background preloader

REF - Encryption Algorithms

Facebook Twitter

Random number generation. A random number generator (RNG) is a computational or physical device designed to generate a sequence of numbers or symbols that lack any pattern, i.e. appear random.

Random number generation

The many applications of randomness have led to the development of several different methods for generating random data. Many of these have existed since ancient times, including dice, coin flipping, the shuffling of playing cards, the use of yarrow stalks (by divination) in the I Ching, and many other techniques. Because of the mechanical nature of these techniques, generating large numbers of sufficiently random numbers (important in statistics) required a lot of work and/or time. Thus, results would sometimes be collected and distributed as random number tables. Nowadays, after the advent of computational random number generators, a growing number of government-run lotteries, and lottery games, are using RNGs instead of more traditional drawing methods. Practical applications and uses[edit] Perfect but not Uusable - One-time pad. Excerpt from a one-time pad The "pad" part of the name comes from early implementations where the key material was distributed as a pad of paper, so that the top sheet could be easily torn off and destroyed after use.

Perfect but not Uusable - One-time pad

For ease of concealment, the pad was sometimes reduced to such a small size that a powerful magnifying glass was required to use it. The KGB used pads of such size that they could fit in the palm of one's hand,[8] or in a walnut shell.[9] To increase security, one-time pads were sometimes printed onto sheets of highly flammable nitrocellulose, so that they could be quickly burned after use.

There is some ambiguity to the term because some authors use the terms "Vernam cipher" and "one-time pad" synonymously, while others refer to any additive stream cipher as a "Vernam cipher", including those based on a cryptographically secure pseudorandom number generator (CSPRNG).[10] The spooky world of the 'numbers stations'

16 April 2014Last updated at 09:27 ET By Olivia Sorrel-Dejerine BBC News Magazine This is the era of hyper-tech espionage, encrypted emails and mindboggling cryptography.

The spooky world of the 'numbers stations'

But you can hear a very old-fashioned form of espionage on shortwave radio. It is 13:03 on a Tuesday in a cramped room with some fairly advanced radio equipment. Numbers station. A numbers station is a type of shortwave radio station characterized by unusual broadcasts, reading out lists of numbers or incomprehensible morse code messages.[1] The voices are often created by speech synthesis and are transmitted in a wide variety of languages.

Numbers station

The voices are usually female, although sometimes men's or children's voices are used. Some voices are synthesized and created by machines; however, some stations used to have live readers.[2] In June 2003, the United States similarly charged Walter Kendall Myers with conspiracy to spy for Cuba and receiving and decoding messages broadcast from a numbers station operated by the Cuban Intelligence Directorate to further that conspiracy.[10][11] §Suspected origins and use[edit] According to the notes of The Conet Project,[14][15] which has compiled recordings of these transmissions, numbers stations have been reported since World War I.

Numbers stations are also acknowledged for espionage purposes in Robert Wallace and H. Usable but not Perfect - Public-key cryptography. An unpredictable (typically large and random) number is used to begin generation of an acceptable pair of keys suitable for use by an asymmetric key algorithm.

Usable but not Perfect - Public-key cryptography

Advanced Encryption Standard. The Advanced Encryption Standard (AES), also referenced as Rijndael[4][5] (its original name), is a specification for the encryption of electronic data established by the U.S.

Advanced Encryption Standard

National Institute of Standards and Technology (NIST) in 2001.[6] AES is based on the Rijndael cipher[5] developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, who submitted a proposal to NIST during the AES selection process.[7] Rijndael is a family of ciphers with different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits.

AES has been adopted by the U.S. government and is now used worldwide. It supersedes the Data Encryption Standard (DES),[8] which was published in 1977. In the United States, AES was announced by the NIST as U.S. AES became effective as a federal government standard on May 26, 2002 after approval by the Secretary of Commerce. §Definitive standards[edit] . International Data Encryption Algorithm. In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991.

International Data Encryption Algorithm

The algorithm was intended as a replacement for the Data Encryption Standard (DES). IDEA is a minor revision of an earlier cipher, Proposed Encryption Standard (PES). The cipher was designed under a research contract with the Hasler Foundation, which became part of Ascom-Tech AG. The cipher was patented in a number of countries but was freely available for non-commercial use. The name “IDEA” is also a trademark. IDEA was used in Pretty Good Privacy (PGP) v2.0, and was incorporated after the original cipher used in v1.0, BassOmatic, was found to be insecure.[4] IDEA is an optional algorithm in the OpenPGP standard. Triple DES. Data Encryption Standard. DES is now considered to be insecure for many applications.

Data Encryption Standard

This is chiefly due to the 56-bit key size being too small; in January, 1999, and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes (see chronology). There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are infeasible to mount in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks.

Serpent (cipher) Serpent is a symmetric key block cipher that was a finalist in the Advanced Encryption Standard (AES) contest, where it was ranked second to Rijndael.

Serpent (cipher)

Serpent was designed by Ross Anderson, Eli Biham, and Lars Knudsen. The Serpent cipher is in the public domain and has not been patented. There are no restrictions or encumbrances whatsoever regarding its use. As a result, anyone is free to incorporate Serpent in their software (or hardware implementations) without paying license fees. Rijndael is a substitution-linear transformation network with ten, twelve, or fourteen rounds, depending on the key size, and with block sizes of 128 bits, 192 bits, or 256 bits, independently specified. The original Serpent, Serpent-0, was presented at the 5th workshop on Fast Software Encryption, but a somewhat tweaked version, Serpent-1, was submitted to the AES competition. Twofish. Twofish's distinctive features are the use of pre-computed key-dependent S-boxes, and a relatively complex key schedule.


One half of an n-bit key is used as the actual encryption key and the other half of the n-bit key is used to modify the encryption algorithm (key-dependent S-boxes). Twofish borrows some elements from other designs; for example, the pseudo-Hadamard transform (PHT) from the SAFER family of ciphers. Twofish has a Feistel structure like DES.