This article will be permanently flagged as inappropriate and made unaccessible to everyone. Are you certain this article is inappropriate? Excessive Violence Sexual Content Political / Social
Email Address:
Article Id: WHEBN0000598557 Reproduction Date:
In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the individual components to make it resistant to cryptanalysis.[1] The product cipher combines a sequence of simple transformations such as substitution, permutation, and modular arithmetic. The concept of product ciphers is due to Claude Shannon, who presented the idea in his foundational paper, Communication Theory of Secrecy Systems.
For transformation involving reasonable number of n message symbols, both of the foregoing cipher systems (the S-box and P-box) are by themselves wanting. Shannon suggested using a combination of S-box and P-box transformation—a product cipher. The combination could yield a cipher system more powerful than either one alone. This approach of alternatively applying substitution and permutation transformation has been used by IBM in the Lucifer cipher system, and has become the standard for national data encryption standards such as the Data Encryption Standard and the Advanced Encryption Standard. A product cipher that uses only substitutions and permutations is called a SP-network. Feistel ciphers are an important class of product ciphers.
World War II, Steganography, Espionage, Internet, Germany
Don Coppersmith, Wayback Machine, Whitfield Diffie, Martin Hellman, John Gilmore (activist)
National Security Agency, Cipher, Cryptanalysis, National Institute of Standards and Technology, Belgium
World War II, E, World War I, Enigma machine, Bletchley Park
Cryptography, Deutsche Telekom, Block cipher, Acronym, Magenta
Cryptography, Data Encryption Standard, Cryptanalysis, Linear cryptanalysis, Differential cryptanalysis
Cryptography, Data Encryption Standard, Advanced Encryption Standard, Safer, Shark
Cryptography, Information theory, Claude Shannon, One-time pad, A Mathematical Theory of Communication
Cryptography, History of cryptography, Julius Caesar, Napoleon, Zodiac