Difference between revisions of "Template:Cryptography block"

From blackwiki
Jump to navigation Jump to search
(change link)
imported>Cryptoalg
(add LEA)
 
(90 intermediate revisions by 35 users not shown)
Line 3: Line 3:
 
| border    = {{{border|{{{1|}}}}}}
 
| border    = {{{border|{{{1|}}}}}}
 
| state    = {{{state|}}}
 
| state    = {{{state|}}}
| title    = [[Block cipher]]s ([[Block cipher security summary|security summary]])
+
| title    = [[Block cipher]]s ([[Cipher security summary|security summary]])
 
| listclass = hlist
 
| listclass = hlist
  
Line 10: Line 10:
 
*[[Advanced Encryption Standard|AES]]
 
*[[Advanced Encryption Standard|AES]]
 
*[[Blowfish (cipher)|Blowfish]]
 
*[[Blowfish (cipher)|Blowfish]]
*[[Data Encryption Standard|DES]]
+
*[[Data Encryption Standard|DES]] ([[DES supplementary material|internal mechanics]], [[Triple DES]])
*[[Triple DES]]
 
 
*[[Serpent (cipher)|Serpent]]
 
*[[Serpent (cipher)|Serpent]]
 
*[[Twofish]]
 
*[[Twofish]]
  
<!-- This tries to include ciphers that have been included in standards or multiple interoperable implementations, which a member of the general public might be using to protect their data. I've excluded ciphers like the Intel Cascade Cipher which are used by small groups to keep information away from the general public. -->
+
<!-- This tries to include ciphers that have been included in standards or multiple interoperable implementations, which a member of the general public might be using to protect their data. I've excluded ciphers like the Intel Cascade Cipher which are used by small groups to keep information away from the general public. -->
 
| group2 = Less common<br />algorithms
 
| group2 = Less common<br />algorithms
 
| list2  =  
 
| list2  =  
 +
*[[ARIA (cipher)|ARIA]]
 
*[[Camellia (cipher)|Camellia]]
 
*[[Camellia (cipher)|Camellia]]
 
*[[CAST-128]]
 
*[[CAST-128]]
 +
*[[GOST (block cipher)|GOST]]
 
*[[International Data Encryption Algorithm|IDEA]]
 
*[[International Data Encryption Algorithm|IDEA]]
 +
*[[LEA (cipher)|LEA]]
 
*[[RC2]]
 
*[[RC2]]
 
*[[RC5]]
 
*[[RC5]]
 +
*[[RC6]]
 
*[[SEED]]
 
*[[SEED]]
 
*[[Skipjack (cipher)|Skipjack]]
 
*[[Skipjack (cipher)|Skipjack]]
Line 33: Line 36:
 
*[[Akelarre (cipher)|Akelarre]]
 
*[[Akelarre (cipher)|Akelarre]]
 
*[[Anubis (cipher)|Anubis]]
 
*[[Anubis (cipher)|Anubis]]
*[[ARIA (cipher)|ARIA]]
 
 
*[[BaseKing]]
 
*[[BaseKing]]
 
*[[BassOmatic]]
 
*[[BassOmatic]]
Line 39: Line 41:
 
*[[BEAR and LION ciphers|BEAR and LION]]
 
*[[BEAR and LION ciphers|BEAR and LION]]
 
*[[CAST-256]]
 
*[[CAST-256]]
 +
*[[Chiasmus (cipher)|Chiasmus]]
 
*[[CIKS-1]]
 
*[[CIKS-1]]
 
*[[CIPHERUNICORN-A]]
 
*[[CIPHERUNICORN-A]]
Line 48: Line 51:
 
*[[Crab (cipher)|Crab]]
 
*[[Crab (cipher)|Crab]]
 
*[[Cryptomeria cipher|Cryptomeria/C2]]
 
*[[Cryptomeria cipher|Cryptomeria/C2]]
* [[CRYPTON]]
+
*[[CRYPTON]]
 
*[[CS-Cipher]]
 
*[[CS-Cipher]]
 
*[[DEAL]]
 
*[[DEAL]]
Line 58: Line 61:
 
*[[FROG]]
 
*[[FROG]]
 
*[[GDES|G-DES]]
 
*[[GDES|G-DES]]
*[[GOST (block cipher)|GOST]]
 
 
*[[Grand Cru (cipher)|Grand Cru]]
 
*[[Grand Cru (cipher)|Grand Cru]]
 
*[[Hasty Pudding cipher]]
 
*[[Hasty Pudding cipher]]
 
*[[Hierocrypt]]
 
*[[Hierocrypt]]
 
*[[ICE (cipher)|ICE]]
 
*[[ICE (cipher)|ICE]]
*[[Idea NXT|IDEA NXT]]
+
*[[IDEA NXT]]
 
*[[Intel Cascade Cipher]]
 
*[[Intel Cascade Cipher]]
 
