32:
440:
340:
225:, and this limited advances in mathematics. In this transition, the word was adopted into Medieval Latin as cifra, and then into Middle French as cifre. This eventually led to the English word cipher (minority spelling cypher). One theory for how the term came to refer to encoding is that the concept of zero was confusing to Europeans, and so the term came to refer to a message or communication that was not easily understood.
397:) which changed the substitution alphabet for every letter. For example, "GOOD DOG" can be encrypted as "PLSX TWF" where "L", "S", and "W" substitute for "O". With even a small amount of known or estimated plaintext, simple polyalphabetic substitution ciphers and letter transposition ciphers designed for pen and paper encryption are easy to crack. It is possible to create a secure pen and paper cipher based on a
89:
1549:
212:). If the algorithm is symmetric, the key must be known to the recipient and sender and to no one else. If the algorithm is an asymmetric one, the enciphering key is different from, but closely related to, the deciphering key. If one key cannot be deduced from the other, the asymmetric key algorithm has the public/private key property and one of the keys may be made public without loss of confidentiality.
409:, several rotor disks provided polyalphabetic substitution, while plug boards provided another substitution. Keys were easily changed by changing the rotor disks and the plugboard wires. Although these encryption methods were more complex than previous schemes and required machines to encrypt and decrypt, other machines such as the British
186:). The encrypting procedure is varied depending on the key, which changes the detailed operation of the algorithm. A key must be selected before using a cipher to encrypt a message. Without knowledge of the key, it should be extremely difficult, if not impossible, to decrypt the resulting ciphertext into readable plaintext.
486:
Computational power available, i.e., the computing power which can be brought to bear on the problem. It is important to note that average performance/capacity of a single computer is not the only factor to consider. An adversary can use multiple computers at once, for instance, to increase the speed
154:
Codes generally substitute different length strings of characters in the output, while ciphers generally substitute the same number of characters as are input. A code maps one meaning with another. Words and phrases can be coded as letters or numbers. Codes typically have direct meaning from input to
456:
In a symmetric key algorithm (e.g., DES and AES), the sender and receiver must have a shared key set up in advance and kept secret from all other parties; the sender uses this key for encryption, and the receiver uses the same key for decryption. The design of AES (Advanced
Encryption System) was
375:). For example, "GOOD DOG" can be encrypted as "PLLX XLP" where "L" substitutes for "O", "P" for "G", and "X" for "D" in the message. Transposition of the letters "GOOD DOG" can result in "DGOGDOO". These simple ciphers and examples are easy to crack, even without plaintext-ciphertext pairs.
265:(meaning Chinese characters in Japanese) characters to supplement the native Japanese characters representing syllables. An example using English language with Kanji could be to replace "The quick brown fox jumps over the lazy dog" by "The quick brown 狐 jumps 上 the lazy 犬".
246:
In casual contexts, "code" and "cipher" can typically be used interchangeably; however, the technical usages of the words refer to different concepts. Codes contain meaning; words and phrases are assigned to numbers or symbols, creating a shorter message.
457:
beneficial because it aimed to overcome the flaws in the design of the DES (Data encryption standard). AES's designer's claim that the common means of modern cipher cryptanalytic attacks are ineffective against AES due to its design structure.
351:
is one of the earliest known cryptographic systems. Julius Caesar used a cipher that shifts the letters in the alphabet in place by three and wrapping the remaining letters to the front to write to Marcus
Tullius Cicero in approximately 50 BC.
272:
Ciphers, on the other hand, work at a lower level: the level of individual letters, small groups of letters, or, in modern schemes, individual bits and blocks of bits. Some systems used both codes and ciphers in one system, using
162:
which linked a random string of characters or numbers to a word or phrase. For example, "UQJHSE" could be the code for "Proceed to the following coordinates." When using a cipher the original information is known as
404:
During the early twentieth century, electro-mechanical machines were invented to do encryption and decryption using transposition, polyalphabetic substitution, and a kind of "additive" substitution. In
221:
Originating from the Arabic word for zero صفر (sifr), the word "cipher" spread to Europe as part of the Arabic numeral system during the Middle Ages. The Roman numeral system lacked the concept of
155:
key. Codes primarily function to save time. Ciphers are algorithmic. The given input must follow the cipher's process to be solved. Ciphers are commonly used to encrypt written information.
1529:
1359:
171:. The ciphertext message contains all the information of the plaintext message, but is not in a format readable by a human or computer without the proper mechanism to decrypt it.
