Talk:Meet-in-the-middle attack

From Citizendium
Revision as of 00:50, 9 August 2008 by imported>Howard C. Berkowitz (Start with definition, work out concept, before going into deep examples)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Start with definition, work out concept, before going into deep examples

While I learned the principle as a "man-in-the-middle attack", perhaps that is too sexist. I am aware of a wide range of specific attacks based on my understanding of the principle, which is now in the lead. Unless the principle in question is something totally different than what I believe it to be, I honestly could not infer it from the previous definition that I replaced.

Again assuming we are discussing the same problem, which, since Diffie-Hellman perfect forward secrecy approaches are one countermeasure to it, I don't follow the leap from the definition directly into specific strengths of triple vs. dual DES.

Further, the example of attacking multiple DES seems to assume a good deal of knowledge of cryptanalytic strategies.

The beautiful snow-capped mountain peaks may indeed be here, but the novice is not going to be able to leap from one to the next. Howard C. Berkowitz 00:50, 9 August 2008 (CDT)