*[[Iraqi block cipher|Iraqi]]
 
*[[Iraqi block cipher|Iraqi]]
*[[KASUMI (block cipher)|KASUMI]]
+
*[[Kalyna (cipher)|Kalyna]]
 +
*[[KASUMI]]
 
*[[KeeLoq]]
 
*[[KeeLoq]]
 
*[[KHAZAD]]
 
*[[KHAZAD]]
 
*[[Khufu and Khafre]]
 
*[[Khufu and Khafre]]
 
*[[KN-Cipher]]
 
*[[KN-Cipher]]
 +
*[[Kuznyechik]]
 
*[[Ladder-DES]]
 
*[[Ladder-DES]]
 
*[[Libelle (cipher)|Libelle]]
 
*[[Libelle (cipher)|Libelle]]
*[[LOKI97]]
+
*LOKI ([[LOKI97|97]], [[LOKI|89/91]])
*[[LOKI|LOKI89/91]]
 
 
*[[Lucifer (cipher)|Lucifer]]
 
*[[Lucifer (cipher)|Lucifer]]
 
*[[M6 (cipher)|M6]]
 
*[[M6 (cipher)|M6]]
Line 81: Line 84:
 
*[[Madryga]]
 
*[[Madryga]]
 
*[[MAGENTA]]
 
*[[MAGENTA]]
*[[MARS (cryptography)|MARS]]
+
*[[MARS (cipher)|MARS]]
 
*[[Mercy (cipher)|Mercy]]
 
*[[Mercy (cipher)|Mercy]]
 
*[[MESH (cipher)|MESH]]
 
*[[MESH (cipher)|MESH]]
 
*[[MISTY1]]
 
*[[MISTY1]]
*[[MMB]]
+
*[[MMB (cipher)|MMB]]
 
*[[MULTI2]]
 
*[[MULTI2]]
 
*[[MultiSwap]]
 
*[[MultiSwap]]
Line 93: Line 96:
 
*[[NOEKEON]]
 
*[[NOEKEON]]
 
*[[NUSH]]
 
*[[NUSH]]
*[[PRESENT (cipher)|PRESENT]]
+
*[[PRESENT]]
 +
*[[Prince (cipher)|Prince]]
 
*[[Q (cipher)|Q]]
 
*[[Q (cipher)|Q]]
 
*[[RC6]]
 
*[[RC6]]
Line 104: Line 108:
 
*[[SHACAL]]
 
*[[SHACAL]]
 
*[[SHARK]]
 
*[[SHARK]]
*[[SMS4]]
+
*[[Simon (cipher)|Simon]]
 +
*[[SM4 (cipher)|SM4]]
 +
*[[Speck (cipher)|Speck]]
 
*[[Spectr-H64]]
 
*[[Spectr-H64]]
 
*[[Square (cipher)|Square]]
 
*[[Square (cipher)|Square]]
Line 111: Line 117:
 
*[[Treyfer]]
 
*[[Treyfer]]
 
*[[UES (cipher)|UES]]
 
*[[UES (cipher)|UES]]
*[[Xenon (cipher)|Xenon]]
 
 
*[[xmx]]
 
*[[xmx]]
 
*[[XXTEA]]
 
*[[XXTEA]]
Line 120: Line 125:
 
*[[Feistel cipher|Feistel network]]
 
*[[Feistel cipher|Feistel network]]
 
*[[Key schedule]]
 
*[[Key schedule]]
 +
*[[Lai–Massey scheme]]
 
*[[Product cipher]]
 
*[[Product cipher]]
 
*[[S-box]]
 
*[[S-box]]
 
*[[Permutation box|P-box]]
 
*[[Permutation box|P-box]]
*[[Substitution-permutation network|SPN]]
+
*[[Substitution–permutation network|SPN]]
 +
*[[Confusion and diffusion]]
 +
*[[Avalanche effect]]
 +
*[[Block size (cryptography)|Block size]]
 +
*[[Key size]]
 +
*[[Key whitening]] ([[Whitening transformation]])
  
 
| group5 = Attack<br />([[cryptanalysis]])
 
| group5 = Attack<br />([[cryptanalysis]])
 
| list5  =  
 
| list5  =  
*[[Brute-force attack|Brute-force]]
+
*[[Brute-force attack|Brute-force]] ([[EFF DES cracker]])
 
*[[Meet-in-the-middle attack|MITM]]
 
