Template:Infobox encryption method/doc
Jump to navigation
Jump to search
This is a documentation subpage for Template:Infobox encryption method. It may contain usage information, categories and other content that is not part of the original template page. |
Example usage
General | |
---|---|
Designers | Vincent Rijmen, Joan Daemen |
First published | 1998 |
Derived from | Square |
Successors | CRYPTON, Anubis, Grand Cru |
Related to | ... |
Cipher detail | |
Key sizes | 128, 192 or 256 bits |
Block sizes | 128 bits |
Structure | Substitution-permutation network |
Rounds | 10, 12 or 14 (depending on key size) |
Best public cryptanalysis | |
A related-key attack can break up to 9 rounds of 256-bit AES [...] |
{{Infobox encryption method | name = AES | image = [[Image:AES-SubBytes.svg|280px|center]] | caption = The <code>SubBytes</code> step, one of four stages in a round of AES | designers = [[Vincent Rijmen]], [[Joan Daemen]] | publish date = 1998 | derived from = [[Square (cipher)|Square]] | derived to = [[CRYPTON]], [[Anubis (cipher)|Anubis]], [[Grand Cru (cipher)|Grand Cru]] | related to = ... | key size = 128, 192 or 256 bits | block size = 128 bits | structure = [[Substitution-permutation network]] | rounds = 10, 12 or 14 (depending on key size) | cryptanalysis = A [[related-key attack]] can break up to 9 rounds of 256-bit AES [...] }}
This template summarizes information about an encryption method. If you have suggestions as to how the template may be improved, please leave a message on the talk page.
All available parameters
{{Infobox encryption method | name = | image = | caption = | designers = | publish date = | derived from = | derived to = | related to = | key size = | block size = | structure = | rounds = | cryptanalysis = }}
Parameters
This infobox takes a number of parameters, which are all optional:
Parameter | Description |
---|---|
name | . |
image | . |
caption | . |
designers | . |
publish date | . |
derived from | . |
derived to | . |
related to | . |
key size | . |
block size | . |
rounds | . |
cryptanalysis | . |