 2708: 2706: 2703: 2701: 2698: 2696: 2693: 2691: 2688: 2687: 2685: 2682: 2676: 2670: 2667: 2665: 2662: 2660: 2657: 2655: 2652: 2650: 2647: 2645: 2642: 2640: 2637: 2635: 2632: 2630: 2627: 2625: 2622: 2620: 2617: 2615: 2612: 2610: 2607: 2605: 2602: 2600: 2597: 2595: 2592: 2590: 2587: 2585: 2582: 2580: 2577: 2575: 2572: 2570: 2567: 2565: 2562: 2560: 2557: 2555: 2552: 2550: 2547: 2545: 2542: 2540: 2537: 2535: 2532: 2530: 2527: 2526: 2524: 2520: 2513: 2510: 2508: 2505: 2503: 2500: 2498: 2495: 2493: 2490: 2489: 2487: 2485: 2481: 2475: 2472: 2470: 2467: 2465: 2462: 2460:(compromised) 2459: 2456: 2454:(compromised) 2453: 2450: 2449: 2447: 2443: 2437: 2436:Known attacks 2434: 2432: 2429: 2427: 2424: 2423: 2420: 2416: 2412: 2405: 2400: 2398: 2393: 2391: 2386: 2385: 2382: 2378: 2368: 2365: 2363: 2360: 2358: 2355: 2354: 2352: 2348: 2342: 2339: 2337: 2334: 2332: 2329: 2327: 2324: 2322: 2319: 2318: 2316: 2312: 2306: 2303: 2301: 2298: 2296: 2293: 2291: 2288: 2286: 2283: 2281: 2278: 2276: 2273: 2271: 2268: 2266: 2263: 2261: 2260:Interpolation 2258: 2256: 2253: 2249: 2246: 2244: 2241: 2239: 2236: 2234: 2231: 2229: 2226: 2225: 2224: 2221: 2219: 2216: 2214: 2211: 2209: 2206: 2204: 2203: 2198: 2196: 2193: 2191: 2188: 2185: 2181: 2178: 2176: 2173: 2169: 2166: 2164: 2161: 2159: 2156: 2155: 2154: 2151: 2148: 2144: 2141: 2137: 2134: 2132: 2129: 2128: 2127: 2124: 2121: 2117: 2114: 2113: 2111: 2108: 2107:cryptanalysis 2101: 2094: 2090: 2089:Key whitening 2087: 2085: 2082: 2080: 2077: 2075: 2072: 2070: 2067: 2065: 2062: 2060: 2057: 2055: 2052: 2050: 2047: 2045: 2042: 2040: 2037: 2035: 2032: 2030: 2027: 2026: 2024: 2020: 2014: 2011: 2009: 2006: 2004: 2001: 1999: 1996: 1994: 1991: 1989: 1986: 1984: 1981: 1979: 1976: 1974: 1971: 1969: 1966: 1964: 1961: 1959: 1956: 1954: 1951: 1949: 1946: 1944: 1941: 1939: 1936: 1934: 1931: 1929: 1926: 1924: 1921: 1919: 1916: 1914: 1911: 1909: 1906: 1904: 1901: 1899: 1896: 1894: 1891: 1889: 1886: 1884: 1881: 1879: 1878:New Data Seal 1876: 1874: 1871: 1869: 1866: 1864: 1861: 1859: 1856: 1854: 1851: 1849: 1846: 1844: 1841: 1839: 1836: 1834: 1831: 1829: 1826: 1824: 1821: 1819: 1816: 1814: 1811: 1808: 1804: 1800: 1798: 1795: 1793: 1790: 1788: 1785: 1783: 1780: 1778: 1775: 1773: 1770: 1768: 1765: 1763: 1760: 1758: 1755: 1753: 1750: 1748: 1745: 1743: 1740: 1738: 1735: 1733: 1730: 1728: 1725: 1723: 1720: 1718: 1715: 1713: 1710: 1708: 1705: 1703: 1700: 1698: 1695: 1693: 1690: 1688: 1685: 1683: 1680: 1678: 1675: 1673: 1670: 1668: 1665: 1663: 1660: 1658: 1655: 1653: 1650: 1648: 1645: 1643: 1640: 1638: 1635: 1633: 1630: 1628: 1625: 1623: 1620: 1618: 1617:BEAR and LION 1615: 1613: 1610: 1608: 1605: 1603: 1600: 1598: 1595: 1593: 1590: 1588: 1585: 1583: 1580: 1578: 1575: 1574: 1572: 1566: 1560: 1557: 1555: 1552: 1550: 1547: 1545: 1542: 1540: 1537: 1535: 1532: 1530: 1527: 1525: 1522: 1520: 1517: 1515: 1512: 1510: 1507: 1505: 1502: 1501: 1499: 1493: 1487: 1484: 1482: 1479: 1477: 1474: 