Knowledge (XXG)

CS-Cipher

Source đź“ť

1631: 1659: 25: 224:
The algorithm uses a key length between 0 and 128 bits (length must be a multiple of 8 bits). By default, the cipher uses 128 bits. It operates on blocks of 64 bits using an 8-round
1611: 1441: 1294: 1229: 310: 35: 1056: 412: 1696: 1046: 540: 947: 1209: 1183: 1051: 1024: 1287: 1193: 303: 1072: 1490: 1250: 50: 255: 1280: 340: 93: 1725: 1606: 1561: 1374: 1136: 296: 241: 65: 1485: 1153: 1063: 1041: 354: 1689: 1601: 1158: 1014: 967: 442: 237: 162: 72: 1720: 1591: 1581: 1436: 1224: 1106: 981: 350: 1586: 1576: 1379: 1339: 1332: 1322: 1317: 1163: 952: 323: 229: 79: 1715: 1327: 1255: 1131: 1126: 1078: 233: 927: 1634: 1480: 1426: 1245: 1068: 505: 61: 1682: 1596: 1520: 1148: 1031: 957: 640: 620: 182: 1359: 1111: 1088: 407: 1465: 1449: 1396: 1096: 1004: 716: 645: 615: 560: 1525: 1515: 1386: 816: 515: 475: 470: 437: 397: 345: 1666: 1460: 1188: 1083: 962: 821: 701: 670: 364: 1035: 1019: 1008: 942: 901: 866: 796: 776: 650: 530: 525: 480: 225: 1535: 1455: 1416: 1364: 1349: 1173: 1121: 932: 917: 856: 851: 736: 485: 214: 175: 132: 86: 1709: 1616: 1571: 1530: 1510: 1406: 1369: 1344: 1168: 1116: 995: 977: 766: 741: 731: 555: 545: 392: 210: 128: 1566: 1411: 1401: 1391: 1354: 1303: 1101: 922: 886: 751: 630: 585: 417: 369: 319: 206: 194: 1545: 711: 706: 590: 259: 24: 1505: 1475: 1470: 1431: 1143: 861: 801: 685: 680: 625: 495: 358: 264: 1495: 876: 871: 761: 675: 550: 1658: 1540: 1500: 1214: 1178: 972: 635: 510: 490: 402: 152: 881: 831: 791: 781: 726: 721: 565: 374: 1421: 1219: 841: 836: 771: 756: 746: 691: 665: 660: 655: 535: 520: 218: 937: 896: 846: 826: 811: 600: 580: 500: 465: 786: 695: 610: 605: 595: 575: 447: 432: 1276: 292: 891: 806: 427: 422: 18: 42: 1670: 46: 1442:
Cryptographically secure pseudorandom number generator
280: 1554: 1310: 1238: 1202: 991: 910: 456: 383: 331: 181: 171: 161: 151: 146: 138: 124: 119: 1690: 1288: 304: 8: 114: 51:introducing citations to additional sources 1697: 1683: 1295: 1281: 1273: 311: 297: 289: 285: 281: 41:Relevant discussion may be found on the 1665:This cryptography-related article is a 113: 232:. The round function is based on the 7: 1655: 1653: 1669:. You can help Knowledge (XXG) by 14: 236:and uses the binary expansion of 217:in 1998. It was submitted to the 1657: 1630: 1629: 34:relies largely or entirely on a 23: 221:project, but was not selected. 1491:Information-theoretic security 254:J. Stern, S. Vaudenay (1998). 