Meet-in-the-middle attack/Related Articles
- See also changes related to Meet-in-the-middle attack, or pages that link to Meet-in-the-middle attack or to this page or whose text .
- Cryptanalysis : The sub-field of cryptology which deals with breaking into existing codes and ciphers.
- Information security : The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world
- Code book attack : Attacking a block cipher by creating a code book, collecting plaintext/ciphertext pairs.
- Passive attack : An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them.
- Active attack : An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them.
- Block cipher : A symmetric cipher that operates on fixed-size blocks of plaintext, giving a block of ciphertext for each
- Hashed message authentication code : A technique for authenticating a message using a hash function and a secret key.
- Birthday coincidence : In probability theory, the event that two persons in a group celebrate their birthday on the same day of the year; see birthday paradox.
- Birthday attack : An attack on a cryptographic system that works by finding two identical outputs from the system.
- Cryptographic hash : Add brief definition or description
- Cipher : A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key
- Hash : An algorithm that produces a fixed-size digest from an input of essentially arbitrary size.
- Cryptographic key : Value used by a computer together with a complex algorithm to encrypt and decrypt messages.