*[[Meet-in-the-middle attack|MITM]]
*[[Linear cryptanalysis|Linear]]
+
**[[Biclique attack|Biclique attack]]
*[[Differential cryptanalysis|Differential]] ([[Impossible differential cryptanalysis|Impossible]]
+
**[[3-subset meet-in-the-middle attack|3-subset MITM attack]]
*[[Truncated differential cryptanalysis|Truncated]]
+
*[[Linear cryptanalysis|Linear]] ([[Piling-up lemma]])
*[[Higher-order differential cryptanalysis|Higher-order]])
+
*[[Differential cryptanalysis|Differential]]
*[[Integral cryptanalysis|Integral]]
+
**[[Impossible differential cryptanalysis|Impossible]]
 +
**[[Truncated differential cryptanalysis|Truncated]]
 +
**[[Higher-order differential cryptanalysis|Higher-order]]
 +
*[[Differential-linear_attack|Differential-linear]]
 +
*[[Distinguishing attack|Distinguishing]] ([[Known-key distinguishing attack|Known-key]])
 +
*[[Integral cryptanalysis|Integral/Square]]
 
*[[Boomerang attack|Boomerang]]
 
*[[Boomerang attack|Boomerang]]
 
*[[Mod n cryptanalysis|Mod ''n'']]
 
*[[Mod n cryptanalysis|Mod ''n'']]
Line 139: Line 155:
 
*[[Slide attack|Slide]]
 
*[[Slide attack|Slide]]
 
*[[Rotational cryptanalysis|Rotational]]
 
*[[Rotational cryptanalysis|Rotational]]
*[[Timing attack|Timing]]
+
*[[Side-channel attack|Side-channel]]
 +
**[[Timing attack|Timing]]
 +
**[[Power analysis|Power-monitoring]]
 +
**[[Electromagnetic attack|Electromagnetic]]
 +
**[[Acoustic cryptanalysis|Acoustic]]
 +
**[[Differential fault analysis|Differential-fault]]
 
*[[XSL attack|XSL]]
 
*[[XSL attack|XSL]]
 
*[[Interpolation attack|Interpolation]]
 
*[[Interpolation attack|Interpolation]]
 
*[[Partitioning cryptanalysis|Partitioning]]
 
*[[Partitioning cryptanalysis|Partitioning]]
*[[Davies' attack|Davies']]
+
*[[Rubber-hose cryptanalysis|Rubber-hose]]
 +
*[[Black-bag cryptanalysis|Black-bag]]
 +
*[[Davies attack|Davies]]
 
*[[Rebound attack|Rebound]]
 
*[[Rebound attack|Rebound]]
 +
*[[Weak key]]
 +
*[[Kendall rank correlation coefficient|Tau]]
 +
*[[Chi-squared test|Chi-square]]
 +
*[[Time/memory/data tradeoff attack|Time/memory/data tradeoff]]
  
 
| group6 = Standardization
 
| group6 = Standardization
Line 152: Line 179:
 
*[[NESSIE]]
 
*[[NESSIE]]
  
| group7 = Misc
+
| group7 = Utilization
 
| list7  =  
 
| list7  =  
*[[Avalanche effect]]
 
*[[Block size (cryptography)|Block size]]
 
 
*[[Initialization vector]]
 
*[[Initialization vector]]
*[[Key size]]
 
 
*[[Block cipher mode of operation|Mode of operation]]
 
*[[Block cipher mode of operation|Mode of operation]]
 
*[[Padding (cryptography)|Padding]]
 
*[[Padding (cryptography)|Padding]]
*[[Piling-up lemma]]
 
*[[Weak key]]
 
*[[EFF DES cracker]]
 
*[[Key whitening]]
 
  
 
}}<noinclude>
 
}}<noinclude>
 +
 +
{{documentation|content=
  
 
=== The block cipher navigation box ===
 
=== The block cipher navigation box ===
Line 179: Line 201:
 
=== See also ===
 
=== See also ===
 
* [[Template:Infobox encryption method]]: an infobox for encryption methods, including block ciphers.
 
* [[Template:Infobox encryption method]]: an infobox for encryption methods, including block ciphers.
 +
 +
 +
{{Collapse|title=TemplateData|
 +
{{TemplateDataHeader}}
 +
<templatedata>
 +
{
 +
"description": "Please use \"Cryptography navbox\" template instead.",
 +
"format": "block",
 +
        "params": {}
 +
}
 +
</templatedata>
 +
}}
 +
}}
  
 
[[Category:Cryptography templates]]
 
[[Category:Cryptography templates]]
 
</noinclude>
 
</noinclude>

Latest revision as of 08:40, 18 June 2020

Template documentation

The block cipher navigation box

This template is a "specialised cryptography navigation box". It should NOT be added directly to an article. Instead it should be used within the main cryptography navigation box.

To use this template together with the main cryptography navigation box add this code to the bottom of an article:

{{cryptography navbox|block}}

For more details about these navigation boxes please see the instructions at the main cryptography navigation box and at the WikiProject Cryptography.

See also


TemplateData
This is the TemplateData documentation for this template used by VisualEditor and other tools; see the monthly parameter usage report for this template.

TemplateData for Cryptography block

Please use "Cryptography navbox" template instead.

Template parameters

This template prefers block formatting of parameters.

ParameterDescriptionTypeStatus
No parameters specified