KCipher-2

You can help expand this article with text translated from the corresponding article in Russian. (October 2021) Click [show] for important translation instructions.
  • Consider adding a topic to this template: there are already 1,193 articles in the main category, and specifying|topic= will aid in categorization.
  • Do not translate text that appears unreliable or low-quality. If possible, verify the text with references provided in the foreign-language article.
  • You must provide copyright attribution in the edit summary accompanying your translation by providing an interlanguage link to the source of your translation. A model attribution edit summary is Content in this edit is translated from the existing Russian Wikipedia article at [[:RU:KCipher-2]]; see its history for attribution.
  • You should also add the template {{Translated|RU|KCipher-2}} to the talk page.
  • For more guidance, see Wikipedia:Translation.

KCipher-2 is a stream cipher jointly developed by Kyushu University and Japanese telecommunications company KDDI.[1] It is standardized as ISO/IEC 18033–4,[2] and is on the list of recommended ciphers published by the Japanese Cryptography Research and Evaluation Committees (CRYPTREC).[3] It has a key length of 128 bits, and can encrypt and decrypt around seven to ten times faster than the Advanced Encryption Standard (AES) algorithm.[1]

Notes

  1. ^ a b Seto & Saitō 2019, p. 231.
  2. ^ Hidaka 2012.
  3. ^ Seto & Saitō 2019, p. 234.

References

  • Seto, Mitsuki; Saitō, Ken'ichi (2019). Tettei Kōryaku: Jōhō Shori Anzen Kakuho Shienshi Kyōkasho [Comprehensive Strategy: Registered Information Security Specialist Textbook] (in Japanese) (2020 ed.). Impress.
  • Hidaka, Akira (17 February 2012). "Hayai, Karui, Namae no Yurai ga Omoshiroi? Mobairu Kiki ni Tekishita Angōka Gijutsu "KCipher-2" to wa?" [Fast, Light, a Name with an Interesting Origin? About "KCipher-2", an Encryption Algorithm Suited for Mobile Devices] (in Japanese). IT Media. Retrieved 2 October 2020.
  • v
  • t
  • e
Stream ciphers
Widely used ciphers
  • A5/1
  • A5/2
  • ChaCha
  • Crypto-1
  • E0
  • RC4
eSTREAM Portfolio
Software
  • HC-128
  • Rabbit
  • Salsa20
  • SOSEMANUK
Hardware
  • Grain
  • MICKEY
  • Trivium
Other ciphers
Generators
Theory
Attacks
  • v
  • t
  • e
General
Mathematics
  • Category
Stub icon

This cryptography-related article is a stub. You can help Wikipedia by expanding it.

  • v
  • t
  • e