Difference between revisions of "Template:Cryptography block"
Jump to navigation
Jump to search
Template documentation
(Added a "Less common algorithms" group to take some really-used algorithms out of the swamp of obscure and badly broken ones.) |
imported>Cryptoalg (add LEA) |
||
(143 intermediate revisions by 63 users not shown) | |||
Line 1: | Line 1: | ||
{{Navbox | {{Navbox | ||
− | |name = | + | | name = Cryptography block |
− | |border = {{{border|{{{1|}}}}}} | + | | border = {{{border|{{{1|}}}}}} |
− | |state = {{{state|}}} | + | | state = {{{state|}}} |
− | |title = [[Block cipher]]s | + | | title = [[Block cipher]]s ([[Cipher security summary|security summary]]) |
+ | | listclass = hlist | ||
− | |group1= Common algorithms | + | | group1 = Common<br />algorithms |
− | |list1 = [[Advanced Encryption Standard|AES]] | + | | list1 = |
+ | *[[Advanced Encryption Standard|AES]] | ||
+ | *[[Blowfish (cipher)|Blowfish]] | ||
+ | *[[Data Encryption Standard|DES]] ([[DES supplementary material|internal mechanics]], [[Triple DES]]) | ||
+ | *[[Serpent (cipher)|Serpent]] | ||
+ | *[[Twofish]] | ||
− | <!-- This tries to include ciphers that have been included in standards or multiple interoperable implementations, which a member of the general public might be using to protect their data. | + | <!-- This tries to include ciphers that have been included in standards or multiple interoperable implementations, which a member of the general public might be using to protect their data. I've excluded ciphers like the Intel Cascade Cipher which are used by small groups to keep information away from the general public. --> |
− | |group2= Less common algorithms | + | | group2 = Less common<br />algorithms |
− | |list2 = [[CAST-128]] | + | | list2 = |
+ | *[[ARIA (cipher)|ARIA]] | ||
+ | *[[Camellia (cipher)|Camellia]] | ||
+ | *[[CAST-128]] | ||
+ | *[[GOST (block cipher)|GOST]] | ||
+ | *[[International Data Encryption Algorithm|IDEA]] | ||
+ | *[[LEA (cipher)|LEA]] | ||
+ | *[[RC2]] | ||
+ | *[[RC5]] | ||
+ | *[[RC6]] | ||
+ | *[[SEED]] | ||
+ | *[[Skipjack (cipher)|Skipjack]] | ||
+ | *[[Tiny Encryption Algorithm|TEA]] | ||
+ | *[[XTEA]] | ||
− | |group3= Other algorithms | + | | group3 = Other<br />algorithms |
− | |list3 = [[3-Way]] | + | | list3 = |
+ | *[[3-Way]] | ||
+ | *[[Akelarre (cipher)|Akelarre]] | ||
+ | *[[Anubis (cipher)|Anubis]] | ||
+ | *[[BaseKing]] | ||
+ | *[[BassOmatic]] | ||
+ | *[[BATON]] | ||
+ | *[[BEAR and LION ciphers|BEAR and LION]] | ||
+ | *[[CAST-256]] | ||
+ | *[[Chiasmus (cipher)|Chiasmus]] | ||
+ | *[[CIKS-1]] | ||
+ | *[[CIPHERUNICORN-A]] | ||
+ | *[[CIPHERUNICORN-E]] | ||
+ | *[[CLEFIA]] | ||
+ | *[[Cellular Message Encryption Algorithm|CMEA]] | ||
+ | *[[Cobra ciphers|Cobra]] | ||
+ | *[[COCONUT98]] | ||
+ | *[[Crab (cipher)|Crab]] | ||
+ | *[[Cryptomeria cipher|Cryptomeria/C2]] | ||
+ | *[[CRYPTON]] | ||
+ | *[[CS-Cipher]] | ||
+ | *[[DEAL]] | ||
+ | *[[DES-X]] | ||
+ | *[[DFC (cipher)|DFC]] | ||
+ | *[[E2 (cipher)|E2]] | ||
+ | *[[FEAL]] | ||
+ | *[[FEA-M]] | ||
+ | *[[FROG]] | ||
+ | *[[GDES|G-DES]] | ||
+ | *[[Grand Cru (cipher)|Grand Cru]] | ||
+ | *[[Hasty Pudding cipher]] | ||
+ | *[[Hierocrypt]] | ||
+ | *[[ICE (cipher)|ICE]] | ||
+ | *[[IDEA NXT]] | ||
+ | *[[Intel Cascade Cipher]] | ||
+ | *[[Iraqi block cipher|Iraqi]] | ||
+ | *[[Kalyna (cipher)|Kalyna]] | ||
