FACTOID # 26: Delaware is the latchkey kid capital of America, with 71.8% of households having both parents in the labor force.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
   
 
WHAT'S NEW
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > John Kelsey (cryptanalyst)

John Kelsey is a cryptographer currently working at NIST. His research interests include cryptanalysis and design of symmetric cryptography primitives (block ciphers, stream ciphers, cryptographic hash functions, MACs), analysis and design of cryptographic protocols, cryptographic random number generation, electronic voting, side-channel attacks on cryptography implementations, and anonymizing communications systems. He previously worked at Certicom and Counterpane Internet Security. Pre-19th century Leone Battista Alberti, polymath/universal genius, inventor of polyalphabetic substitution (see frequency analysis for the significance of this -- missed by most for a long time and dumbed down in the Vigenère cipher), and what may have been the first mechanical encryption aid. ... As a non-regulatory agency of the United States Department of Commerce’s Technology Administration, the National Institute of Standards (NIST) develops and promotes measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life. ... Cryptanalysis (from the Greek kryptós, hidden, and analýein, to loosen or to untie) is the study of methods for obtaining the meaning of encrypted information, without access to the secret information which is normally required to do so. ... Symmetric-key algorithms are a class of algorithms for cryptography that use trivially related cryptographic keys for both decryption and encryption. ... Encryption Decryption In cryptography, a block cipher is a symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation. ... The operation of A5/1, a LFSR-based stream cipher used to encrypt mobile phone conversations. ... In cryptography, a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity. ... Mac or MAC may refer to // Macintosh, a line of computers Mac OS, an operating system that runs on Apple Macintosh computers, and its newest version Mac OS X Media Access Control, a data communication protocol sub-layer MAC address, a unique identifier attached to most forms of networking equipment. ... A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods. ... A cryptographically secure pseudo-random number generator (CSPRNG) is a pseudo-random number generator (PRNG) with properties that make it suitable for use in cryptography. ... Electronic voting machine by Diebold Election Systems used in all Brazilian elections and plebiscites. ... In cryptography, a side channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than weaknesses in the mathematical algorithms (compare cryptanalysis). ... Certicom is a security company specialising in elliptic curve cryptography (ECC). ... Counterpane Internet Security, Inc. ...


External links

  • John Kelsey at DBLP

 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m