1471: 1467: 1463: 1460: 1458: 1455: 1453: 1450: 1449: 1447: 1441: 1436: 1432: 1431:Block ciphers 1425: 1420: 1418: 1413: 1411: 1406: 1405: 1402: 1398: 1388: 1385: 1383: 1380: 1378: 1375: 1373: 1370: 1368: 1365: 1363: 1360: 1358: 1355: 1353: 1350: 1348: 1345: 1344: 1342: 1338: 1332: 1329: 1327: 1324: 1322: 1319: 1317: 1314: 1312: 1309: 1307: 1304: 1303: 1301: 1297: 1291: 1288: 1286: 1283: 1281: 1278: 1276: 1273: 1271: 1268: 1266: 1263: 1262: 1260: 1256: 1246: 1243: 1241: 1238: 1235: 1231: 1229: 1226: 1224: 1221: 1219: 1216: 1214: 1211: 1209: 1206: 1204: 1201: 1199: 1196: 1194: 1191: 1190: 1188: 1184: 1178: 1175: 1173: 1170: 1168: 1165: 1163: 1160: 1158: 1155: 1153: 1150: 1148: 1145: 1144: 1142: 1140: 1135: 1130: 1126: 1120: 1117: 1115: 1112: 1110: 1107: 1105: 1102: 1100: 1097: 1093: 1090: 1089: 1088: 1085: 1083: 1080: 1078: 1075: 1071: 1068: 1066: 1063: 1062: 1061: 1058: 1056: 1053: 1049: 1046: 1044: 1041: 1040: 1039: 1036: 1034: 1031: 1029: 1026: 1024: 1021: 1019: 1016: 1015: 1013: 1011: 1007: 1001: 1000:Schmidt–Samoa 998: 996: 993: 991: 988: 986: 983: 981: 978: 976: 973: 971: 968: 966: 963: 961: 960:DamgĂĄrd–Jurik 958: 956: 955:Cayley–Purser 953: 951: 948: 946: 943: 942: 940: 938: 934: 931: 927: 923: 916: 911: 909: 904: 902: 897: 896: 893: 889: 885: 879:(in Japanese) 878: 875: 871: 866: 865: 845: 839: 825:on 2018-04-17 821: 814: 808: 804: 791: 790: 788: 783: 782: 780: 776: 773: 772: 770: 763: 762: 760: 755: 754: 752: 751: 749: 745: 742: 740: 737: 736: 734: 727: 726: 724: 719: 718: 716: 712: 709: 708: 706: 705: 703: 696: 695: 694:Key exchange 693: 689: 686: 685: 683: 678: 677: 675: 674: 672: 671: 660: 659: 657: 652: 651: 649: 645: 642: 641: 639: 632: 631: 629: 624: 623: 621: 620: 618: 613: 612: 610: 604: 601: 599: 596: 594: 593:Enocoro-128v2 591: 590: 588: 584: 581: 579: 576: 574: 571: 570: 568: 564: 561: 559: 558:Hierocrypt-L1 556: 554: 551: 550: 548: 547: 545: 539: 536: 535: 534:Key exchange 533: 528: 527: 525: 520: 519: 517: 516: 514: 513: 502: 499: 496: 495: 493: 489: 485: 482: 481: 479: 475: 472: 470: 467: 466: 464: 458: 455: 453: 450: 449: 447: 443: 440: 438: 435: 433: 430: 428: 425: 423: 420: 419: 417: 416: 414: 409: 406: 403: 400: 398: 395: 392: 389: 386: 384: 381: 380: 378: 372: 369: 368: 366: 362: 359: 357: 354: 353: 351: 346: 345: 343: 342: 340: 334: 331: 329: 326: 325: 324:Key exchange 323: 319: 316: 315: 313: 309: 306: 304: 301: 299: 296: 294: 291: 289: 286: 285: 283: 282: 280: 279: 273: 265: 263: 259: 255: 251: 247: 243: 238: 236: 232: 227: 225: 224:Enocoro-128v2 221: 217: 213: 209: 203: 201: 197: 193: 189: 185: 181: 177: 173: 169: 165: 161: 157: 153: 149: 148:Hierocrypt-L1 145: 141: 131: 129: 125: 111: 108: 105: 102: 101: 100: 98: 94: 90: 80: 77: 73: 69: 65: 64:stream cipher 54: 53: 49: 45: 41: 37: 33: 32:cryptographic 29: 25: 21: 3366:Block cipher 3211:Key schedule 3201:Key exchange 3191:Kleptography 3154:Cryptosystem 3103:Cryptography 2988: 2325: 