Cryptanalysis/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} ==Parent topics== {{r|Cryptography}} {{r|Information theory}} ==Subtopics== {{r|Brute force attack}} {{r|Code book attack}} ==Other related topics== <!-- List topics h...) |
imported>Sandy Harris (→Subtopics: add several) |
||
Line 11: | Line 11: | ||
{{r|Brute force attack}} | {{r|Brute force attack}} | ||
{{r|Code book attack}} | {{r|Code book attack}} | ||
{{r|Active attack}} | |||
{{r|Passive attack}} | |||
{{r|Meet-in-the middle attack}} | |||
==Other related topics== | ==Other related topics== | ||
<!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. --> | <!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. --> |
Revision as of 23:45, 1 November 2008
- See also changes related to Cryptanalysis, or pages that link to Cryptanalysis or to this page or whose text contains "Cryptanalysis".
Parent topics
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Information theory [r]: Theory of the probability of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to transmission failure, distortion, and accidental additions. [e]
Subtopics
- Brute force attack [r]: An attempt to break a cipher by trying all possible keys; long enough keys make this impractical. [e]
- Code book attack [r]: Attacking a block cipher by creating a code book, collecting plaintext/ciphertext pairs. [e]
- Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]
- Passive attack [r]: An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them. [e]
- Meet-in-the middle attack [r]: Add brief definition or description
Categories:
- Subpages
- Related Article Subpages
- Military Related Article Subpages
- Computers Related Article Subpages
- Mathematics Related Article Subpages
- Approved Related Article Subpages
- Military Approved Related Article Subpages
- Computers Approved Related Article Subpages
- Mathematics Approved Related Article Subpages
- All Content
- Military Content
- Computers Content
- Mathematics Content
- Military tag
- Security tag