1: 242:nothing up my sleeve numbers 1607:Message authentication code 1562:Cryptographic hash function 1375:Cryptographic hash function 228:and is optimized for 8-bit 1742: 1652: 1486:Harvest now, decrypt later 1625: 1602:Post-quantum cryptography 1272: 1194:Time/memory/data tradeoff 288: 284: 1592:Quantum key distribution 1582:Authenticated encryption 1437:Random number generation 982:Whitening transformation 1587:Public-key cryptography 1577:Symmetric-key algorithm 1380:Key derivation function 1340:Cryptographic primitive 1333:Authentication protocol 1323:Outline of cryptography 1318:History of cryptography 953:Confusion and diffusion 1328:Cryptographic protocol 234:fast Fourier transform 203:Chiffrement SymĂ©trique 1481:End-to-end encryption 1427:Cryptojacking malware 1246:Initialization vector 1597:Quantum cryptography 1521:Trusted timestamping 1025:3-subset MITM attack 641:Intel Cascade Cipher 621:Hasty Pudding cipher 47:improve this article 1360:Cryptographic nonce 1064:Differential-linear 116: 1726:Cryptography stubs 1466:Subliminal channel 1450:Pseudorandom noise 1397:Key (cryptography) 1137:Differential-fault 355:internal mechanics 1678: 1677: 1647: 1646: 1643: 1642: 1526:Key-based routing 1516:Trapdoor function 1387:Digital signature 1268: 1267: 1264: 1263: 1251:Mode of operation 928:Lai–Massey scheme 191: 190: 112: 111: 97: 1733: 1699: 1692: 1685: 1661: 1654: 1633: 1632: 1461:Insecure channel 1297: 1290: 1283: 1274: 1122:Power-monitoring 963:Avalanche effect 671:Khufu and Khafre 324:security summary 313: 306: 299: 290: 286: 282: 277: 275: 274: 268: 258:. Archived from 240:as a source of " 117: 107: 104: 98: 96: 55: 27: 19: 1741: 1740: 1736: 1735: 1734: 1732: 1731: 1730: 1721:Feistel ciphers 1706: 1705: 1704: 1703: 1650: 1648: 1639: 1621: 1550: 1306: 1301: 1260: 1234: 1203:Standardization 1198: 1127:Electromagnetic 1079:Integral/Square 1036:Piling-up lemma 1020:Biclique attack 1009:EFF DES cracker 993: 987: 918:Feistel network 906: 531:CIPHERUNICORN-E 526:CIPHERUNICORN-A 458: 452: 385: 379: 333: 327: 317: 272: 270: 262: 253: 250: 226:Feistel network 176:Feistel network 139:First published 108: 102: 99: 56: 54: 40: 28: 17: 12: 11: 5: 1739: 1737: 1729: 1728: 1723: 1718: 1708: 1707: 1702: 1701: 1694: 1687: 1679: 1676: 1675: 1662: 1645: 1644: 1641: 1640: 1638: 1637: 1626: 1623: 1622: 1620: 1619: 1614: 1612:Random numbers 1609: 1604: 1599: 1594: 1589: 1584: 1579: 1574: 1569: 1564: 1558: 1556: 1552: 1551: 1549: 1548: 1543: 1538: 1536:Garlic routing 1533: 1528: 1523: 1518: 1513: 1508: 1503: 1498: 1493: 1488: 1483: 1478: 1473: 1468: 1463: 1458: 1456:Secure channel 1453: 1447: 1446: 1445: 1434: 1429: 1424: 1419: 1417:Key stretching 1414: 1409: 1404: 1399: 1394: 1389: 1384: 1383: 1382: 1377: 1367: 1365:Cryptovirology 1362: 1357: 1352: 1350:Cryptocurrency 1347: 1342: 1337: 1336: 1335: 1325: 1320: 1314: 1312: 1308: 1307: 1302: 1300: 1299: 1292: 1285: 1277: 1270: 1269: 1266: 1265: 1262: 1261: 1259: 1258: 1253: 1248: 1242: 1240: 1236: 1235: 1233: 1232: 1227: 1222: 1217: 1212: 1206: 1204: 