+ | *[[KASUMI]] | ||
+ | *[[KeeLoq]] | ||
+ | *[[KHAZAD]] | ||
+ | *[[Khufu and Khafre]] | ||
+ | *[[KN-Cipher]] | ||
+ | *[[Kuznyechik]] | ||
+ | *[[Ladder-DES]] | ||
+ | *[[Libelle (cipher)|Libelle]] | ||
+ | *LOKI ([[LOKI97|97]], [[LOKI|89/91]]) | ||
+ | *[[Lucifer (cipher)|Lucifer]] | ||
+ | *[[M6 (cipher)|M6]] | ||
+ | *[[M8 (cipher)|M8]] | ||
+ | *[[MacGuffin (cipher)|MacGuffin]] | ||
+ | *[[Madryga]] | ||
+ | *[[MAGENTA]] | ||
+ | *[[MARS (cipher)|MARS]] | ||
+ | *[[Mercy (cipher)|Mercy]] | ||
+ | *[[MESH (cipher)|MESH]] | ||
+ | *[[MISTY1]] | ||
+ | *[[MMB (cipher)|MMB]] | ||
+ | *[[MULTI2]] | ||
+ | *[[MultiSwap]] | ||
+ | *[[New Data Seal]] | ||
+ | *[[NewDES]] | ||
+ | *[[Nimbus (cipher)|Nimbus]] | ||
+ | *[[NOEKEON]] | ||
+ | *[[NUSH]] | ||
+ | *[[PRESENT]] | ||
+ | *[[Prince (cipher)|Prince]] | ||
+ | *[[Q (cipher)|Q]] | ||
+ | *[[RC6]] | ||
+ | *[[REDOC]] | ||
+ | *[[Red Pike (cipher)|Red Pike]] | ||
+ | *[[S-1 block cipher|S-1]] | ||
+ | *[[SAFER]] | ||
+ | *[[SAVILLE]] | ||
+ | *[[SC2000]] | ||
+ | *[[SHACAL]] | ||
+ | *[[SHARK]] | ||
+ | *[[Simon (cipher)|Simon]] | ||
+ | *[[SM4 (cipher)|SM4]] | ||
+ | *[[Speck (cipher)|Speck]] | ||
+ | *[[Spectr-H64]] | ||
+ | *[[Square (cipher)|Square]] | ||
+ | *[[SXAL/MBAL]] | ||
+ | *[[Threefish]] | ||
+ | *[[Treyfer]] | ||
+ | *[[UES (cipher)|UES]] | ||
+ | *[[xmx]] | ||
+ | *[[XXTEA]] | ||
+ | *[[Zodiac (cipher)|Zodiac]] | ||
− | |group4= Design | + | | group4 = Design |
− | |list4 = [[Feistel cipher|Feistel network]] | + | | list4 = |
+ | *[[Feistel cipher|Feistel network]] | ||
+ | *[[Key schedule]] | ||
+ | *[[Lai–Massey scheme]] | ||
+ | *[[Product cipher]] | ||
+ | *[[S-box]] | ||
+ | *[[Permutation box|P-box]] | ||
+ | *[[Substitution–permutation network|SPN]] | ||
+ | *[[Confusion and diffusion]] | ||
+ | *[[Avalanche effect]] | ||
+ | *[[Block size (cryptography)|Block size]] | ||
+ | *[[Key size]] | ||
+ | *[[Key whitening]] ([[Whitening transformation]]) | ||
− | |group5= Attack ([[ | + | | group5 = Attack<br />([[cryptanalysis]]) |
− | |list5 = [[Brute force attack|Brute force]] | + | | list5 = |
+ | *[[Brute-force attack|Brute-force]] ([[EFF DES cracker]]) | ||
+ | *[[Meet-in-the-middle attack|MITM]] | ||
+ | **[[Biclique attack|Biclique attack]] | ||
+ | **[[3-subset meet-in-the-middle attack|3-subset MITM attack]] | ||
+ | *[[Linear cryptanalysis|Linear]] ([[Piling-up lemma]]) | ||
+ | *[[Differential cryptanalysis|Differential]] | ||
+ | **[[Impossible differential cryptanalysis|Impossible]] | ||
+ | **[[Truncated differential cryptanalysis|Truncated]] | ||
+ | **[[Higher-order differential cryptanalysis|Higher-order]] | ||
+ | *[[Differential-linear_attack|Differential-linear]] | ||
+ | *[[Distinguishing attack|Distinguishing]] ([[Known-key distinguishing attack|Known-key]]) | ||
+ | *[[Integral cryptanalysis|Integral/Square]] | ||
+ | *[[Boomerang attack|Boomerang]] | ||
+ | *[[Mod n cryptanalysis|Mod ''n'']] | ||
+ | *[[Related-key attack|Related-key]] | ||
+ | *[[Slide attack|Slide]] | ||
+ | *[[Rotational cryptanalysis|Rotational]] | ||
+ | *[[Side-channel attack|Side-channel]] | ||
+ | **[[Timing attack|Timing]] | ||
+ | **[[Power analysis|Power-monitoring]] | ||
+ | **[[Electromagnetic attack|Electromagnetic]] | ||
+ | **[[Acoustic cryptanalysis|Acoustic]] | ||
