Template:Infobox Encryption method

From Wikipedia, the free encyclopedia

[edit] Template documentation
Templates redirected here:
Infobox Block cipher
Infobox Cryptographic hash function

Contents

[edit] Usage

{{Infobox Encryption method
|name           = 
|image          = 
|caption        = 
|designers      = 
|publish date   = 
|series         = 
|derived from   = 
|derived to     = 
|related to     = 
|certification  = 
|digest size    =   <!--(hash functions)-->
|key size       =   <!--(block ciphers)-->
|security claim = 
|block size     =   <!--(block ciphers)-->
|structure      = 
|rounds         = 
|cryptanalysis  = 
}}

[edit] Description of fields

(See talk page for an example)

All fields except for name are optional.

[edit] Header

name  
Name of the block cipher or hash function (or preferably its abbreviation if the expansion contains multiple words and would not fit well).
image  
An illustrative image for the block cipher or hash function; e.g. for Feistel-structured ciphers, this would typically be an illustration of the cipher's Feistel function.
caption 
(Only if the image field is specified) caption for the image.

[edit] General

designers  
Names of the designers/authors of the block cipher or hash function, separated by commas. Should not contain organization names unless names of the real authors are unknown. The names should be linked if articles about them exist.
publish date  
Date that the block cipher or hash function was first presented. If the exact date is unknown, this should at least contain the year number.
series  
A comma-separated list of block ciphers or hash functions in a series, usually named similarly. For example, "MD, MD2, MD3, MD4, MD5" (hash function).
derived from  
A comma-separated list of block ciphers or hash functions that inspired the design of the block cipher or hash function. (Do not duplicate series here.)
derived to  
A comma-separated list of block ciphers or hash functions whose design was inspired by the block cipher or hash function. (Do not duplicate series here.)
related to  
A list of block ciphers or hash functions that are otherwise related to the block cipher or hash function. This field should be used minimally, and only when the relation is clearly significant.
certification 
Cryptography expert groups that have selected or recommended this algorithm. For example, "AES finalist", "NESSIE", "CRYPTREC".

[edit] Detail

digest size  
(hash functions only) Size of hash function digest output in bits. Should include the suffix "bits"; for example, "128 bits".
key size  
(block ciphers only) Key size or sizes that the block cipher was originally designed to operate with, in bits. Should contain the suffix "bits". May contain multiple sizes. For example, AES submissions would have "128, 192 or 256 bits"
security claim  
(block ciphers only) Any security claim or claims that the block cipher or hash function was originally designed to achieve, in bits. Should contain the suffix "bits". May contain multiple sizes. For example, "128, 192 or 256 bits".
block size  
(block ciphers only) Size or sizes of the input and output blocks of the block cipher. Should contain the suffix "bits". May contain multiple sizes.
structure  
If the block cipher or hash function follows a common structure. For example, typical block ciphers should state "Feistel network" or "Substitution-permutation network" here.
rounds  
The number or numbers of rounds the block cipher or hash function was originally designed to work with.
cryptanalysis  
The best-known cryptanalysis for the block cipher or hash function. Should contain a brief overview of the vulnerabilities and a footnote link to a relevant reference or references.

[edit] Extra features

  • Articles on block ciphers that use this template are automatically included in the Category:Block ciphers if the key size and/or block size parameters are used.
    Articles on hash functions that use this template are automatically included in the Category:Cryptographic hash functions if the digest size parameter is used.

[edit] See also

{{{name}}}
{{{image}}}
{{{caption}}}
General
Designers {{{designers}}}
First published {{{publish date}}}
Series {{{series}}}
Derived from {{{derived from}}}
Successors {{{derived to}}}
Related to {{{related to}}}
Certification {{{certification}}}
Detail
Digest sizes {{{digest size}}}
Key sizes {{{key size}}}
Security claims {{{security claim}}}
Block sizes {{{block size}}}
Structure {{{structure}}}
Rounds {{{rounds}}}
Best public cryptanalysis
{{{cryptanalysis}}}