Passive attack/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris (New page: {{subpages}} ==Parent topics== {{r|cryptanalysis}} ==Subtopics== {{r|brute force attack}} {{r|algebraic attack}} {{r|code book attack}} {{r|meet-in-the-middle attack}} ==Other related t...) |
No edit summary |
||
(One intermediate revision by one other user not shown) | |||
Line 9: | Line 9: | ||
{{r|code book attack}} | {{r|code book attack}} | ||
{{r|meet-in-the-middle attack}} | {{r|meet-in-the-middle attack}} | ||
{{r|birthday attack}} | |||
==Other related topics== | ==Other related topics== | ||
{{r|active attack}} | {{r|active attack}} | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Birthday attack}} | |||
{{r|Rickettsia rickettsii}} | |||
{{r|Code book attack}} |
Latest revision as of 16:01, 1 October 2024
- See also changes related to Passive attack, or pages that link to Passive attack or to this page or whose text contains "Passive attack".
Parent topics
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
Subtopics
- Brute force attack [r]: An attempt to break a cipher by trying all possible keys; long enough keys make this impractical. [e]
- Algebraic attack [r]: Attacking a cipher by writing equations that describe its operation, then solving for the key. [e]
- Code book attack [r]: Attacking a block cipher by creating a code book, collecting plaintext/ciphertext pairs. [e]
- Meet-in-the-middle attack [r]: An attack on a block cipher in which the attacker can calculate possible values of the same intermediate variable (the middle) in two independent ways, starting either from the input of the cipher (plaintext) or from the output ( ciphertext); he calculates some possible values each way and compares the results. [e]
- Birthday attack [r]: An attack on a cryptographic system that works by finding two identical outputs from the system. [e]
- Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]
- Birthday attack [r]: An attack on a cryptographic system that works by finding two identical outputs from the system. [e]
- Rickettsia rickettsii [r]: Obligate, intracellular, Gram-negative coccobacillary that causes a variety of spotted fevers throughout the world including Rocky Mountain spotted fever. [e]
- Code book attack [r]: Attacking a block cipher by creating a code book, collecting plaintext/ciphertext pairs. [e]