Matches in DBpedia 2016-04 for { <http://dbpedia.org/resource/New_Data_Seal> ?p ?o }
Showing triples 1 to 51 of
51
with 100 triples per page.
- New_Data_Seal abstract "In cryptography, New Data Seal (NDS) is a block cipher that was designed at IBM in 1975, based on the Lucifer algorithm that became DES.The cipher uses a block size of 128 bits, and a very large key size of 2048 bits. Like DES it has a 16-round Feistel network structure. The round function uses two fixed 4×4-bit S-boxes, chosen to be non-affine. The key is also treated as an 8×8-bit lookup table, using the first bit of each of the 8 bytes of the half-block as input. The nth bit of the output of this table determines whether or not the two nibbles of the nth byte are swapped after S-box substitution. All rounds use the same table. Each round function ends with a fixed permutation of all 64 bits, preventing the cipher from being broken down and analyzed as a system of simpler independent subciphers.In 1977, Edna Grossman and Bryant Tuckerman cryptanalyzed NDS using the first knownslide attack. This method uses no more than 4096 chosen plaintexts; in their best trial they recovered the key with only 556 chosen plaintexts.".
- New_Data_Seal wikiPageID "9347916".
- New_Data_Seal wikiPageLength "2446".
- New_Data_Seal wikiPageOutDegree "23".
- New_Data_Seal wikiPageRevisionID "482744151".
- New_Data_Seal wikiPageWikiLink Affine_transformation.
- New_Data_Seal wikiPageWikiLink Block_cipher.
- New_Data_Seal wikiPageWikiLink Block_size_(cryptography).
- New_Data_Seal wikiPageWikiLink Bryant_Tuckerman.
- New_Data_Seal wikiPageWikiLink CRC_Press.
- New_Data_Seal wikiPageWikiLink Category:Broken_block_ciphers.
- New_Data_Seal wikiPageWikiLink Category:Feistel_ciphers.
- New_Data_Seal wikiPageWikiLink Cryptography.
- New_Data_Seal wikiPageWikiLink Data_Encryption_Standard.
- New_Data_Seal wikiPageWikiLink Edna_Grossman.
- New_Data_Seal wikiPageWikiLink Feistel_cipher.
- New_Data_Seal wikiPageWikiLink IBM.
- New_Data_Seal wikiPageWikiLink John_Wiley_&_Sons.
- New_Data_Seal wikiPageWikiLink Key_(cryptography).
- New_Data_Seal wikiPageWikiLink Key_size.
- New_Data_Seal wikiPageWikiLink Lucifer_(cipher).
- New_Data_Seal wikiPageWikiLink Nibble.
- New_Data_Seal wikiPageWikiLink Permutation.
- New_Data_Seal wikiPageWikiLink S-box.
- New_Data_Seal wikiPageWikiLink Slide_attack.
- New_Data_Seal wikiPageWikiLinkText "New Data Seal".
- New_Data_Seal blockSize "128".
- New_Data_Seal cryptanalysis "Grossman & Tuckerman's slide attack uses at most 212 chosen plaintexts".
- New_Data_Seal derivedFrom Lucifer_(cipher).
- New_Data_Seal keySize "2048".
- New_Data_Seal name "New Data Seal".
- New_Data_Seal publishDate "1975".
- New_Data_Seal rounds "16".
- New_Data_Seal structure Feistel_cipher.
- New_Data_Seal wikiPageUsesTemplate Template:Cite_book.
- New_Data_Seal wikiPageUsesTemplate Template:Crypto-stub.
- New_Data_Seal wikiPageUsesTemplate Template:Cryptography_navbox.
- New_Data_Seal wikiPageUsesTemplate Template:Infobox_block_cipher.
- New_Data_Seal wikiPageUsesTemplate Template:No_footnotes.
- New_Data_Seal subject Category:Broken_block_ciphers.
- New_Data_Seal subject Category:Feistel_ciphers.
- New_Data_Seal hypernym Cipher.
- New_Data_Seal type Noble.
- New_Data_Seal type Algorithm.
- New_Data_Seal comment "In cryptography, New Data Seal (NDS) is a block cipher that was designed at IBM in 1975, based on the Lucifer algorithm that became DES.The cipher uses a block size of 128 bits, and a very large key size of 2048 bits. Like DES it has a 16-round Feistel network structure. The round function uses two fixed 4×4-bit S-boxes, chosen to be non-affine. The key is also treated as an 8×8-bit lookup table, using the first bit of each of the 8 bytes of the half-block as input.".
- New_Data_Seal label "New Data Seal".
- New_Data_Seal sameAs Q17082957.
- New_Data_Seal sameAs m.0285fz3.
- New_Data_Seal sameAs Q17082957.
- New_Data_Seal wasDerivedFrom New_Data_Seal?oldid=482744151.
- New_Data_Seal isPrimaryTopicOf New_Data_Seal.