encryption

(redirected from Cipher algorithm)
Also found in: Dictionary, Thesaurus, Medical, Financial.
Related to Cipher algorithm: ciphered

encryption

[en′krip·shən]
(computer science)
The coding of a clear text message by a transmitting unit so as to prevent unauthorized eavesdropping along the transmission line; the receiving unit uses the same algorithm as the transmitting unit to decode the incoming message.
McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc.

encryption

(algorithm, cryptography)
Any procedure used in cryptography to convert plaintext into ciphertext (encrypted message) in order to prevent any but the intended recipient from reading that data.

Schematically, there are two classes of encryption primitives: public-key cryptography and private-key cryptography; they are generally used complementarily. Public-key encryption algorithms include RSA; private-key algorithms include the obsolescent Data Encryption Standard, the Advanced Encryption Standard, as well as RC4.

The Unix command crypt performs a weak form of encryption. Stronger encryption programs include Pretty Good Privacy and the GNU Privacy Guard.

Other closely related aspects of cryptograph include message digests.
This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)

encryption

The reversible transformation of data from the original (plaintext) to a difficult-to-interpret format (ciphertext) as a mechanism for protecting its confidentiality, integrity and sometimes its authenticity. Encryption uses an encryption algorithm and one or more encryption keys. See encryption algorithm and cryptography.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
In addition, the core of CCMP builds by a block cipher algorithm (EAS) which can generate the Keystreams of blocks length varies between 128,192 & 256 bits.
One of them is the classical key that is used in the Hill cipher algorithm where Alice and Bob use the authenticated Diffie-Hellman key exchange algorithm utilizing the idea of a digital signature in order to verify and confirm the identity of the two connecting parties and defend against a man-in-the-middle attack.
A weak key schedule generates nonrandom and related sub keys which make even a strong cipher algorithm vulnerable to attacks.
The performance of block cipher algorithm (Blowfish, IDEA, DES, 3DES, and AES) is not significantly affected by the size of input data on the three platforms.
The message is encrypted using the block cipher algorithm in CBC mode to create a chain of blocks.
Tokyo, Japan, Mar 23, 2007 - (JCN Newswire) - Sony Corporation today announced "CLEFIA",[1] a new highly secure and efficient block cipher algorithm that delivers advanced copyright protection and authentication, which is essential in the growing environment of digital data distribution, such as music and images.
CCM is based on an approved symmetric key block cipher algorithm with 128-bit block size, such as the Advanced Encryption Standard (AES) algorithm currently specified in FIPS 197.
Somdip Dey, Joyshree Nath, Asoke Nath,"An Integrated Symmetric Key Cryptographic Method-Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm", IJMECS, vol.4, no.5, pp.1-9, 2012.
Windarta, "Modified SNOW 3G: Stream cipher algorithm using piecewise linear chaotic map," in Proceedings of the AIP Conference Proceedings, vol.
For Kuznyechik, the linear transformation of each round is iterated 16 times, which is equivalent to 16 rounds of other block cipher algorithms. Therefore, the characteristic matrix of [R.sup.16] (i.e.
Many stream cipher algorithms use LFSR, especially in hardware architecture, but RC4 design does not.