Active attack/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris (create) |
imported>Sandy Harris |
||
Line 10: | Line 10: | ||
==Other related topics== | ==Other related topics== | ||
{{r|passive attack}} | {{r|passive attack}} | ||
{{r|cryptographic authentication}} |
Revision as of 18:07, 3 January 2009
- See also changes related to Active attack, or pages that link to Active attack or to this page or whose text contains "Active attack".
Parent topics
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
Subtopics
- Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]
- Rewrite attack [r]: An attack on a communication system in which the attacker replaces a legitimate message with his own. [e]
- Passive attack [r]: An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them. [e]
- Cryptographic authentication [r]: Cryptographic techniques for authenticating both senders and messages; the most common are digital signatures and hashed message authentication codes. [e]