Cryptanalysis/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris |
No edit summary |
||
(8 intermediate revisions by 3 users not shown) | |||
Line 9: | Line 9: | ||
==Subtopics== | ==Subtopics== | ||
===Techniques=== | |||
{{r|Frequency analysis}} | |||
{{r|Index of coincidence}} | |||
{{r|Kasiski attack}} | |||
{{r|Kappa test}} | |||
{{r|Passive attack}} | |||
{{r|Active attack}} | |||
{{r|Linear cryptanalysis}} | |||
{{r|Differential cryptanalysis}} | |||
{{r|Brute force attack}} | {{r|Brute force attack}} | ||
{{r|Code book attack}} | {{r|Code book attack}} | ||
{{r| | {{r|Algebraic attack}} | ||
{{r| | {{r|Birthday attack}} | ||
{{r|Meet-in-the-middle attack}} | {{r|Meet-in-the-middle attack}} | ||
===Historical examples=== | |||
{{r|Zimmerman Telegram}} | |||
{{r|ULTRA}} | |||
{{r|MAGIC}} | |||
==Other related topics== | ==Other related topics== | ||
<!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. --> | <!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. --> | ||
{{r|Man-in-the-middle attack}} | |||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Multi-touch interface}} | |||
{{r|Computer architecture}} |
Latest revision as of 11:00, 3 August 2024
- See also changes related to Cryptanalysis, or pages that link to Cryptanalysis or to this page or whose text contains "Cryptanalysis".
Parent topics
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Information theory [r]: Theory of the probability of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to transmission failure, distortion, and accidental additions. [e]
Subtopics
Techniques
- Frequency analysis [r]: Add brief definition or description
- Index of coincidence [r]: Add brief definition or description
- Kasiski attack [r]: Add brief definition or description
- Kappa test [r]: Add brief definition or description
- Passive attack [r]: An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them. [e]
- Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]
- Linear cryptanalysis [r]: Attacking a cipher using linear approximations to its components' behaviour; the objective is to build up an overall approximation that breaks the cipher. [e]
- Differential cryptanalysis [r]: Attacking a cipher by studying the way that small changes in input, such as complementing a single bit, affect the output. [e]
- Brute force attack [r]: An attempt to break a cipher by trying all possible keys; long enough keys make this impractical. [e]
- Code book attack [r]: Attacking a block cipher by creating a code book, collecting plaintext/ciphertext pairs. [e]
- Algebraic attack [r]: Attacking a cipher by writing equations that describe its operation, then solving for the key. [e]
- Birthday attack [r]: An attack on a cryptographic system that works by finding two identical outputs from the system. [e]
- Meet-in-the-middle attack [r]: An attack on a block cipher in which the attacker can calculate possible values of the same intermediate variable (the middle) in two independent ways, starting either from the input of the cipher (plaintext) or from the output ( ciphertext); he calculates some possible values each way and compares the results. [e]
Historical examples
- Zimmerman Telegram [r]: A 1917 proposal from Germany to Mexico to make war against the United States. [e]
- ULTRA [r]: Add brief definition or description
- MAGIC [r]: Add brief definition or description
- Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]
- Multi-touch interface [r]: Set of interaction techniques which allow computer or mobile users to control graphical user interface with more than one finger at either application or system level. [e]
- Computer architecture [r]: Add brief definition or description
Categories:
- Subpages
- Related Article Subpages
- Military Related Article Subpages
- Computers Related Article Subpages
- Mathematics Related Article Subpages
- Approved Related Article Subpages
- Military Approved Related Article Subpages
- Computers Approved Related Article Subpages
- Mathematics Approved Related Article Subpages
- All Content
- Military Content
- Computers Content
- Mathematics Content
- Military tag
- Security tag