232:
was later also used to refer to any Arabic digit, or to calculation using them, so encoding text in the form of Arabic numerals is literally converting the text to "ciphers".
989:
530:
proved, using information theory considerations, that any theoretically unbreakable cipher must have keys which are at least as long as the plaintext, and used only once:
910:. 2005 13th IEEE International Conference on Networks, Jointly held with the 2005 IEEE 7th Malaysia International Conference on Communication. Vol. 2. Kuala Lumpur:
1119:
837:
261:
Another example is given by whole word ciphers, which allow the user to replace an entire word with a symbol or character, much like the way written
Japanese utilizes
971:
1008:
1212:
331:
are substantially different from modern methods, and modern ciphers can be classified according to how they operate and whether they use one or two keys.
296:
Historically, cryptography was split into a dichotomy of codes and ciphers, while coding had its own terminology analogous to that of ciphers: "
379:
1165:
1133:
813:
53:
1089:
597:
728:
1205:
1097:
1022:
947:
884:
713:
75:
979:
675:
251:
1038:
1408:
254:
which was used to shorten long telegraph messages which resulted from entering into commercial contracts using exchanges of
147:", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially
482:
In a pure mathematical attack, (i.e., lacking any other information to help break a cipher) two factors above all count:
1198:
143:. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "
1524:
1479:
1292:
521:
390:
46:
40:
1403:
1181:
1519:
1004:
319:. Because of this, codes have fallen into disuse in modern cryptography, and ciphers are the dominant technique.
57:
1509:
1499:
1354:
445:
432:
209:
139:—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is
1504:
1494:
1297:
1257:
1250:
1240:
1235:
449:
428:
328:
205:
20:
1245:
866:
421:
Modern encryption methods can be divided by two criteria: by type of key used, and by type of input data.
148:
1577:
1552:
1398:
1344:
497:, i.e., the size of key used to encrypt a message. As the key size increases, so does the complexity of
615:"Vt hkskdkxt: Early Medieval Cryptography, Textual Errors, and Scribal Agency (Speculum, forthcoming)"
1514:
1438:
1014:
368:
100:
92:
1277:
933:
558:
553:
360:
241:
144:
1383:
1367:
1314:
1063:
1055:
965:
876:
795:
783:
642:
634:
175:
439:
394:
339:
1443:
1433:
1304:
1161:
1129:
1115:
1093:
1018:
953:
943:
880:
854:
819:
809:
709:
593:
498:
488:
383:
372:
274:
1582:
1378:
1047:
937:
915:
846:
805:
775:
626:
356:
1103:
890:
735:
174:
The operation of a cipher usually depends on a piece of auxiliary information, called a
1453:
1373:
1334:
1282:
1267:
1081:
799:
568:
543:
527:
88:
1571:
1534:
1489:
1448:
1428:
1324:
1287:
1262:
646:
563:
470:
406:
348:
327:
There are a variety of different types of encryption. Algorithms used earlier in the
312:
198:
108:
1067:
787:
505:
Since the desired effect is computational difficulty, in theory one would choose an
1484:
1329:
1319:
1309:
1272:
1221:
1149:
1051:
984:
701:
548:
531:
517:
464:
398:
194:
116:
96:
870:
1033:
1463:
1125:
766:
104:
904:
1423:
1393:
1388:
1349:
919:
779:
168:
136:
132:
858:
823:
764:
Al-Kadi, Ibrahim A. (1992). "Origins of
Cryptology: The Arab Contributions".
1413:
1157:
957:
506:
266:
164:
128:
894:
1107:
850:
516:
which uses multiple reports to suggest that a symmetrical cipher with 128
1458:
1418:
494:
355:
Historical pen and paper ciphers used in the past are sometimes known as
316:
255:
159:
1010:
The
Ciphers of the Monks: A Forgotten Number-notation of the Middle Ages
638:
311:
However, codes have a variety of drawbacks, including susceptibility to
1059:
801:
GCHQ: The
Uncensored Story of Britain's Most Secret Intelligence Agency
501:
to the point where it becomes impractical to crack encryption directly.
460:
Ciphers can be distinguished into two types by the type of input data:
509:
and desired difficulty level, thus decide the key length accordingly.
1339:
676:"English Civil War cipher belonging to Cromwell ally goes on display"
614:
382:, developed ciphers to send coded messages to his allies during the
204:
By whether the same key is used for both encryption and decryption (
630:
452:), where two different keys are used for encryption and decryption.
