Home
This Title All WIREs
WIREs RSS Feed
How to cite this WIREs title:
WIREs Comp Stat

Ciphers

Full article on Wiley Online Library:   HTML PDF

Can't access this content? Tell your librarian.

Abstract This article surveys three of the most widely used ciphers: the symmetric block cipher, Advanced Encryption Standard (AES), the symmetric stream cipher, RC4, and the asymmetric cipher, RSA. WIREs Comp Stat 2011 3 239–250 DOI: 10.1002/wics.156 This article is categorized under: Algorithms and Computational Methods > Algorithms Applications of Computational Statistics > Signal and Image Processing and Coding

AES (a) encryption and (b) decryption.

[ Normal View | Magnified View ]

Diffie–Hellman key exchange.

[ Normal View | Magnified View ]

The Diffie–Hellman key exchange algorithm.

[ Normal View | Magnified View ]

RSA processing of multiple blocks. (a) General approach and (b) example.

[ Normal View | Magnified View ]

Example of RSA algorithm.

[ Normal View | Magnified View ]

The RSA algorithm.

[ Normal View | Magnified View ]

RC4. (a) Initial state of S and T; (b) initial permutation of S; and (c) stream generation.

[ Normal View | Magnified View ]

AES encryption round.

[ Normal View | Magnified View ]

Browse by Topic

Applications of Computational Statistics > Signal and Image Processing and Coding
Algorithms and Computational Methods > Algorithms

Access to this WIREs title is by subscription only.

Recommend to Your
Librarian Now!

The latest WIREs articles in your inbox

Sign Up for Article Alerts