Meet-in-the-middle attack/Related Articles

From Citizendium
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Meet-in-the-middle attack.
See also changes related to Meet-in-the-middle attack, or pages that link to Meet-in-the-middle attack or to this page or whose text contains "Meet-in-the-middle attack".


Parent topics

Subtopics

Other related topics

  • Code book attack [r]: Attacking a block cipher by creating a code book, collecting plaintext/ciphertext pairs. [e]
  • Passive attack [r]: An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them. [e]
  • Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]
  • Block cipher [r]: A symmetric cipher that operates on fixed-size blocks of plaintext, giving a block of ciphertext for each [e]
  • Hashed message authentication code [r]: A technique for authenticating a message using a hash function and a secret key. [e]
  • Birthday coincidence [r]: In probability theory, the event that two persons in a group celebrate their birthday on the same day of the year; see birthday paradox. [e]
  • Birthday attack [r]: An attack on a cryptographic system that works by finding two identical outputs from the system. [e]
  • Cryptographic hash [r]: Add brief definition or description
  • Cipher [r]: A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key [e]
  • Hash [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
  • Cryptographic key [r]: Value used by a computer together with a complex algorithm to encrypt and decrypt messages. [e]