Man-in-the-middle attack/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris (New page: {{subpages}} ==Parent topics== {{r|cryptanalysis}} {{r|active attack}} ==Subtopics== ==Other related topics== {{r|hashed message authentication code}} {{r|digital signature}}) |
No edit summary |
||
Line 10: | Line 10: | ||
{{r|hashed message authentication code}} | {{r|hashed message authentication code}} | ||
{{r|digital signature}} | {{r|digital signature}} | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Iraq War}} | |||
{{r|Opportunistic encryption}} | |||
{{r|IPsec}} |
Latest revision as of 11:00, 15 September 2024
- See also changes related to Man-in-the-middle attack, or pages that link to Man-in-the-middle attack or to this page or whose text contains "Man-in-the-middle attack".
Parent topics
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]
Subtopics
- Hashed message authentication code [r]: A technique for authenticating a message using a hash function and a secret key. [e]
- Digital signature [r]: A technique based on public key cryptography to allow people to "sign" documents using their private keys. [e]
- Iraq War [r]: (2003-2011) Invasion and occupation of Iraq by a coalition of countries led by the U.S. to depose Saddam Hussein, who was accused of stockpiling weapons of mass destruction (which were never found). [e]
- Opportunistic encryption [r]: A technique whereby computers can set up their own encrypted connections, without any connection-specific setup by an administrator. [e]
- IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]