In cryptography, MUGI is a pseudorandom number generator (PRNG) designed for use as a stream cipher. It has been recommended for Japanese government use by the CRYPTREC project. Cryptography portal Cryptography (from Greek kryptós, hidden, and gráphein, to write) is, traditionally, the study of means of converting information from its normal, comprehensible form into an incomprehensible format, rendering it unreadable without secret knowledge — the art of encryption. ... A pseudorandom number generator (PRNG) is an algorithm that generates a sequence of numbers, the elements of which are approximately independent of each other. ... The operation of A5/1, a LFSR-based stream cipher used to encrypt mobile phone conversations. ... CRYPTREC is the Cryptography Research and Evaluation Committee set up by the Japanese Government to evaluate and recommend cryptographic techniques for government and industrial use. ...
MUGI takes a 128-bit secret key and a 128-bit initial value (IV). After a key- and IV- setup process, MUGI outputs 64-bit output strings based on the internal state, while updating the internal state after each output block. MUGI has a 1216-bit internal state; there are three 64-bit registers (the "state") and 16 64-bit registers (the "buffer"). A key is a piece of information that controls the operation of a cryptography algorithm. ...
MUGI uses the non-linear S-box that was originally defined in Advanced Encryption Standard (AES). A part of the linear transformation also reuses the MDS of AES. The basic design is influenced by that of Panama. In cryptography, a substitution box (or S-box) is a basic component of symmetric key algorithms. ... General Designer(s) Vincent Rijmen and Joan Daemen First published 1998 Derived from Square (cipher) Cipher(s) based on this design Crypton (cypher), Anubis (cipher), GRAND CRU Algorithm detail Block size(s) 128 bits note Key size(s) 128, 192 or 256 bits note Structure Substitution-permutation network Number of...
Dai Watanabe, Soichi Furuya, Kazuo Takaragi, Bart Preneel, ``A New Keystream Generator MUGI, Fast Software Encryption, 9th International Workshop, FSE2002,
Categories: Stream ciphers The operation of A5/1, a LFSR-based stream cipher used to encrypt mobile phone conversations. ... For the Vietnam road named RC4, see Route Coloniale 4. ... A5/1 is a stream cipher used to provide over-the-air voice privacy in the GSM cellular telephone standard. ... A5/2 is a stream cipher used to provide voice privacy in the GSM cellular telephone protocol. ... For the British code-word for World War II German stream cipher teleprinter secure communications devices, see Fish (cryptography). ... In cryptography, Helix is a high-speed asynchronous stream cipher with a built-in message authentication code (MAC) functionality. ... ISAAC is a pseudorandom number generator designed by Bob Jenkins (1996) to be cryptographically secure. ... The Pike stream cipher was invented by Ross Anderson to be a leaner and meaner version of FISH after he broke FISH in 1994; the name is a humorous allusion to the Pike fish. ... SEAL (Software-Optimized Encryption Algorithm) is a very fast stream cipher optimised for machines with a 32-bit word size and plenty of RAM. The first version was published by Phil Rogaway and Don Coppersmith in 1994. ... SOBER-128 is a synchronous stream cipher designed by Hawkes and Rose (2003) and is a member of the SOBER family of ciphers. ... A wake is the region of turbulence immediately to the rear of a solid body caused by the flow of air or water around the body. ... In cryptography, the shrinking generator is a form of pseudorandom number generator intended to be used in a stream cipher. ...
Share your thoughts, questions and commentary here
Want to know more? Search encyclopedia, statistics and forums:
Press Releases |
The Wikipedia article included on this page is licensed under the
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m