Man-in-the-middle attack/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
(New page: {{subpages}} ==Parent topics== {{r|cryptanalysis}} {{r|active attack}} ==Subtopics== ==Other related topics== {{r|hashed message authentication code}} {{r|digital signature}})
 
No edit summary
 
Line 10: Line 10:
{{r|hashed message authentication code}}
{{r|hashed message authentication code}}
{{r|digital signature}}
{{r|digital signature}}
==Articles related by keyphrases (Bot populated)==
{{r|Iraq War}}
{{r|Opportunistic encryption}}
{{r|IPsec}}

Latest revision as of 11:00, 15 September 2024

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Man-in-the-middle attack.
See also changes related to Man-in-the-middle attack, or pages that link to Man-in-the-middle attack or to this page or whose text contains "Man-in-the-middle attack".

Parent topics

  • Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
  • Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]

Subtopics

Other related topics

Articles related by keyphrases (Bot populated)

  • Iraq War [r]: (2003-2011) Invasion and occupation of Iraq by a coalition of countries led by the U.S. to depose Saddam Hussein, who was accused of stockpiling weapons of mass destruction (which were never found). [e]
  • Opportunistic encryption [r]: A technique whereby computers can set up their own encrypted connections, without any connection-specific setup by an administrator. [e]
  • IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]