1200: 1199: 1197: 1196: 1191: 1186: 1181: 1176: 1171: 1166: 1161: 1156: 1151: 1146: 1141: 1140: 1139: 1134: 1129: 1124: 1119: 1109: 1104: 1099: 1094: 1086: 1081: 1076: 1069:Distinguishing 1066: 1061: 1060: 1059: 1054: 1049: 1039: 1029: 1028: 1027: 1022: 1012: 1001: 999: 989: 988: 986: 985: 975: 970: 965: 960: 955: 950: 945: 940: 935: 933:Product cipher 930: 925: 920: 914: 912: 908: 907: 905: 904: 899: 894: 889: 884: 879: 874: 869: 864: 859: 854: 849: 844: 839: 834: 829: 824: 819: 814: 809: 804: 799: 794: 789: 784: 779: 774: 769: 764: 759: 754: 749: 744: 739: 734: 729: 724: 719: 714: 709: 704: 699: 688: 683: 678: 673: 668: 663: 658: 653: 648: 643: 638: 633: 628: 623: 618: 613: 608: 603: 598: 593: 588: 583: 578: 573: 568: 563: 561:Cryptomeria/C2 558: 553: 548: 543: 538: 533: 528: 523: 518: 513: 508: 503: 498: 493: 488: 483: 478: 473: 468: 462: 460: 454: 453: 451: 450: 445: 440: 435: 430: 425: 420: 415: 410: 405: 400: 395: 389: 387: 381: 380: 378: 377: 372: 367: 362: 348: 343: 337: 335: 329: 328: 318: 316: 315: 308: 301: 293: 279: 278: 249: 246: 215:Serge Vaudenay 189: 188: 185: 179: 178: 173: 169: 168: 165: 159: 158: 155: 149: 148: 144: 143: 140: 136: 135: 133:Serge Vaudenay 126: 122: 121: 110: 109: 45:. Please help 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 1738: 1727: 1724: 1722: 1719: 1717: 1716:Block ciphers 1714: 1713: 1711: 1700: 1695: 1693: 1688: 1686: 1681: 1680: 1674: 1672: 1668: 1663: 1660: 1656: 1651: 1636: 1628: 1627: 1624: 1618: 1617:Steganography 1615: 1613: 1610: 1608: 1605: 1603: 1600: 1598: 1595: 1593: 1590: 1588: 1585: 1583: 1580: 1578: 1575: 1573: 1572:Stream cipher 1570: 1568: 1565: 1563: 1560: 1559: 1557: 1553: 1547: 1544: 1542: 1539: 1537: 1534: 1532: 1531:Onion routing 1529: 1527: 1524: 1522: 1519: 1517: 1514: 1512: 1511:Shared secret 1509: 1507: 1504: 1502: 1499: 1497: 1494: 1492: 1489: 1487: 1484: 1482: 1479: 1477: 1474: 1472: 1469: 1467: 1464: 1462: 1459: 1457: 1454: 1451: 1448: 1443: 1440: 1439: 1438: 1435: 1433: 1430: 1428: 1425: 1423: 1420: 1418: 1415: 1413: 1410: 1408: 1407:Key generator 1405: 1403: 1400: 1398: 1395: 1393: 1390: 1388: 1385: 1381: 1378: 1376: 1373: 1372: 1371: 1370:Hash function 1368: 1366: 1363: 1361: 1358: 1356: 1353: 1351: 1348: 1346: 1345:Cryptanalysis 1343: 1341: 1338: 1334: 1331: 1330: 1329: 1326: 1324: 1321: 1319: 1316: 1315: 1313: 1309: 1305: 1298: 1293: 1291: 1286: 1284: 1279: 1278: 1275: 1271: 1257: 1254: 1252: 1249: 1247: 1244: 1243: 1241: 1237: 1231: 1228: 1226: 1223: 1221: 1218: 1216: 1213: 1211: 1208: 1207: 1205: 1201: 1195: 1192: 1190: 1187: 1185: 1182: 1180: 1177: 1175: 1172: 1170: 1167: 1165: 1162: 1160: 1157: 1155: 1152: 1150: 1149:Interpolation 1147: 1145: 1142: 1138: 1135: 1133: 1130: 1128: 1125: 1123: 1120: 1118: 