https://en.wikipedia.org/w/index.php?action=history&feed=atom&title=User%3ACodeBreakNight%2FSymmetric-key_algorithmUser:CodeBreakNight/Symmetric-key algorithm - Revision history2025-06-01T09:50:21ZRevision history for this page on the wikiMediaWiki 1.45.0-wmf.3https://en.wikipedia.org/w/index.php?title=User:CodeBreakNight/Symmetric-key_algorithm&diff=1059652441&oldid=prevCodeBreakNight: fixed one of my own citations2021-12-10T19:16:05Z<p>fixed one of my own citations</p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 19:16, 10 December 2021</td>
</tr><tr>
<td colspan="2" class="diff-lineno">Line 5:</td>
<td colspan="2" class="diff-lineno">Line 5:</td>
</tr>
<tr>
<td class="diff-marker"></td>
<td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td>
<td class="diff-marker"></td>
<td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td>
</tr>
<tr>
<td class="diff-marker"></td>
<td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* ''Stream ciphers encrypt the digits (typically [[Byte|bytes]]), or letters (in substitution ciphers) of a message one at a time. An example is [[ChaCha20]].''</div></td>
<td class="diff-marker"></td>
<td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* ''Stream ciphers encrypt the digits (typically [[Byte|bytes]]), or letters (in substitution ciphers) of a message one at a time. An example is [[ChaCha20]].''</div></td>
</tr>
<tr>
<td class="diff-marker" data-marker="−"></td>
<td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>** Substitution ciphers are well-known ciphers, but can be easily decrypted using a frequency table. <<del style="font-weight: bold; text-decoration: none;">sup</del>><del style="font-weight: bold; text-decoration: none;">'''This citation is not working at the moment...'''</del> https://web.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf</<del style="font-weight: bold; text-decoration: none;">sup</del>></div></td>
<td class="diff-marker" data-marker="+"></td>
<td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>** Substitution ciphers are well-known ciphers, but can be easily decrypted using a frequency table. <<ins style="font-weight: bold; text-decoration: none;">ref</ins>><ins style="font-weight: bold; text-decoration: none;">{{Cite</ins> <ins style="font-weight: bold; text-decoration: none;">book|last=Bellare|first=Mihir|url=</ins>https://web.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf<ins style="font-weight: bold; text-decoration: none;">|title=Introduction to Modern Cryptography|last2=Rogaway|first2=Phillip|year=2005|language=English}}</ins></<ins style="font-weight: bold; text-decoration: none;">ref</ins>></div></td>
</tr>
<tr>
<td class="diff-marker"></td>
<td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* ''Block ciphers take a number of bits and encrypt them as a single unit, padding the plaintext so that it is a multiple of the block size. The [[Advanced Encryption Standard]] (AES) algorithm, approved by [[NIST]] in December 2001, uses 128-bit blocks.''</div></td>
<td class="diff-marker"></td>
<td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* ''Block ciphers take a number of bits and encrypt them as a single unit, padding the plaintext so that it is a multiple of the block size. The [[Advanced Encryption Standard]] (AES) algorithm, approved by [[NIST]] in December 2001, uses 128-bit blocks.''</div></td>
</tr>
<tr>
<td class="diff-marker"></td>
<td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td>
<td class="diff-marker"></td>
<td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td>
</tr>
<tr>
<td colspan="2" class="diff-lineno">Line 30:</td>
<td colspan="2" class="diff-lineno">Line 30:</td>
</tr>
<tr>
<td class="diff-marker"></td>
<td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td>
<td class="diff-marker"></td>
<td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td>
</tr>
<tr>
<td class="diff-marker"></td>
<td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>[[Category:Wikipedia Student Program]]</div></td>
<td class="diff-marker"></td>
<td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>[[Category:Wikipedia Student Program]]</div></td>
</tr>
<tr>
<td colspan="2" class="diff-empty diff-side-deleted"></td>
<td class="diff-marker" data-marker="+"></td>
<td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><references /></div></td>
</tr>
</table>CodeBreakNighthttps://en.wikipedia.org/w/index.php?title=User:CodeBreakNight/Symmetric-key_algorithm&diff=1059651382&oldid=prevCodeBreakNight: Copied things over to this sandbox.2021-12-10T19:07:14Z<p>Copied things over to this sandbox.</p>
<p><b>New page</b></p><div>== possible edits to Symmetric-key algorithm article ==<br />
<br />
=== Under Types ===<br />
''Symmetric-key encryption can use either [[Stream cipher|stream ciphers]] or [[Block cipher|block ciphers]].<ref>{{cite book|last=Pelzl & Paar|url=https://archive.org/details/understandingcry00paar|title=Understanding Cryptography|publisher=Springer-Verlag|year=2010|location=Berlin|page=[https://archive.org/details/understandingcry00paar/page/n44 30]|bibcode=2010uncr.book.....P|url-access=limited}}</ref>''<br />