+ | **[[Differential fault analysis|Differential-fault]] | ||
+ | *[[XSL attack|XSL]] | ||
+ | *[[Interpolation attack|Interpolation]] | ||
+ | *[[Partitioning cryptanalysis|Partitioning]] | ||
+ | *[[Rubber-hose cryptanalysis|Rubber-hose]] | ||
+ | *[[Black-bag cryptanalysis|Black-bag]] | ||
+ | *[[Davies attack|Davies]] | ||
+ | *[[Rebound attack|Rebound]] | ||
+ | *[[Weak key]] | ||
+ | *[[Kendall rank correlation coefficient|Tau]] | ||
+ | *[[Chi-squared test|Chi-square]] | ||
+ | *[[Time/memory/data tradeoff attack|Time/memory/data tradeoff]] | ||
− | |group6= Standardization | + | | group6 = Standardization |
− | |list6 = [[Advanced Encryption Standard process|AES process]] | + | | list6 = |
+ | *[[Advanced Encryption Standard process|AES process]] | ||
+ | *[[CRYPTREC]] | ||
+ | *[[NESSIE]] | ||
− | |group7= | + | | group7 = Utilization |
− | |list7 = | + | | list7 = |
+ | *[[Initialization vector]] | ||
+ | *[[Block cipher mode of operation|Mode of operation]] | ||
+ | *[[Padding (cryptography)|Padding]] | ||
}}<noinclude> | }}<noinclude> | ||
+ | |||
+ | {{documentation|content= | ||
=== The block cipher navigation box === | === The block cipher navigation box === | ||
− | This template is a "specialised | + | This template is a "specialised cryptography navigation box". It should NOT be added directly to an article. Instead it should be used within the [[Template:Cryptography navbox|main cryptography navigation box]]. |
− | To use this template together with the main | + | To use this template together with the main cryptography navigation box add this code to the bottom of an article: |
− | :<code><nowiki>{{ | + | :<code><nowiki>{{cryptography navbox|block}}</nowiki></code> |
− | For more details about these navigation boxes please see the instructions at the [[Template: | + | For more details about these navigation boxes please see the instructions at the [[Template:Cryptography navbox|main cryptography navigation box]] and at the [[Wikipedia:WikiProject Cryptography#Navigational_templates|WikiProject Cryptography]]. |
=== See also === | === See also === | ||
− | * [[Template:Infobox | + | * [[Template:Infobox encryption method]]: an infobox for encryption methods, including block ciphers. |
+ | |||
− | + | {{Collapse|title=TemplateData| | |
+ | {{TemplateDataHeader}} | ||
+ | <templatedata> | ||
+ | { | ||
+ | "description": "Please use \"Cryptography navbox\" template instead.", | ||
+ | "format": "block", | ||
+ | "params": {} | ||
+ | } | ||
+ | </templatedata> | ||
+ | }} | ||
+ | }} | ||
− | [[ | + | [[Category:Cryptography templates]] |
− | |||
</noinclude> | </noinclude> |
Latest revision as of 08:40, 18 June 2020

This template is a "specialised cryptography navigation box". It should NOT be added directly to an article. Instead it should be used within the main cryptography navigation box.
To use this template together with the main cryptography navigation box add this code to the bottom of an article:
{{cryptography navbox|block}}
For more details about these navigation boxes please see the instructions at the main cryptography navigation box and at the WikiProject Cryptography.
See also
- Template:Infobox encryption method: an infobox for encryption methods, including block ciphers.
Expand TemplateData
|
---|
Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Subpages of this template. |