Home
This Title All WIREs
WIREs RSS Feed
How to cite this WIREs title:
WIREs Comp Stat

Ciphers

Full article on Wiley Online Library:   HTML PDF

Can't access this content? Tell your librarian.

This article surveys three of the most widely used ciphers: the symmetric block cipher, Advanced Encryption Standard (AES), the symmetric stream cipher, RC4, and the asymmetric cipher, RSA. WIREs Comp Stat 2011 3 239–250 DOI: 10.1002/wics.156

Figure 1.

AES (a) encryption and (b) decryption.

[ Normal View | Magnified View ]
Figure 2.

AES encryption round.

[ Normal View | Magnified View ]
Figure 3.

RC4. (a) Initial state of S and T; (b) initial permutation of S; and (c) stream generation.

[ Normal View | Magnified View ]
Figure 4.

The RSA algorithm.

[ Normal View | Magnified View ]
Figure 5.

Example of RSA algorithm.

[ Normal View | Magnified View ]
Figure 6.

RSA processing of multiple blocks. (a) General approach and (b) example.

[ Normal View | Magnified View ]
Figure 7.

The Diffie–Hellman key exchange algorithm.

[ Normal View | Magnified View ]
Figure 8.

Diffie–Hellman key exchange.

[ Normal View | Magnified View ]

Browse by Topic

Applications of Computational Statistics > Signal and Image Processing and Coding
Computer Science Models > Software
blog comments powered by Disqus

Access to this WIREs title is by subscription only.

Recommend to Your
Librarian Now!

The latest WIREs articles in your inbox

Sign Up for Article Alerts

Twitter: WileyCompSci Follow us on Twitter

    Julie Wilson lists the 5 things she learned about Peer Review at #ESOF2014. Read more: http://t.co/nN3pogtN74 via @WileyExchanges