Cryptanalysis/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
(→‎Subtopics: add one, re-order)
No edit summary
 
(5 intermediate revisions by 3 users not shown)
Line 9: Line 9:


==Subtopics==
==Subtopics==
===Techniques===
{{r|Frequency analysis}}
{{r|Index of coincidence}}
{{r|Kasiski attack}}
{{r|Kappa test}}
{{r|Passive attack}}
{{r|Passive attack}}
{{r|Active attack}}
{{r|Active attack}}
Line 15: Line 20:
{{r|Brute force attack}}
{{r|Brute force attack}}
{{r|Code book attack}}
{{r|Code book attack}}
{{r|Algebraic attack}}
{{r|Birthday attack}}
{{r|Birthday attack}}
{{r|Meet-in-the-middle attack}}
{{r|Meet-in-the-middle attack}}
 
===Historical examples===
{{r|Zimmerman Telegram}}
{{r|ULTRA}}
{{r|MAGIC}}
==Other related topics==
==Other related topics==
<!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. -->
<!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. -->
{{r|Man-in-the-middle attack}}
{{r|Man-in-the-middle attack}}
==Articles related by keyphrases (Bot populated)==
{{r|Multi-touch interface}}
{{r|Computer architecture}}

Latest revision as of 11:00, 3 August 2024

This article has a Citable Version.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Cryptanalysis.
See also changes related to Cryptanalysis, or pages that link to Cryptanalysis or to this page or whose text contains "Cryptanalysis".


Parent topics

Subtopics

Techniques

Historical examples

Other related topics

  • Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]

Articles related by keyphrases (Bot populated)