<br />
* ''Stream ciphers encrypt the digits (typically [[Byte|bytes]]), or letters (in substitution ciphers) of a message one at a time. An example is [[ChaCha20]].''<br />
** Substitution ciphers are well-known ciphers, but can be easily decrypted using a frequency table. <sup>'''This citation is not working at the moment...''' https://web.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf</sup><br />
* ''Block ciphers take a number of bits and encrypt them as a single unit, padding the plaintext so that it is a multiple of the block size. The [[Advanced Encryption Standard]] (AES) algorithm, approved by [[NIST]] in December 2001, uses 128-bit blocks.''<br />
<br />
=== Under Security of symmetric ciphers ===<br />
''Symmetric ciphers have historically been susceptible to [[Known-plaintext attack|known-plaintext attacks]], [[Chosen-plaintext attack|chosen-plaintext attacks]], [[differential cryptanalysis]] and [[linear cryptanalysis]]. Careful construction of the functions for each round can greatly reduce the chances of a successful attack.<sup>[<nowiki/>[[wikipedia:Citation_needed|citation needed]]]</sup>'' <sup>'''Note to self: This is by pediapress, Wiki's own book... What do I do about this?'''</sup> You can also increase the key length or the rounds in the encryption process to better protect against attack. This, however, tends to increase the processing power and decrease the speed at which the process runs due to the amount of operations the system needs to do.<ref>{{Cite book|url=https://www.worldcat.org/oclc/51564102|title=Hack proofing your network|date=2002|publisher=Syngress|others=David R. Mirza Ahmad, Ryan Russell|isbn=1-932266-18-6|edition=2nd ed|location=Rockland, MA|pages=165-203|oclc=51564102}}</ref><br />
<br />
=== For the rest of the article ===<br />
It seems as though some sources need to be checked or found, and maybe talk a little on the titles that have nothing/ only a little.<br />
<br />
=== Intro (copied) ===<br />
'''''Symmetric-key algorithms'''{{efn|Other terms for symmetric-key encryption are ''secret-key'', ''single-key'', ''shared-key'', ''one-key'', and ''private-key'' encryption. Use of the last and first terms can create ambiguity with similar terminology used in [[public-key cryptography]]. Symmetric-key cryptography is to be contrasted with [[asymmetric-key cryptography]].}} are [[Algorithm|algorithms]] for [[cryptography]] that use the same [[Key (cryptography)|cryptographic keys]] for both the encryption of [[plaintext]] and the decryption of [[ciphertext]]. The keys may be identical, or there may be a simple transformation to go between the two keys.<ref>{{Cite journal|last=Kartit|first=Zaid|date=February 2016|title=Applying Encryption Algorithms for Data Security in Cloud Storage, Kartit, et al.|url=https://books.google.com/books?id=uEGFCwAAQBAJ&q=%22keys+may+be+identical%22&pg=PA147|journal=Advances in Ubiquitous Networking: Proceedings of UNet15|pages=147|isbn=9789812879905}}</ref> The keys, in practice, represent a [[shared secret]] between two or more parties that can be used to maintain a private information link.<ref>{{cite book|title=Introduction to cryptography: principles and applications|publisher=Springer|year=2007|isbn=9783540492436|chapter=Symmetric-key encryption|chapter-url=https://books.google.com/books?id=Nnvhz_VqAS4C&pg=PA11|authors=Delfs, Hans & Knebl, Helmut}}</ref> The requirement that both parties have access to the secret key is one of the main drawbacks of symmetric-key encryption, in comparison to [[Public key encryption|public-key encryption]] (also known as asymmetric-key encryption).<ref>{{cite book|url=https://books.google.com/books?id=yDgWctqWL4wC&pg=PA112|title=Finite fields and applications|publisher=American Mathematical Society|year=2007|isbn=9780821844182|page=112|authors=Mullen, Gary & Mummert, Carl}}</ref><ref>{{cite web|date=2017-09-28|title=Demystifying symmetric and asymmetric methods of encryption|url=https://www.cheapsslshop.com/blog/demystifying-symmetric-and-asymmetric-methods-of-encryption|publisher=Cheap SSL Shop}}</ref>'' However, symmetric-key encryption are usually better for bulk encryption. They have a smaller file size which allows for less storage space and faster transmission. Due to this, asymmetric-encryption is often used to exchange the secret key for symmetric-key encryption.<ref>{{Citation|last=Johnson|first=Leighton|title=Security Component Fundamentals for Assessment|date=2016|url=http://dx.doi.org/10.1016/b978-0-12-802324-2.00011-7|work=Security Controls Evaluation, Testing, and Assessment Handbook|pages=531–627|publisher=Elsevier|access-date=2021-12-06}}</ref><br />
<br />
<br />
<br />
Check the [1].{{Dashboard.wikiedu.org draft template/about this sandbox}}<br />
<br />
== Article Draft ==<br />
<br />
=== Lead ===<br />
<br />
=== Article body ===<br />
<br />
=== References ===<br />
<br />
[[Category:Wikipedia Student Program]]</div>CodeBreakNight