Difference between revisions of "Template:Cryptography block"
Jump to navigation
Jump to search
imported>Schneelocke m (Add Timing attack to Attack group) |
(Added a "Less common algorithms" group to take some really-used algorithms out of the swamp of obscure and badly broken ones.) |
||
Line 8: | Line 8: | ||
|list1 = [[Advanced Encryption Standard|AES]]{{·}} [[Blowfish (cipher)|Blowfish]]{{·}} [[Data Encryption Standard|DES]]{{·}} [[Triple DES]]{{·}} [[Serpent (cipher)|Serpent]]{{·}} [[Twofish]] | |list1 = [[Advanced Encryption Standard|AES]]{{·}} [[Blowfish (cipher)|Blowfish]]{{·}} [[Data Encryption Standard|DES]]{{·}} [[Triple DES]]{{·}} [[Serpent (cipher)|Serpent]]{{·}} [[Twofish]] | ||
− | |group2= | + | <!-- This tries to include ciphers that have been included in standards or multiple interoperable implementations, which a member of the general public might be using to protect their data. I've excluded ciphers like the Intel Cascade Cipher which are used by small groups to keep information away from the general public. --> |
− | |list2 = | + | |group2= Less common algorithms |
+ | |list2 = [[CAST-128]]{{·}} [[DES-X]]{{·}} [[International Data Encryption Algorithm|IDEA]]{{·}} [[RC2]]{{·}} [[RC5]]{{·}} [[SEED]]{{·}} [[Skipjack (cipher)|Skipjack]]{{·}} [[Tiny Encryption Algorithm|TEA]]{{·}} [[XTEA]] | ||
− | |group3= | + | |group3= Other algorithms |
− | |list3 = [[ | + | |list3 = [[3-Way]]{{·}} [[ABC (block cipher)|ABC]]{{·}} [[Akelarre (cipher)|Akelarre]]{{·}} [[Anubis (cipher)|Anubis]]{{·}} [[ARIA (cipher)|ARIA]]{{·}} [[BaseKing]]{{·}} [[BassOmatic]]{{·}} [[BATON]]{{·}} [[BEAR and LION ciphers|BEAR and LION]]{{·}} [[Camellia (cipher)|Camellia]]{{·}} [[CAST-256]]{{·}} [[CIKS-1]]{{·}} [[CIPHERUNICORN-A]]{{·}} [[CIPHERUNICORN-E]]{{·}} [[CLEFIA]]{{·}} [[Cellular Message Encryption Algorithm|CMEA]]{{·}} [[Cobra ciphers|Cobra]]{{·}} [[COCONUT98]]{{·}} [[Crab (cipher)|Crab]]{{·}} [[Cryptomeria cipher|Cryptomeria/C2]]{{·}} [[CRYPTON]]{{·}} [[CS-Cipher]]{{·}} [[DEAL]]{{·}} [[DFC (cipher)|DFC]]{{·}} [[E2 (cipher)|E2]]{{·}} [[FEAL]]{{·}} [[FEA-M]]{{·}} [[FROG]]{{·}} [[G-DES]]{{·}} [[GOST (block cipher)|GOST]]{{·}} [[Grand Cru (cipher)|Grand Cru]]{{·}} [[Hasty Pudding cipher]]{{·}} [[Hierocrypt]]{{·}} [[ICE (cipher)|ICE]]{{·}} [[Idea NXT|IDEA NXT]]{{·}} [[Intel Cascade Cipher]]{{·}} [[Iraqi block cipher|Iraqi]]{{·}} [[KASUMI (block cipher)|KASUMI]]{{·}} [[KeeLoq]]{{·}} [[KHAZAD]]{{·}} [[Khufu and Khafre]]{{·}} [[KN-Cipher]]{{·}} [[Ladder-DES]]{{·}} [[Libelle (cipher)|Libelle]]{{·}} [[LOKI97]]{{·}} [[LOKI|LOKI89/91]]{{·}} [[Lucifer (cipher)|Lucifer]]{{·}} [[M6 (cipher)|M6]]{{·}} [[M8 (cipher)|M8]]{{·}} [[MacGuffin (cipher)|MacGuffin]]{{·}} [[Madryga]]{{·}} [[MAGENTA]]{{·}} [[MARS (cryptography)|MARS]]{{·}} [[Mercy (cipher)|Mercy]]{{·}} [[MESH (cipher)|MESH]]{{·}} [[MISTY1]]{{·}} [[MMB]]{{·}} [[MULTI2]]{{·}} [[MultiSwap]]{{·}} [[New Data Seal]]{{·}} [[NewDES]]{{·}} [[Nimbus (cipher)|Nimbus]]{{·}} [[NOEKEON]]{{·}} [[NUSH]]{{·}} [[Q (cipher)|Q]]{{·}} [[RC6]]{{·}} [[REDOC]]{{·}} [[Red Pike]]{{·}} [[S-1 block cipher|S-1]]{{·}} [[SAFER]]{{·}} [[SAVILLE]]{{·}} [[SC2000]]{{·}} [[SHACAL]]{{·}} [[SHARK]]{{·}} [[SMS4]]{{·}} [[Spectr-H64]]{{·}} [[Square (cipher)|Square]]{{·}} [[SXAL/MBAL]]{{·}} [[Threefish]]{{·}} [[Treyfer]]{{·}} [[UES (cipher)|UES]]{{·}} [[Xenon (cipher)|Xenon]]{{·}} [[xmx]]{{·}} [[XXTEA]]{{·}} [[Zodiac (cipher)|Zodiac]] |
− | |group4= | + | |group4= Design |
− | |list4 = [[ | + | |list4 = [[Feistel cipher|Feistel network]]{{·}} [[Key schedule]]{{·}} [[Product cipher]]{{·}} [[Substitution box|S-box]]{{·}} [[Permutation box|P-box]]{{·}} [[Substitution-permutation network|SPN]] |
− | |group5= | + | |group5= Attack ([[Cryptanalysis]]) |
− | |list5 = [[ | + | |list5 = [[Brute force attack|Brute force]]{{·}} [[Linear cryptanalysis|Linear]]{{·}} [[Differential cryptanalysis|Differential]]{{·}} [[Integral cryptanalysis|Integral]]{{·}} [[Impossible differential cryptanalysis|Impossible Differential]]{{·}} [[Boomerang attack|Boomerang]]{{·}} [[Mod n cryptanalysis|Mod ''n'']]{{·}} [[Related-key attack|Related-key]]{{·}} [[Slide attack|Slide]]{{·}} [[Timing attack|Timing]]{{·}} [[XSL attack|XSL]] |
− | |group6= Misc | + | |group6= Standardization |
− | | | + | |list6 = [[Advanced Encryption Standard process|AES process]]{{·}} [[CRYPTREC]]{{·}} [[NESSIE]] |
+ | |||
+ | |group7= Misc | ||
+ | |list7 = [[Avalanche effect]]{{·}} [[Block size (cryptography)|Block size]]{{·}} [[Initialization vector|IV]]{{·}} [[Key size]]{{·}} [[Block cipher modes of operation|Modes of operation]]{{·}} [[Piling-up lemma]]{{·}} [[Weak key]]{{·}} [[EFF DES cracker]]{{·}} [[Key whitening]] | ||
}}<noinclude> | }}<noinclude> |
Revision as of 12:01, 27 July 2009
This template is a "specialised crypto navigation box". It should NOT be added directly to an article. Instead it should be used within the main crypto navigation box.
To use this template together with the main crypto navigation box add this code to the bottom of an article:
{{crypto navbox|block}}
For more details about these navigation boxes please see the instructions at the main crypto navigation box and at the WikiProject Cryptography.
See also
- Template:Infobox Encryption method: an infobox for encryption methods, including block ciphers.