Difference between revisions of "Template:Infobox encryption method/doc"

From blackwiki
Jump to navigation Jump to search
imported>Intgr
m (Dates/years shouldn't be linked any more)
imported>Jonesey95
m (Fix invalid self-closed HTML tag or other HTML Tidy-related tag error)
Line 17: Line 17:
 
| cryptanalysis = A [[related-key attack]] can break up to 9 rounds of 256-bit AES [...]
 
| cryptanalysis = A [[related-key attack]] can break up to 9 rounds of 256-bit AES [...]
 
}}
 
}}
<br clear=all>
+
{{clear}}
 
<pre><nowiki>
 
<pre><nowiki>
 
{{Infobox block cipher
 
{{Infobox block cipher

Revision as of 21:31, 28 January 2017

Example usage

AES
The SubBytes step, one of four stages in a round of AES
General
DesignersVincent Rijmen, Joan Daemen
First published1998
Derived fromSquare
SuccessorsCRYPTON, Anubis, Grand Cru
Related to...
Cipher detail
Key sizes128, 192 or 256 bits
Block sizes128 bits
StructureSubstitution-permutation network
Rounds10, 12 or 14 (depending on key size)
Best public cryptanalysis
A related-key attack can break up to 9 rounds of 256-bit AES [...]
{{Infobox block cipher
| name          = AES
| image         = [[Image:AES-SubBytes.svg|280px|center]]
| caption       = The <tt>SubBytes</tt> step, one of four stages in a round of AES
| designers     = [[Vincent Rijmen]], [[Joan Daemen]]
| publish date  = 1998
| derived from  = [[Square (cipher)|Square]]
| derived to    = [[CRYPTON]], [[Anubis (cipher)|Anubis]], [[Grand Cru (cipher)|Grand Cru]]
| related to    = ...
| key size      = 128, 192 or 256 bits
| block size    = 128 bits
| structure     = [[Substitution-permutation network]]
| rounds        = 10, 12 or 14 (depending on key size)
| cryptanalysis = A [[related-key attack]] can break up to 9 rounds of 256-bit AES [...]
}}