Cryptanalysis/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
(→‎Subtopics: add one)
imported>Howard C. Berkowitz
(Added some basics for the beginner)
 
Line 9: Line 9:


==Subtopics==
==Subtopics==
===Techniques===
{{r|Frequency analysis}}
{{r|Index of coincidence}}
{{r|Kasiski attack}}
{{r|Kappa test}}
{{r|Passive attack}}
{{r|Passive attack}}
{{r|Active attack}}
{{r|Active attack}}
Line 18: Line 23:
{{r|Birthday attack}}
{{r|Birthday attack}}
{{r|Meet-in-the-middle attack}}
{{r|Meet-in-the-middle attack}}
 
===Historical examples===
{{r|Zimmerman telegram}}
{{r|ULTRA}}
{{r|MAGIC}}
==Other related topics==
==Other related topics==
<!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. -->
<!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. -->
{{r|Man-in-the-middle attack}}
{{r|Man-in-the-middle attack}}
{{r|Traffic analysis}}
{{r|Traffic analysis}}

Latest revision as of 10:46, 5 January 2009

This article has a Citable Version.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Cryptanalysis.
See also changes related to Cryptanalysis, or pages that link to Cryptanalysis or to this page or whose text contains "Cryptanalysis".


Parent topics

Subtopics

Techniques

Historical examples

Other related topics

  • Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]
  • Traffic analysis [r]: Traffic analysis is a branch of signals intelligence, inferring useful information from messages without actually reading them. [e]