193:
By whether they work on blocks of symbols usually of a fixed size (
438:
410:
364:
338:
262:
87:
911:
590:
The Muslim Next Door: The Qur'an, the Media, and That Veil Thing
435:), where one same key is used for encryption and decryption, and
1194:
179:
25:
1034:"Cryptology: From Caesar Ciphers to Public-key Cryptosystems"
513:
1121:
Cryptography and
Network Security: Principles and Practices
269:
sometimes use specific symbols to abbreviate whole words.
222:
189:
Most modern ciphers can be categorized in several ways:
906:
524:
with 256 bits, all have similar difficulty at present.
1360:
Cryptographically secure pseudorandom number generator
902:
Ho, Yean Li; Samsudin, Azman; Belaton, Bahari (2005).
491:
for a key (i.e., "brute force" attack) substantially.
1186:
158:
Codes operated by substituting according to a large
1472:
1228:
343:
Visual representation of how Caesar's Cipher works.
16:
Algorithm for encrypting and decrypting information
903:
520:, an asymmetric cipher with 3072 bit keys, and an
277:to increase the security. In some cases the terms
1086:Elementary Cryptanalysis: A Mathematical Approach
413:were invented to crack these encryption methods.
467:, which encrypt block of data of fixed size, and
831:Caldwell, William Casey (2022). "Shakespeare's
939:The Codebreakers – The Story of Secret Writing
424:By type of key used ciphers are divided into:
1206:
378:In the 1640s, the Parliamentarian commander,
8:
838:SEL: Studies in English Literature 1500–1900
315:and the difficulty of managing a cumbersome
512:An example of this process can be found at
473:, which encrypt continuous streams of data.
208:), or if a different key is used for each (
1213:
1199:
1191:
1187:
1032:Luciano, Dennis; Prichett, Gordon (1987).
970:: CS1 maint: location missing publisher (
1090:Mathematical Association of America Press
729:"Communication Theory of Secrecy Systems"
197:), or on a continuous stream of symbols (
76:Learn how and when to remove this message
39:This article includes a list of general
592:. White Cloud Press. pp. 240–241.
580:
963:
401:, but these have other disadvantages.
380:Edward Montagu, 2nd Earl of Manchester
7:
103:. Also includes runically unrelated
706:Cryptogtaphy / Theory and Practice
45:it lacks sufficient corresponding
14:
1154:Cryptography: Theory and Practice
1548:
1547:
1152:; Paterson, Maura (2023-01-09).
875:(Corrected ed.). New York:
389:Simple ciphers were replaced by
30:
1039:The College Mathematics Journal
992:from the original on 2024-01-17
1409:Information-theoretic security
1052:10.1080/07468342.1987.11973000
942:(Revised ed.). New York.
613:Saltzman, Benjamin A. (2018).
1:
835:and the Ciphers of History".
588:Ali-Karamali, Sumbul (2008).
99:resembling that found on the
167:, and the encrypted form as
1525:Message authentication code
1480:Cryptographic hash function
1293:Cryptographic hash function
391:polyalphabetic substitution
285:are used synonymously with
1601:
1404:Harvest now, decrypt later
478:Key size and vulnerability
250:An example of this is the
239:
18:
1543:
1520:Post-quantum cryptography
1190:
920:10.1109/ICON.2005.1635595
780:10.1080/0161-119291866801
708:, CRC Press, p. 45,
660:Janeczko, Paul B (2004).
446:asymmetric key algorithms
252:commercial telegraph code
210:asymmetric key algorithms
1510:Quantum key distribution
1500:Authenticated encryption
1355:Random number generation
433:Private-key cryptography
429:symmetric key algorithms
206:symmetric key algorithms
1505:Public-key cryptography
1495:Symmetric-key algorithm
1298:Key derivation function
1258:Cryptographic primitive
1251:Authentication protocol
1241:Outline of cryptography
1236:History of cryptography
1150:Stinson, Douglas Robert
450:Public-key cryptography
329:history of cryptography
60:more precise citations.
21:Cipher (disambiguation)
1246:Cryptographic protocol
796:Aldrich, Richard James
443:
359:. They include simple
344:
149:classical cryptography
112:
1399:End-to-end encryption
1345:Cryptojacking malware
851:10.1353/sel.2022.0003
522:elliptic curve cipher
442:
393:ciphers (such as the
369:transposition ciphers
342:
91:
1515:Quantum cryptography
1439:Trusted timestamping
1015:Franz Steiner Verlag
914:. pp. 710–715.
