Active attack/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
No edit summary
 
(2 intermediate revisions by one other user not shown)
Line 11: Line 11:
{{r|passive attack}}
{{r|passive attack}}
{{r|cryptographic authentication}}
{{r|cryptographic authentication}}
==Articles related by keyphrases (Bot populated)==
{{r|Cryptographic key}}
{{r|Symmetric key cryptography}}
{{r|Police}}
{{r|Commons theory of voluntary action}}
{{r|Steganography}}
{{r|ATM (disambiguation)}}

Latest revision as of 06:01, 6 July 2024

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Active attack.
See also changes related to Active attack, or pages that link to Active attack or to this page or whose text contains "Active attack".

Parent topics

  • Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]

Subtopics

  • Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]
  • Rewrite attack [r]: An attack on a communication system in which the attacker replaces a legitimate message with his own. [e]

Other related topics

  • Passive attack [r]: An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them. [e]
  • Cryptographic authentication [r]: Cryptographic techniques for authenticating both senders and messages; the most common are digital signatures and hashed message authentication codes. [e]

Articles related by keyphrases (Bot populated)