Bruce Schneier - Cryptographic Algorithms

Cryptographic Algorithms

Schneier has been involved in the creation of many cryptographic algorithms.

Hash functions:

  • Skein

Stream ciphers:

  • Solitaire
  • Phelix
  • Helix

Pseudo-random number generators:

  • Fortuna
  • Yarrow algorithm

Block ciphers:

  • Twofish
  • Blowfish
  • Threefish
  • MacGuffin

Read more about this topic:  Bruce Schneier

Other articles related to "cryptographic algorithms, algorithm, cryptographic, algorithms":

STU-III - Use
... It contains both the cryptographic algorithms as well as the key(s) used for encryption ... Cryptographic algorithms include BATON, FIREFLY, and SDNS signature algorithm ... STU-III and STE are built on technologies that are proprietary, and detail of the cryptographic algorithms is classified (e.g ...
Cryptographic Key Types
... One of the most important aspects of any cryptographic system is key management it is also the aspect which is most often neglected ... key pairs that are used by public key algorithms to generate digital signatures with possible long-term implications ... an asymmetric (public) key pair that is used by a public key algorithm to verify digital signatures, either to authenticate a user's identity, to determine the ...
List Of Random Number Generators - Cryptographic Algorithms
... Cipher algorithms and cryptographic hashes can also be used as pseudorandom number generators ... These include Block ciphers in counter mode Cryptographic hash function in counter mode Stream ciphers ...