867:Gaines, Helen Fouché
361:substitution ciphers
178:(or, in traditional
101:Kensington Runestone
19:For other uses, see
1278:Cryptographic nonce
980:"Ciphers vs. codes"
702:Stinson, Douglas R.
559:List of ciphertexts
554:Encryption software
242:Code (cryptography)
1384:Subliminal channel
1368:Pseudorandom noise
1315:Key (cryptography)
1116:Stallings, William
877:Dover Publications
444:
345:
113:
107:writing style and
1565:
1564:
1561:
1560:
1444:Key-based routing
1434:Trapdoor function
1305:Digital signature
1167:978-1-032-47604-9
1135:978-0-13-670722-6
815:978-0-00-727847-3
499:exhaustive search
489:exhaustive search
384:English Civil War
373:Rail Fence Cipher
357:classical ciphers
275:superencipherment
86:
85:
78:
1590:
1551:
1550:
1379:Insecure channel
1215:
1208:
1201:
1192:
1188:
1171:
1156:(6th ed.).
1145:
1143:
1142:
1124:(8th ed.).
1111:
1077:
1075:
1074:
1028:
1000:
998:
997:
975:
969:
961:
929:
927:
926:
909:
898:
862:
827:
806:HarperCollins UK
791:
751:
750:
748:
746:
740:
734:. Archived from
733:
725:
719:
718:
698:
692:
691:
689:
687:
672:
666:
665:
657:
651:
650:
610:
604:
603:
585:
293:, respectively.
81:
74:
70:
67:
61:
56:this article by
47:inline citations
34:
33:
26:
1600:
1599:
1593:
1592:
1591:
1589:
1588:
1587:
1568:
1567:
1566:
1557:
1539:
1468:
1224:
1219:
1178:
1168:
1148:
1140:
1138:
1136:
1114:
1100:
1082:Sinkov, Abraham
1080:
1072:
1070:
1031:
1025:
1003:
995:
993:
978:
962:
950:
932:
924:
922:
901:
887:
865:
830:
816:
794:
763:
760:
755:
754:
744:
742:
741:on June 5, 2007
738:
731:
727:
726:
722:
716:
700:
699:
695:
685:
683:
674:
673:
669:
659:
658:
654:
612:
611:
607:
600:
587:
586:
582:
577:
540:
480:
419:
337:
325:
244:
238:
219:
131:for performing
82:
71:
65:
62:
52:Please help to
51:
35:
31:
24:
17:
12:
11:
5:
1598:
1597:
1594:
1586:
1585:
1580:
1570:
1569:
1563:
1562:
1559:
1558:
1556:
1555:
1544:
1541:
1540:
1538:
1537:
1532:
1530:Random numbers
1527:
1522:
1517:
1512:
1507:
1502:
1497:
1492:
1487:
1482:
1476:
1474:
1470:
1469:
1467:
1466:
1461:
1456:
1454:Garlic routing
1451:
1446:
1441:
1436:
1431:
1426:
1421:
1416:
1411:
1406:
1401:
1396:
1391:
1386:
1381:
1376:
1374:Secure channel
1371:
1365:
1364:
1363:
1352:
1347:
1342:
1337:
1335:Key stretching
1332:
1327:
1322:
1317:
1312:
1307:
1302:
1301:
1300:
1295:
1285:
1283:Cryptovirology
1280:
1275:
1270:
1268:Cryptocurrency
1265:
1260:
1255:
1254:
1253:
1243:
1238:
1232:
1230:
1226:
1225:
1220:
1218:
1217:
1210:
1203:
1195:
1185:
1184:
1177:
1176:External links
1174:
1173:
1172:
1166:
1146:
1134:
1118:(2020-01-03).
1112:
1098:
1078:
1029:
1023:
1005:King, David A.
1001:
976:
948:
930:
899:
885:
863:
845:(2): 241–268.
