FACTOID # 12: It's not the government they hate: Washington DC has the highest number of hate crimes per capita in the US.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
   
 
WHAT'S NEW
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > Scream (cipher)

The Scream cipher is a word-based stream cipher developed by Shai Halevi, Don Coppersmith and Charanjit Jutla from IBM. The operation of A5/1, a LFSR-based stream cipher used to encrypt mobile phone conversations. ... Don Coppersmith is a cryptographer and mathematician who was involved in the design of the Data Encryption Standard block cipher at IBM. He has also worked on algorithms for computing discrete logarithms, the cryptanalysis of RSA, methods for rapid matrix multiplication and IBMs MARS cipher, In 1972, Coppersmith obtained... International Business Machines Corporation (IBM, or colloquially, Big Blue) NYSE: IBM (incorporated June 15, 1911, in operation since 1888) is headquartered in Armonk, NY, USA. The company manufactures and sells computer hardware, software, infrastructure services and consulting services. ...


The cipher is designed as a software efficient stream cipher. The authors describe the goal of the cipher to be a more secure version of the SEAL cipher. SEAL (Software-Optimized Encryption Algorithm) is a very fast stream cipher optimised for machines with a 32-bit word size and plenty of RAM. The first version was published by Phil Rogaway and Don Coppersmith in 1994. ...


The general design of Scream is close to the design of SEAL with block cipher-like round functions. There are two versions of Scream. One of them, Scream-F, reuses the S-boxes from the Advanced Encryption Standard (AES) block cipher, while the other, Scream, internally generates new, key-dependent S-boxes as part of the initialization phase. The round function is also based on the AES-round function, but is narrower, 64 bits instead of 128 bits. Encryption Decryption In cryptography, a block cipher is a symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation. ... In cryptography, a substitution box (or S-box) is a basic component of symmetric key algorithms. ... General Designer(s) Vincent Rijmen and Joan Daemen First published 1998 Derived from Square (cipher) Cipher(s) based on this design Crypton (cypher), Anubis (cipher), GRAND CRU Algorithm detail Block size(s) 128 bits note Key size(s) 128, 192 or 256 bits note Structure Substitution-permutation network Number of...


The cipher uses a 128-bit key[citation needed] and a full 128-bit nonce, down to about 5 cycles/Byte on modern, RISC-like processors. Reduced Instruction Set Computer (RISC), is a microprocessor CPU design philosophy that favors a smaller and simpler set of instructions that all take about the same amount of time to execute. ...


The cipher was presented at the Fast Software Encryption (FSE) conference in 2002.


References

  • Scream: a software-efficient stream cipher (pdf)


Stream ciphers edit
Algorithms: A5/1 | A5/2 | FISH | Grain | ISAAC | MUGI | Panama | Phelix | Pike | RC4 | Salsa20 | Scream | SEAL | SOBER | SOBER-128 | Trivium | VEST | WAKE
Theory: Shift register | LFSR | NLFSR | Shrinking generator
Misc: eSTREAM

  Results from FactBites:
 
Portal:Cryptography - Wikipedia, the free encyclopedia (786 words)
A Caesar cipher, also known as a Caesar shift cipher or shift cipher, is one of the simplest and most widely-known encryption techniques.
It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
In Australia, the Vigenère cipher is being used to communicate with an extortionist via the advertisements in a newspaper [3].
Directory - Science: Math: Applications: Communication Theory: Cryptography: Algorithms: Ciphers (852 words)
Konton2: A Stream Cipher  · Konton2 is a stream cipher which does not resemble RC4 and does not use shift registers.
Helix Stream Cipher  · cached · This PDF document describes the Helix stream cipher, devised by Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, and Tadayoshi Kohno.
HC-256 Stream Cipher  · cached · HC-256 is a stream cipher developed by Hongjun Wu at the Institute for Infocomm Research in Singapore.
  More results at FactBites »

 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m