Hashed message authentication code/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Daniel Mietchen
m (Robot: encapsulating subpages template in noinclude tag)
No edit summary
 
(One intermediate revision by one other user not shown)
Line 22: Line 22:
{{r|Meet-in-the-middle attack}}
{{r|Meet-in-the-middle attack}}


[[Category:Bot-created Related Articles subpages]]
{{Bot-created_related_article_subpage}}
<!-- Remove the section above after copying links to the other sections. -->
<!-- Remove the section above after copying links to the other sections. -->
==Articles related by keyphrases (Bot populated)==
{{r|Domain Name System security}}
{{r|Hashed Message Authentication Code}}
{{r|HMAC}}
{{r|Firewall}}

Latest revision as of 06:00, 26 August 2024

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Hashed message authentication code.
See also changes related to Hashed message authentication code, or pages that link to Hashed message authentication code or to this page or whose text contains "Hashed message authentication code".

Parent topics

Subtopics

Other related topics

Bot-suggested topics

Auto-populated based on Special:WhatLinksHere/Hashed message authentication code. Needs checking by a human.

  • Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]
  • Block cipher modes of operation [r]: Methods of combining multiple block cipher operations to achieve a larger goal. [e]
  • Block cipher [r]: A symmetric cipher that operates on fixed-size blocks of plaintext, giving a block of ciphertext for each [e]
  • Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
  • Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
  • Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]
  • Meet-in-the-middle attack [r]: An attack on a block cipher in which the attacker can calculate possible values of the same intermediate variable (the middle) in two independent ways, starting either from the input of the cipher (plaintext) or from the output ( ciphertext); he calculates some possible values each way and compares the results. [e]

Articles related by keyphrases (Bot populated)