Statements (56)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:blockade
|
gptkbp:application |
encryption
|
gptkbp:block |
64 bytes
|
gptkbp:cryptographic_strength |
provably secure
|
gptkbp:design_purpose |
fast software encryption
|
gptkbp:designed_by |
gptkb:D._J._Bernstein
|
gptkbp:designed_for |
high performance
|
https://www.w3.org/2000/01/rdf-schema#label |
Salsa20
|
gptkbp:influenced_by |
RC4
|
gptkbp:is_adopted_by |
various protocols
|
gptkbp:is_implemented_in |
software and hardware
|
gptkbp:is_vulnerable_to |
known attacks
|
gptkbp:key |
128 bits
|
gptkbp:key_expansion |
not complex
|
gptkbp:key_schedule |
simple
|
gptkbp:mode_of_operation |
stream mode
|
gptkbp:nonce_size |
64 bits
|
gptkbp:notable_feature |
lightweight
low latency low memory usage high throughput easy to implement parallelizable simple API flexible key sizes easy to analyze good for Io T devices good for cloud computing good for embedded systems good for mobile devices good for real-time applications no initialization vector required resistant to timing attacks streaming encryption |
gptkbp:performance |
high speed
|
gptkbp:published_in |
gptkb:2005
|
gptkbp:related_to |
gptkb:crypt
|
gptkbp:resolution |
32 bytes
|
gptkbp:rounds |
gptkb:20
|
gptkbp:security |
extensively analyzed
|
gptkbp:security_strength |
128 bits
|
gptkbp:successor |
gptkb:Cha_Cha20
|
gptkbp:suitable_for |
low-latency applications
hardware implementations with limited resources |
gptkbp:used_in |
VPNs
disk encryption file encryption secure messaging apps |
gptkbp:uses |
symmetric key cryptography
|
gptkbp:uses_addition |
modular addition
|
gptkbp:uses_nonce |
yes
|
gptkbp:uses_rotation |
bitwise rotation
|
gptkbp:uses_xor |
bitwise XOR operation
|
gptkbp:variant |
gptkb:Cha_Cha
|
gptkbp:bfsParent |
gptkb:D._J._Bernstein
|
gptkbp:bfsLayer |
6
|