828:
814:
792:
759:
756:
753:
752:
720:
714:
693:
682:. 12 July 2023
667:
652:
631:10.1086/698861
605:
599:978-0974524566
598:
579:
578:
576:
573:
572:
571:
569:Telegraph code
566:
561:
556:
551:
546:
544:Autokey cipher
539:
536:
528:Claude Shannon
503:
502:
492:
479:
476:
475:
474:
471:stream ciphers
468:
454:
453:
436:
418:
415:
407:rotor machines
336:
333:
324:
321:
240:Main article:
237:
234:
218:
215:
214:
213:
202:
199:stream ciphers
184:cryptovariable
93:Edward Larsson
84:
83:
38:
36:
29:
15:
13:
10:
9:
6:
4:
3:
2:
1596:
1595:
1584:
1581:
1579:
1576:
1575:
1573:
1554:
1546:
1545:
1542:
1536:
1535:Steganography
1533:
1531:
1528:
1526:
1523:
1521:
1518:
1516:
1513:
1511:
1508:
1506:
1503:
1501:
1498:
1496:
1493:
1491:
1490:Stream cipher
1488:
1486:
1483:
1481:
1478:
1477:
1475:
1471:
1465:
1462:
1460:
1457:
1455:
1452:
1450:
1449:Onion routing
1447:
1445:
1442:
1440:
1437:
1435:
1432:
1430:
1429:Shared secret
1427:
1425:
1422:
1420:
1417:
1415:
1412:
1410:
1407:
1405:
1402:
1400:
1397:
1395:
1392:
1390:
1387:
1385:
1382:
1380:
1377:
1375:
1372:
1369:
1366:
1361:
1358:
1357:
1356:
1353:
1351:
1348:
1346:
1343:
1341:
1338:
1336:
1333:
1331:
1328:
1326:
1325:Key generator
1323:
1321:
1318:
1316:
1313:
1311:
1308:
1306:
1303:
1299:
1296:
1294:
1291:
1290:
1289:
1288:Hash function
1286:
1284:
1281:
1279:
1276:
1274:
1271:
1269:
1266:
1264:
1263:Cryptanalysis
1261:
1259:
1256:
1252:
1249:
1248:
1247:
1244:
1242:
1239:
1237:
1234:
1233:
1231:
1227:
1223:
1216:
1211:
1209:
1204:
1202:
1197:
1196:
1193:
1189:
1183:
1180:
1179:
1175:
1169:
1163:
1159:
1155:
1151:
1147:
1137:
1131:
1127:
1123:
1122:
1117:
1113:
1109:
1105:
1101:
1099:0-88385-622-0
1095:
1091:
1087:
1083:
1079:
1069:
1065:
1061:
1057:
1053:
1049:
1045:
1041:
1040:
1035:
1030:
1026:
1024:3-515-07640-9
1020:
1016:
1013:. Stuttgart:
1012:
1011:
1006:
1002:
991:
987:
986:
981:
977:
973:
967:
959:
955:
951:
949:0-684-83130-9
945:
941:
940:
935:
931:
921:
917:
913:
908:
907:
900:
896:
892:
888:
886:0-486-20097-3
882:
878:
874:
873:
872:Cryptanalysis
868:
864:
860:
856:
852:
848:
844:
840:
839:
834:
829:
825:
821:
817:
811:
807:
803:
802:
797:
793:
789:
785:
781:
777:
774:(2): 97–126.
773:
769:
768:
762:
761:
757:
737:
730:
724:
721:
717:
715:0-8493-8521-0
711:
707:
703:
697:
694:
681:
677:
671:
668:
663:
656:
653:
648:
644:
640:
636:
632:
628:
624:
620:
616:
609:
606:
601:
595:
591:
584:
581:
574:
570:
567:
565:
564:Steganography
562:
560:
557:
555:
552:
550:
547:
545:
542:
541:
537:
535:
533:
529:
525:
523:
519:
515:
510:
508:
500:
496:
493:
490:
485:
484:
483:
477:
472:
469:
466:
465:block ciphers
463:
462:
461:
458:
451:
447:
441:
437:
434:
430:
427:
426:
425:
422:
416:
414:
412:
408:
402:
400:
396:
392:
387:
385:
381:
376:
374:
370:
366:
362:
358:
353:
350:
349:Caesar Cipher
341:
334:
332:
330:
322:
320:
318:
314:
313:cryptanalysis
309:
308:" and so on.
