Home
This Title All WIREs
WIREs RSS Feed
How to cite this WIREs title:
WIREs Comp Stat

Ciphers

Full article on Wiley Online Library:   HTML PDF

Can't access this content? Tell your librarian.

This article surveys three of the most widely used ciphers: the symmetric block cipher, Advanced Encryption Standard (AES), the symmetric stream cipher, RC4, and the asymmetric cipher, RSA. WIREs Comp Stat 2011 3 239–250 DOI: 10.1002/wics.156

Figure 1.

AES (a) encryption and (b) decryption.

[ Normal View | Magnified View ]
Figure 2.

AES encryption round.

[ Normal View | Magnified View ]
Figure 3.

RC4. (a) Initial state of S and T; (b) initial permutation of S; and (c) stream generation.

[ Normal View | Magnified View ]
Figure 4.

The RSA algorithm.

[ Normal View | Magnified View ]
Figure 5.

Example of RSA algorithm.

[ Normal View | Magnified View ]
Figure 6.

RSA processing of multiple blocks. (a) General approach and (b) example.

[ Normal View | Magnified View ]
Figure 7.

The Diffie–Hellman key exchange algorithm.

[ Normal View | Magnified View ]
Figure 8.

Diffie–Hellman key exchange.

[ Normal View | Magnified View ]

Browse by Topic

Applications of Computational Statistics > Signal and Image Processing and Coding
Computer Science Models > Software
blog comments powered by Disqus

Access to this WIREs title is by subscription only.

Recommend to Your
Librarian Now!

The latest WIREs articles in your inbox

Sign Up for Article Alerts

Twitter: WileyCompSci Follow us on Twitter

    Attention @IEEE Members! Did you know that IEEE members save 35% off all Wiley-IEEE & Wiley print books? Learn more: http://t.co/wKMRGZTvnS
    New from @WileyExchanges: @BenMudrak on JournalGuide, a free tool that matches research to relevant journals. http://t.co/yr2O4PxFWk
    The latest article from @WileyExchanges is about how and why to share research data and when to hold back. http://t.co/MuNKPYiR1T