Home
This Title All WIREs
WIREs RSS Feed
How to cite this WIREs title:
WIREs Comp Stat

Ciphers

Full article on Wiley Online Library:   HTML PDF

Can't access this content? Tell your librarian.

This article surveys three of the most widely used ciphers: the symmetric block cipher, Advanced Encryption Standard (AES), the symmetric stream cipher, RC4, and the asymmetric cipher, RSA. WIREs Comp Stat 2011 3 239–250 DOI: 10.1002/wics.156

Figure 1.

AES (a) encryption and (b) decryption.

[ Normal View | Magnified View ]
Figure 2.

AES encryption round.

[ Normal View | Magnified View ]
Figure 3.

RC4. (a) Initial state of S and T; (b) initial permutation of S; and (c) stream generation.

[ Normal View | Magnified View ]
Figure 4.

The RSA algorithm.

[ Normal View | Magnified View ]
Figure 5.

Example of RSA algorithm.

[ Normal View | Magnified View ]
Figure 6.

RSA processing of multiple blocks. (a) General approach and (b) example.

[ Normal View | Magnified View ]
Figure 7.

The Diffie–Hellman key exchange algorithm.

[ Normal View | Magnified View ]
Figure 8.

Diffie–Hellman key exchange.

[ Normal View | Magnified View ]

Browse by Topic

Applications of Computational Statistics > Signal and Image Processing and Coding
Computer Science Models > Software
blog comments powered by Disqus

Access to this WIREs title is by subscription only.

Recommend to Your
Librarian Now!

The latest WIREs articles in your inbox

Sign Up for Article Alerts

Twitter: WileyCompSci Follow us on Twitter

    Are you interested in running an author workshop? Read this list of 10 things to consider from @WileyExchanges http://t.co/9FCMCrvxSw
    New post from Exchanges on networking! @RThrelfall_KPMG writes on how to develop "soft skills" and why you should! http://t.co/4N7wNGGxcr