2265:Partitioning 2223:Side-channel 2201: 2168:Higher-order 2153:Differential 2034:Key schedule 1387:OpenPGP card 1367:Web of trust 1305: 1023:Cramer–Shoup 848:. Retrieved 838: 827:. Retrieved 820:the original 807: 583:Hierocrypt-3 271: 239: 228: 204: 180:Hierocrypt-3 137: 120: 86: 71: 60: 23: 19: 18: 3354:Mathematics 3345:Mix network 3035:Merkle tree 3023:Utilization 3009:NSA Suite B 2350:Utilization 2336:NSA Suite B 2321:AES process 2270:Rubber-hose 2208:Related-key 2116:Brute-force 1495:Less common 1357:Fingerprint 1321:NSA Suite B 1285:RSA problem 1162:NTRUEncrypt 393:SHA-512/256 3453:Categories 3305:Ciphertext 3275:Decryption 3270:Encryption 3231:Ransomware 2847:encryption 2624:RadioGatĂşn 2431:Comparison 2300:Chi-square 2218:Rotational 2158:Impossible 2079:Block size 1973:Spectr-H64 1797:Ladder-DES 1792:Kuznyechik 1737:Hierocrypt 1607:BassOmatic 1570:algorithms 1497:algorithms 1470:Triple DES 1445:algorithms 1311:IEEE P1363 929:Algorithms 850:2018-08-16 829:2018-08-16 799:References 739:RIPEMD-160 676:Signature 644:PC-MAC-AES 518:Signature 284:Signature 258:Triple DES 256:, move of 97:government 3295:Plaintext 2764:KDF1/KDF2 2683:functions 2669:Whirlpool 2275:Black-bag 2195:Boomerang 2184:Known-key 2163:Truncated 1988:Threefish 1983:SXAL/MBAL 1873:MultiSwap 1828:MacGuffin 1787:KN-Cipher 1727:Grand Cru 1682:CS-Cipher 1662:COCONUT98 603:MULTI-S01 371:KCipher-2 216:KCipher-2 196:MULTI-S01 134:Selection 3434:Category 3340:Kademlia 3300:Codetext 3243:(CSPRNG) 2989:CRYPTREC 2820:Poly1305 2740:yescrypt 2654:Streebog 2534:CubeHash 2514:(winner) 2326:CRYPTREC 2290:Weak key 2243:Acoustic 2084:Key size 1928:Red Pike 1747:IDEA NXT 1627:Chiasmus 1622:CAST-256 1602:BaseKing 1587:Akelarre 1582:Adiantum 1549:Skipjack 1514:CAST-128 1509:Camellia 1457:Blowfish 1372:Key size 1306:CRYPTREC 1223:McEliece 1177:RLWE-SIG 1172:RLWE-KEX 1167:NTRUSign 980:Paillier 538:PSEC-KEM 488:Poly1305 484:ChaCha20 410:SHAKE256 407:SHAKE128 404:SHA3-512 401:SHA3-384 397:SHA3-256 361:Camellia 318:RSA-OAEP 246:Poly1305 242:ChaCha20 164:Camellia 93:industry 89:academia 20:CRYPTREC 3110:General 2895:Attacks 2825:SipHash 2781:CBC-MAC 2715:LM hash 2695:Balloon 2559:HAS-160 2367:Padding 2285:Rebound 1993:Treyfer 1943:SAVILLE 1903:PRESENT 1893:NOEKEON 1838:MAGENTA 1833:Madryga 1813:Lucifer 1677:CRYPTON 1486:Twofish 1476:Serpent 1218:Lamport 1198:CEILIDH 1157:NewHope 1104:Schnorr 1087:ElGamal 1065:Ed25519 945:Benaloh 775:CBC-MAC 390:SHA-512 387:SHA-384 383:SHA-256 303:RSA-PSS 264:, etc. 200:Hitachi 188:Fujitsu 178:(NEC), 154:), and 152:Toshiba 76:SSL/TLS 72:notable 50:in the 46:run by 22:is the 3221:Keygen 3055:Pepper 2994:NESSIE 2941:Design 2735:scrypt 2730:PBKDF2 2705:Catena 2700:bcrypt 2690:Argon2 2649:Snefru 2644:Shabal 2639:SWIFFT 2619:RIPEMD 2614:N-hash 2589:MASH-2 2584:MASH-1 2569:Kupyna 2529:BLAKE3 2512:Keccak 2497:Grøstl 2474:BLAKE2 2331:NESSIE 2280:Davies 2228:Timing 2143:Linear 2103:Attack 2022:Design 