Statements (56)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cipher
|
gptkbp:appliesTo |
data storage
digital communications |
gptkbp:developedBy |
Massey
Omura |
gptkbp:hasKeywords |
variable key size
|
https://www.w3.org/2000/01/rdf-schema#label |
Massey-Omura cipher
|
gptkbp:isBasedOn |
mathematical principles
|
gptkbp:isCompatibleWith |
block ciphers
stream ciphers |
gptkbp:isConsidered |
a modern cipher
a secure cipher |
gptkbp:isDiscussedIn |
cryptography literature
|
gptkbp:isEvaluatedBy |
performance metrics
security analysis computational efficiency security robustness |
gptkbp:isInfluencedBy |
historical ciphers
|
gptkbp:isLocatedIn |
hardware
software various programming languages |
gptkbp:isNotableFor |
real-time applications
|
gptkbp:isPartOf |
encryption standards
information security encryption algorithms secure communication protocols encryption frameworks other ciphers secure systems design |
gptkbp:isPublishedIn |
academic journals
|
gptkbp:isRelatedTo |
cryptography
|
gptkbp:isStudiedIn |
academic research
|
gptkbp:isTaughtIn |
cryptography courses
|
gptkbp:isTrainedIn |
known-plaintext attacks
ciphertext-only attacks chosen-plaintext attacks |
gptkbp:isUsedBy |
financial institutions
government agencies |
gptkbp:isUsedFor |
authentication
data confidentiality file encryption secure data transmission non-repudiation |
gptkbp:isUsedIn |
VPNs
data protection regulations secure messaging secure email cloud storage security |
gptkbp:isVisitedBy |
the 1980s
|
gptkbp:isVulnerableTo |
cryptanalysis
|
gptkbp:provides |
confidentiality
data integrity |
gptkbp:requires |
key exchange
|
gptkbp:type |
symmetric cipher
|
gptkbp:uses |
polynomial functions
modular arithmetic |