Home >> All >> gnu >> javax >> crypto >> [ cipher Javadoc ] |

**•**

**gnu.javax.crypto.cipher**: Javadoc index of package gnu.javax.crypto.cipher.

**Package Samples:**

**•**gnu.javax.crypto.cipher

**Classes:**

**•**Cast5: An implmenetation of the CAST5 (a.k.a. CAST-128) algorithm, as per RFC-2144 , dated May 1997. In this RFC, Carlisle Adams (the CA in CAST, ST stands for Stafford Tavares ) describes CAST5 as: "...a DES-like Substitution-Permutation Network (SPN) cryptosystem which appears to have good resistance to differential cryptanalysis, linear cryptanalysis, and related-key cryptanalysis. This cipher also possesses a number of other desirable cryptographic properties, including avalanche, Strict Avalanche Criterion (SAC), Bit Independence Criterion (BIC), no complementation property, and an absence of weak ...

**•**IBlockCipher: The basic visible methods of any symmetric key block cipher. A symmetric key block cipher is a function that maps n-bit plaintext blocks to n-bit ciphertext blocks; n being the cipher's block size . This encryption function is parameterised by a k-bit key, and is invertible. Its inverse is the decryption function. Possible initialisation values for an instance of this type are: The block size in which to operate this block cipher instance. This value is optional , if unspecified, the block cipher's default block size shall be used. The byte array containing the user supplied key material to use ...

**•**Serpent: Serpent is a 32-round substitution-permutation network block cipher, operating on 128-bit blocks and accepting keys of 128, 192, and 256 bits in length. At each round the plaintext is XORed with a 128 bit portion of the session key -- a 4224 bit key computed from the input key -- then one of eight S-boxes are applied, and finally a simple linear transformation is done. Decryption does the exact same thing in reverse order, and using the eight inverses of the S-boxes. Serpent was designed by Ross Anderson, Eli Biham, and Lars Knudsen as a proposed cipher for the Advanced Encryption Standard. Serpent ...

**•**TripleDES: Triple-DES, 3DES, or DESede is a combined cipher that uses three iterations of the Data Encryption Standard cipher to improve the security (at the cost of speed) of plain DES. Triple-DES runs the DES algorithm three times with three independent 56 bit keys. To encrypt: C i = E k3 ( E k2 -1 ( E k1 ( P i ))) And to decrypt: P i = E k1 -1 ( E k2 ( E k3 -1 ( C i ))) (The "ede" comes from the encryption operation, which runs Encrypt-Decrypt-Encrypt) References: Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition . (1996 John Wiley and Sons) ISBN 0-471-11709-9. ...

**•**Twofish: Twofish is a balanced 128-bit Feistel cipher, consisting of 16 rounds. In each round, a 64-bit S-box value is computed from 64 bits of the block, and this value is xored into the other half of the block. The two half-blocks are then exchanged, and the next round begins. Before the first round, all input bits are xored with key-dependent "whitening" subkeys, and after the final round the output bits are xored with other key-dependent whitening subkeys; these subkeys are not used anywhere else in the algorithm. Twofish is designed by Bruce Schneier, Doug Whiting, John Kelsey, Chris Hall, David Wagner ...

**•**Anubis: Anubis is a 128-bit block cipher that accepts a variable-length key. The cipher is a uniform substitution-permutation network whose inverse only differs from the forward operation in the key schedule. The design of both the round transformation and the key schedule is based upon the Wide Trail strategy and permits a wide variety of implementation trade-offs. References: The ANUBIS Block Cipher . Paulo S.L.M. Barreto and Vincent Rijmen .

**•**Khazad: Khazad is a 64-bit (legacy-level) block cipher that accepts a 128-bit key. The cipher is a uniform substitution-permutation network whose inverse only differs from the forward operation in the key schedule. The overall cipher design follows the Wide Trail strategy, favours component reuse, and permits a wide variety of implementation trade-offs. References: The Khazad Block Cipher . Paulo S.L.M. Barreto and Vincent Rijmen .

**•**DES: The Data Encryption Standard. DES is a 64-bit block cipher with a 56-bit key, developed by IBM in the 1970's for the standardization process begun by the National Bureau of Standards (now NIST). New applications should not use DES except for compatibility. This version is based upon the description and sample implementation in [1]. References: Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition . (1996 John Wiley and Sons) ISBN 0-471-11709-9. Pages 265--301, 623--632.

**•**Rijndael: Rijndael --pronounced Reindaal-- is the AES. It is a variable block-size (128-, 192- and 256-bit), variable key-size (128-, 192- and 256-bit) symmetric key block cipher. References: The Rijndael Block Cipher - AES Proposal . Vincent Rijmen and Joan Daemen .

**•**Square: Square is a 128-bit key, 128-bit block cipher algorithm developed by Joan Daemen, Lars Knudsen and Vincent Rijmen. References: The block cipher Square . Joan Daemen , Lars Knudsen and Vincent Rijmen .

**•**Blowfish: Blowfish is a 16-round, 64-bit Feistel cipher designed by Bruce Schneier. It accepts a variable-length key of up to 448 bits. References: Schneier, Bruce: Applied Cryptography , Second Edition, 336--339, 647--654 (1996 Bruce Schneier). The Blowfish Encryption Algorithm.

**•**NullCipher: The implementation of a Null block cipher. This cipher does not alter its input at all, claims to process block sizes 128-, 192- and 256-bit long, and key sizes from 64- to 512-bit in 8-bit increments.

**•**IBlockCipherSpi: Package-private interface exposing mandatory methods to be implemented by concrete gnu.crypto.cipher.BaseCipher sub-classes.

**•**WeakKeyException: Checked exception thrown to indicate that a weak key has been generated and or specified instead of a valid non-weak value.

**•**BaseCipher: A basic abstract class to facilitate implementing symmetric key block ciphers.

**•**CipherFactory: A Factory to instantiate symmetric block cipher instances.

Home | Contact Us | Privacy Policy | Terms of Service |