2013:Zodiac 1978:Square 1953:SHACAL 1948:SC2000 1908:Prince 1888:Nimbus 1883:NewDES 1868:MULTI2 1858:MISTY1 1801:LOKI ( 1777:KHAZAD 1772:KeeLoq 1767:KASUMI 1762:Kalyna 1647:CLEFIA 1632:CIKS-1 1592:Anubis 1443:Common 1340:Topics 1316:NESSIE 1258:Theory 1186:Others 1043:X25519 578:CLEFIA 563:MISTY1 222:) and 208:CLEFIA 184:SC2000 156:MISTY1 95:, and 40:NESSIE 3251:(PRN) 2849:modes 2725:Makwa 2720:Lyra2 2710:crypt 2659:Tiger 2609:MDC-2 2564:HAVAL 2549:Fugue 2507:Skein 2492:BLAKE 2469:SHA-3 2464:SHA-2 2458:SHA-1 2213:Slide 2069:Round 2054:P-box 2049:S-box 2008:XXTEA 1968:Speck 1963:Simon 1958:SHARK 1938:SAFER 1923:REDOC 1848:Mercy 1807:89/91 1757:Iraqi 1722:G-DES 1712:FEA-M 1692:DES-X 1657:Cobra 1612:BATON 1597:Ascon 1577:3-Way 1568:Other 1152:Kyber 1147:BLISS 1109:SPEKE 1077:ECMQV 1070:Ed448 1060:EdDSA 1055:ECDSA 985:Rabin 823:(PDF) 816:(PDF) 744:SHA-1 298:EdDSA 293:ECDSA 254:SHA-3 250:EdDSA 235:SHA-1 3050:Salt 3014:CNSA 2881:IAPM 2835:VMAC 2830:UMAC 2815:PMAC 2810:CMAC 2806:OMAC 2801:NMAC 2796:HMAC 2791:GMAC 2760:HKDF 2629:SIMD 2579:Lane 2554:GOST 2539:ECOH 2426:List 2413:and 2341:CNSA 2200:Mod 2126:MITM 1898:NUSH 1853:MESH 1843:MARS 1717:FROG 1707:FEAL 1687:DEAL 1667:Crab 1652:CMEA 1559:XTEA 1544:SEED 1524:IDEA 1519:GOST 1504:ARIA 1352:OAEP 1326:CNSA 1203:EPOC 1048:X448 1038:ECDH 598:MUGI 474:HMAC 469:CMAC 333:ECDH 252:and 233:and 220:KDDI 212:Sony 194:and 192:MUGI 52:U.S. 2886:OCB 2876:GCM 2871:EAX 2866:CWC 2856:CCM 2786:DAA 2664:VSH 2634:SM3 2604:MD6 2599:MD4 2594:MD2 2574:LSH 2544:FSB 2452:MD5 2295:Tau 2255:XSL 2059:SPN 2003:xmx 1998:UES 1933:S-1 1918:RC2 1863:MMB 1742:ICE 1697:DFC 1554:TEA 1539:RC6 1534:RC5 1529:LEA 1481:SM4 1462:DES 1452:AES 1362:PKI 1245:XTR 1213:IES 1208:HFE 1139:SIS 1134:LWE 1119:STS 1114:SRP 1099:MQV 1082:EKE 1033:DSA 1018:BLS 990:RSA 965:GMR 792:N/A 784:N/A 764:N/A 756:N/A 728:N/A 720:N/A 697:N/A 679:N/A 661:N/A 653:N/A 633:N/A 625:N/A 614:N/A 529:N/A 521:N/A 457:GCM 452:CCM 442:XTS 437:OFB 432:CTR 427:CFB 422:CBC 356:AES 347:N/A 288:DSA 262:RC4 231:RC4 174:), 146:), 144:NEC 128:IEC 124:ISO 68:RC4 38:'s 3455:: 2502:JH 1823:M8 1818:M6 1805:, 1803:97 1702:E2 1468:, 1193:AE 1028:DH 328:DH 248:, 170:, 91:, 66:, 3095:e 3088:t 3081:v 2808:/ 2403:e 2396:t 2389:v 2202:n 2186:) 2182:( 2149:) 2145:( 2122:) 2118:( 2109:) 2105:( 2095:) 2091:( 1913:Q 1809:) 1472:) 1464:( 1437:) 1433:( 1423:e 1416:t 1409:v 1136:/ 1131:/ 914:e 907:t 900:v 853:. 832:. 486:- 244:- 218:( 210:( 198:( 186:( 166:( 158:( 150:( 142:( 126:/

Index

Japanese Government
cryptographic
European Union
NESSIE
Advanced Encryption Standard process
National Institute of Standards and Technology
U.S.
stream cipher
RC4
SSL/TLS
academia
industry
government
ISO
IEC
CIPHERUNICORN-E
NEC
Hierocrypt-L1
Toshiba
MISTY1
Mitsubishi Electric
Camellia
Nippon Telegraph and Telephone
Mitsubishi Electric
CIPHERUNICORN-A
Hierocrypt-3
SC2000
Fujitsu
MUGI
MULTI-S01

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