307:
303:
299:
294:
292:
291:transposition
288:
284:
280:
276:
270:
268:
267:Stenographers
264:
259:
257:
253:
248:
243:
235:
233:
231:
226:
224:
216:
211:
207:
203:
200:
196:
195:block ciphers
192:
191:
190:
187:
185:
181:
177:
172:
170:
166:
161:
156:
152:
150:
146:
142:
138:
134:
130:
126:
122:
118:
110:
109:pigpen cipher
106:
102:
98:
94:
90:
80:
77:
69:
59:
55:
49:
48:
42:
37:
28:
27:
22:
1578:Cryptography
1485:Block cipher
1330:Key schedule
1320:Key exchange
1310:Kleptography
1273:Cryptosystem
1222:Cryptography
1153:
1139:. Retrieved
1120:
1088:. New York:
1085:
1071:. Retrieved
1043:
1037:
1009:
994:. Retrieved
985:Khan Academy
983:
938:
923:. Retrieved
905:
871:
842:
836:
832:
800:
771:
765:
743:. Retrieved
736:the original
723:
705:
696:
684:. Retrieved
679:
670:
661:
655:
622:
618:
608:
589:
583:
549:Cover-coding
532:one-time pad
526:
511:
504:
481:
459:
455:
423:
420:
403:
399:one-time pad
388:
377:
354:
346:
326:
310:
305:
301:
297:
295:
290:
287:substitution
286:
282:
278:
271:
260:
249:
245:
236:Versus codes
229:
227:
220:
188:
183:
182:parlance, a
173:
157:
153:
141:encipherment
140:
124:
120:
117:cryptography
114:
72:
63:
44:
1473:Mathematics
1464:Mix network
1182:Kish cypher
1046:(1): 2–17.
934:Kahn, David
767:Cryptologia
745:February 3,
371:(such as a
105:blackletter
97:rune cipher
58:introducing
1572:Categories
1424:Ciphertext
1394:Decryption
1389:Encryption
1350:Ransomware
1141:2024-06-30
1073:2023-02-19
996:2024-06-30
925:2024-06-30
804:. London:
758:References
662:Top Secret
625:(4): 975.
514:Key Length
335:Historical
169:ciphertext
137:decryption
133:encryption
66:March 2009
41:references
1414:Plaintext
1158:CRC Press
966:cite book
936:(1996) .
869:(1956) .
859:1522-9270
824:503638180
647:165362817
507:algorithm
363:(such as
256:telegrams
228:The term
217:Etymology
165:plaintext
129:algorithm
1553:Category
1459:Kademlia
1419:Codetext
1362:(CSPRNG)
1084:(1968).
1068:14686417
1007:(2001).
990:Archived
958:35159231
895:7634764M
798:(2010).
788:62601575
704:(1995),
686:4 August
680:The Past
639:26584834
619:Speculum
538:See also
495:Key size
395:Vigenère
317:codebook
306:decoding
302:codetext
298:encoding
160:codebook
127:) is an
1583:Ciphers
1229:General
1126:Pearson
1108:149668W
1060:2686311
833:Henry V
283:ciphers
54:improve
1340:Keygen
1164:
1132:
1106:
1096:
1066:
1058:
1021:
956:
946:
893:
883:
857:
822:
812:
786:
712:
645:
637:
596:
417:Modern
367:) and
230:cipher
125:cypher
121:cipher
43:, but
1370:(PRN)
1064:S2CID
1056:JSTOR
784:S2CID
739:(PDF)
732:(PDF)
643:S2CID
635:JSTOR
575:Notes
411:Bombe
365:ROT13
323:Types
279:codes
263:Kanji
1162:ISBN
1130:ISBN
1094:ISBN
1019:ISBN
972:link
954:OCLC
944:ISBN
912:IEEE
881:ISBN
855:ISSN
820:OCLC
810:ISBN
747:2019
710:ISBN
688:2023
594:ISBN
518:bits
347:The
289:and
281:and
223:zero
145:code
123:(or
119:, a
1048:doi
916:doi
847:doi
776:doi
627:doi
487:of
180:NSA
176:key
135:or
115:In
95:'s
1574::
1160:.
1128:.
1104:OL
1102:.
1092:.
1062:.
1054:.
1044:18
1042:.
1036:.
1017:.
988:.
982:.
968:}}
964:{{
952:.
891:OL
889:.
879:.
853:.
843:61
841:.
818:.
808:.
782:.
772:16
770:.
678:.
641:.
633:.
623:93
621:.
617:.
534:.
386:.
304:,
300:,
258:.
201:).
151:.
1214:e
1207:t
1200:v
1170:.
1144:.
1110:.
1076:.
1050::
1027:.
999:.
974:)
960:.
928:.
918::
897:.
861:.
849::
826:.
790:.
778::
749:.
690:.
664:.
649:.
629::
602:.
448:(
431:(
111:.
79:)
73:(
68:)
64:(
50:.
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.