Hashed message authentication code/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Daniel Mietchen m (Robot: Creating Related Articles subpage) |
No edit summary |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | <noinclude>{{subpages}}</noinclude> | ||
==Parent topics== | ==Parent topics== | ||
Line 22: | Line 22: | ||
{{r|Meet-in-the-middle attack}} | {{r|Meet-in-the-middle attack}} | ||
{{Bot-created_related_article_subpage}} | |||
<!-- Remove the section above after copying links to the other sections. --> | <!-- Remove the section above after copying links to the other sections. --> | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Domain Name System security}} | |||
{{r|Hashed Message Authentication Code}} | |||
{{r|HMAC}} | |||
{{r|Firewall}} |
Latest revision as of 06:00, 26 August 2024
- See also changes related to Hashed message authentication code, or pages that link to Hashed message authentication code or to this page or whose text contains "Hashed message authentication code".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Hashed message authentication code. Needs checking by a human.
- Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]
- Block cipher modes of operation [r]: Methods of combining multiple block cipher operations to achieve a larger goal. [e]
- Block cipher [r]: A symmetric cipher that operates on fixed-size blocks of plaintext, giving a block of ciphertext for each [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]
- Meet-in-the-middle attack [r]: An attack on a block cipher in which the attacker can calculate possible values of the same intermediate variable (the middle) in two independent ways, starting either from the input of the cipher (plaintext) or from the output ( ciphertext); he calculates some possible values each way and compares the results. [e]
- Domain Name System security [r]: A set of extensions to the Domain Name System to protect it from security threats known at the time [e]
- Hashed Message Authentication Code [r]: Add brief definition or description
- HMAC [r]: Add brief definition or description
- Firewall [r]: A set of functions, implemented on one or more computers, which implement a security policy for access to a trusted network from an untrusted one [e]