1115: 1114: 1113: 1110: 1108: 1105: 1103: 1100: 1098: 1095: 1093: 1092: 1087: 1085: 1082: 1080: 1077: 1074: 1070: 1067: 1065: 1062: 1058: 1055: 1053: 1050: 1048: 1045: 1044: 1043: 1040: 1037: 1033: 1030: 1026: 1023: 1021: 1018: 1017: 1016: 1013: 1010: 1006: 1003: 1002: 1000: 997: 996:cryptanalysis 990: 983: 979: 978:Key whitening 976: 974: 971: 969: 966: 964: 961: 959: 956: 954: 951: 949: 946: 944: 941: 939: 936: 934: 931: 929: 926: 924: 921: 919: 916: 915: 913: 909: 903: 900: 898: 895: 893: 890: 888: 885: 883: 880: 878: 875: 873: 870: 868: 865: 863: 860: 858: 855: 853: 850: 848: 845: 843: 840: 838: 835: 833: 830: 828: 825: 823: 820: 818: 815: 813: 810: 808: 805: 803: 800: 798: 795: 793: 790: 788: 785: 783: 780: 778: 775: 773: 770: 768: 767:New Data Seal 765: 763: 760: 758: 755: 753: 750: 748: 745: 743: 740: 738: 735: 733: 730: 728: 725: 723: 720: 718: 715: 713: 710: 708: 705: 703: 700: 697: 693: 689: 687: 684: 682: 679: 677: 674: 672: 669: 667: 664: 662: 659: 657: 654: 652: 649: 647: 644: 642: 639: 637: 634: 632: 629: 627: 624: 622: 619: 617: 614: 612: 609: 607: 604: 602: 599: 597: 594: 592: 589: 587: 584: 582: 579: 577: 574: 572: 569: 567: 564: 562: 559: 557: 554: 552: 549: 547: 544: 542: 539: 537: 534: 532: 529: 527: 524: 522: 519: 517: 514: 512: 509: 507: 506:BEAR and LION 504: 502: 499: 497: 494: 492: 489: 487: 484: 482: 479: 477: 474: 472: 469: 467: 464: 463: 461: 455: 449: 446: 444: 441: 439: 436: 434: 431: 429: 426: 424: 421: 419: 416: 414: 411: 409: 406: 404: 401: 399: 396: 394: 391: 390: 388: 382: 376: 373: 371: 368: 366: 363: 360: 356: 352: 349: 347: 344: 342: 339: 338: 336: 330: 325: 321: 320:Block ciphers 314: 309: 307: 302: 300: 295: 294: 291: 287: 283: 269:on 2004-11-27 266: 261: 257: 252: 251: 247: 245: 243: 239: 235: 231: 227: 222: 220: 216: 212: 211:Jacques Stern 208: 204: 200: 196: 186: 184: 180: 177: 174: 170: 166: 164: 160: 156: 154: 150: 147:Cipher detail 145: 141: 137: 134: 130: 129:Jacques Stern 127: 123: 118: 106: 95: 92: 88: 85: 81: 78: 74: 71: 67: 64: â€“  63: 59: 58:Find sources: 52: 48: 44: 38: 37: 36:single source 32:This article 30: 26: 21: 20: 1671:expanding it 1664: 1649: 1567:Block cipher 1412:Key schedule 1402:Key exchange 1392:Kleptography 1355:Cryptosystem 1304:Cryptography 1154:Partitioning 1112:Side-channel 1090: 1057:Higher-order 1042:Differential 923:Key schedule 570: 271:. Retrieved 260:the original 223: 209:invented by 207:block cipher 202: 198: 195:cryptography 192: 100: 90: 83: 76: 69: 57: 33: 16:Block cipher 1555:Mathematics 1546:Mix network 1239:Utilization 1225:NSA Suite B 1210:AES process 1159:Rubber-hose 1097:Related-key 1005:Brute-force 384:Less common 256:"CS-Cipher" 163:Block sizes 62:"CS-Cipher" 1710:Categories 1506:Ciphertext 1476:Decryption 