Home
This Title All WIREs
WIREs RSS Feed
How to cite this WIREs title:
WIREs Comp Stat

Ciphers

Full article on Wiley Online Library:   HTML PDF

Can't access this content? Tell your librarian.

This article surveys three of the most widely used ciphers: the symmetric block cipher, Advanced Encryption Standard (AES), the symmetric stream cipher, RC4, and the asymmetric cipher, RSA. WIREs Comp Stat 2011 3 239–250 DOI: 10.1002/wics.156

Figure 1.

AES (a) encryption and (b) decryption.

[ Normal View | Magnified View ]
Figure 2.

AES encryption round.

[ Normal View | Magnified View ]
Figure 3.

RC4. (a) Initial state of S and T; (b) initial permutation of S; and (c) stream generation.

[ Normal View | Magnified View ]
Figure 4.

The RSA algorithm.

[ Normal View | Magnified View ]
Figure 5.

Example of RSA algorithm.

[ Normal View | Magnified View ]
Figure 6.

RSA processing of multiple blocks. (a) General approach and (b) example.

[ Normal View | Magnified View ]
Figure 7.

The Diffie–Hellman key exchange algorithm.

[ Normal View | Magnified View ]
Figure 8.

Diffie–Hellman key exchange.

[ Normal View | Magnified View ]

Browse by Topic

Applications of Computational Statistics > Signal and Image Processing and Coding
Computer Science Models > Software

Access to this WIREs title is by subscription only.

Recommend to Your
Librarian Now!

The latest WIREs articles in your inbox

Sign Up for Article Alerts

Twitter: WileyCompSci Follow us on Twitter