Active attack/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris (create) |
No edit summary |
||
(4 intermediate revisions by one other user not shown) | |||
Line 3: | Line 3: | ||
==Parent topics== | ==Parent topics== | ||
{{r|cryptanalysis}} | {{r|cryptanalysis}} | ||
==Subtopics== | ==Subtopics== | ||
Line 11: | Line 10: | ||
==Other related topics== | ==Other related topics== | ||
{{r|passive attack}} | {{r|passive attack}} | ||
{{r|cryptographic authentication}} | |||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Cryptographic key}} | |||
{{r|Symmetric key cryptography}} | |||
{{r|Police}} | |||
{{r|Commons theory of voluntary action}} | |||
{{r|Steganography}} | |||
{{r|ATM (disambiguation)}} |
Latest revision as of 06:01, 6 July 2024
- See also changes related to Active attack, or pages that link to Active attack or to this page or whose text contains "Active attack".
Parent topics
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
Subtopics
- Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]
- Rewrite attack [r]: An attack on a communication system in which the attacker replaces a legitimate message with his own. [e]
- Passive attack [r]: An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them. [e]
- Cryptographic authentication [r]: Cryptographic techniques for authenticating both senders and messages; the most common are digital signatures and hashed message authentication codes. [e]
- Cryptographic key [r]: Value used by a computer together with a complex algorithm to encrypt and decrypt messages. [e]
- Symmetric key cryptography [r]: A cryptographic system in which there is only one key; the same secret key is used for encryption and decryption. [e]
- Police [r]: Organized government officials responsible for enforcing the criminal law of their locality, responding to designated emergencies, and various duties considered appropriate by their culture and government [e]
- Commons theory of voluntary action [r]: A theory that focuses on the role of associations and assemblies in social commons and human-managed natural commons like agricultural fields, fishing grounds and forests. [e]
- Steganography [r]: The study of techniques for hiding a secret message within an apparently innocent message. [e]
- ATM (disambiguation) [r]: Add brief definition or description