1471:Encryption 1432:Ransomware 1189:Chi-square 1107:Rotational 1047:Impossible 968:Block size 862:Spectr-H64 686:Ladder-DES 681:Kuznyechik 626:Hierocrypt 496:BassOmatic 459:algorithms 386:algorithms 359:Triple DES 334:algorithms 273:2007-02-15 265:PostScript 248:References 230:processors 103:April 2024 73:newspapers 1496:Plaintext 1164:Black-bag 1084:Boomerang 1073:Known-key 1052:Truncated 877:Threefish 872:SXAL/MBAL 762:MultiSwap 717:MacGuffin 676:KN-Cipher 616:Grand Cru 571:CS-Cipher 551:COCONUT98 199:CS-Cipher 172:Structure 153:Key sizes 125:Designers 115:CS-Cipher 43:talk page 1635:Category 1541:Kademlia 1501:Codetext 1444:(CSPRNG) 1215:CRYPTREC 1179:Weak key 1132:Acoustic 973:Key size 817:Red Pike 636:IDEA NXT 516:Chiasmus 511:CAST-256 491:BaseKing 476:Akelarre 471:Adiantum 438:Skipjack 403:CAST-128 398:Camellia 346:Blowfish 157:128 bits 1311:General 1256:Padding 1174:Rebound 882:Treyfer 832:SAVILLE 792:PRESENT 782:NOEKEON 727:MAGENTA 722:Madryga 702:Lucifer 566:CRYPTON 375:Twofish 365:Serpent 205:) is a 167:64 bits 120:General 87:scholar 1422:Keygen 1220:NESSIE 1169:Davies 1117:Timing 1032:Linear 992:Attack 911:Design 902:Zodiac 867:Square 842:SHACAL 837:SC2000 797:Prince 777:Nimbus 772:NewDES 757:MULTI2 747:MISTY1 690:LOKI ( 666:KHAZAD 661:KeeLoq 656:KASUMI 651:Kalyna 536:CLEFIA 521:CIKS-1 481:Anubis 332:Common 219:NESSIE 183:Rounds 89:  82:  75:  68:  60:  1452:(PRN) 1102:Slide 958:Round 943:P-box 938:S-box 897:XXTEA 857:Speck 852:Simon 847:SHARK 827:SAFER 812:REDOC 737:Mercy 696:89/91 646:Iraqi 611:G-DES 601:FEA-M 581:DES-X 546:Cobra 501:BATON 486:Ascon 466:3-Way 457:Other 201:(for 94:JSTOR 80:books 1667:stub 1230:CNSA 1089:Mod 1015:MITM 787:NUSH 742:MESH 732:MARS 606:FROG 596:FEAL 576:DEAL 556:Crab 541:CMEA 448:XTEA 433:SEED 413:IDEA 408:GOST 393:ARIA 213:and 142:1998 131:and 66:news 1184:Tau 1144:XSL 948:SPN 892:xmx 887:UES 822:S-1 807:RC2 752:MMB 631:ICE 586:DFC 443:TEA 428:RC6 423:RC5 418:LEA 370:SM4 351:DES 341:AES 244:". 193:In 49:by 1712:: 712:M8 707:M6 694:, 692:97 591:E2 357:, 197:, 1698:e 1691:t 1684:v 1673:. 1296:e 1289:t 1282:v 1091:n 1075:) 1071:( 1038:) 1034:( 1011:) 1007:( 998:) 994:( 984:) 980:( 802:Q 698:) 361:) 353:( 326:) 322:( 312:e 305:t 298:v 276:. 267:) 263:( 238:e 187:8 105:) 101:( 91:· 84:· 77:· 70:· 53:. 39:.

Index


single source
talk page
improve this article
introducing citations to additional sources
"CS-Cipher"
news
newspapers
books
scholar
JSTOR
Jacques Stern
Serge Vaudenay
Key sizes
Block sizes
Feistel network
Rounds
cryptography
block cipher
Jacques Stern
Serge Vaudenay
NESSIE
Feistel network
processors
fast Fourier transform
e
nothing up my sleeve numbers
"CS-Cipher"
the original
PostScript

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