One-time pad/Related Articles
From Citizendium, the Citizens' Compendium
- See also changes related to One-time pad, or pages that link to One-time pad or to this page or whose text .
Auto-populated based on Special:WhatLinksHere/One-time pad. Needs checking by a human.
- Brute force attack : An attempt to break a cipher by trying all possible keys; long enough keys make this impractical.
- Cipher : A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key
- Clandestine human-source intelligence operational techniques : "Tradecraft" of espionage and activities supporting it, such as secret communication, document forgery, etc.
- Cryptanalysis : The sub-field of cryptology which deals with breaking into existing codes and ciphers.
- Cryptography : A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message.
- History of cryptography : The development, since antiquity, of means of concealing communications from other than the intended recipient
- Radar MASINT : The use of radar signals to obtain information beyond imaging of a target or its simple position, such as motion, reflectivity and surface characteristics, etc.; this technical information may be combined with imaging radar or traditional tracking radar
- Random number : A member of a sequence of which the successive values cannot be predicted, produced by measurement of physical phenomena, appropriate algorithms, or a combination of the two
- SIGINT in the Second World War : Add brief definition or description
- Signals intelligence at the start of the Cold War : Signals intelligence technology and history between 1945 and 1954
- Snake oil (cryptography) : Describes the manufacture and sale of information security products which instill in the consumer a false sense of security, because in reality the product does not make the information any more secure
- Stream cipher : A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step.
- VENONA : A long-running and highly secret collaboration between intelligence agencies of the United States and United Kingdom that involved the cryptanalysis of messages sent by several intelligence agencies of the Soviet Union.