Cryptanalysis/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(Added some basics for the beginner)
No edit summary
 
(2 intermediate revisions by one other user not shown)
Line 24: Line 24:
{{r|Meet-in-the-middle attack}}
{{r|Meet-in-the-middle attack}}
===Historical examples===
===Historical examples===
{{r|Zimmerman telegram}}
{{r|Zimmerman Telegram}}
{{r|ULTRA}}
{{r|ULTRA}}
{{r|MAGIC}}
{{r|MAGIC}}
Line 30: Line 30:
<!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. -->
<!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. -->
{{r|Man-in-the-middle attack}}
{{r|Man-in-the-middle attack}}
{{r|Traffic analysis}}
==Articles related by keyphrases (Bot populated)==
{{r|Multi-touch interface}}
{{r|Computer architecture}}

Latest revision as of 11:00, 3 August 2024

This article has a Citable Version.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Cryptanalysis.
See also changes related to Cryptanalysis, or pages that link to Cryptanalysis or to this page or whose text contains "Cryptanalysis".


Parent topics

Subtopics

Techniques

Historical examples

Other related topics

  • Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]

Articles related by keyphrases (Bot populated)