Search results
Jump to navigation
Jump to search
Page title matches
- ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system32 KB (4,916 words) - 05:49, 8 April 2024
- ...hrough all 2<sup>k</sup> possibilities. For k=1, this is just differential cryptanalysis, but with k>1 it is a new technique.1 KB (171 words) - 05:48, 8 April 2024
- | article url = http://en.citizendium.org/wiki?title=Cryptanalysis&oldid=100694598573 bytes (49 words) - 17:57, 1 August 2010
- 122 bytes (16 words) - 11:08, 24 October 2008
- 194 bytes (26 words) - 02:00, 2 November 2008
- 162 bytes (24 words) - 02:02, 2 November 2008
- 189 bytes (22 words) - 00:07, 1 October 2009
- ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system32 KB (4,913 words) - 14:38, 18 March 2024
- {{r|Linear cryptanalysis}} {{r|Differential cryptanalysis}}701 bytes (92 words) - 10:46, 5 January 2009
Page text matches
- #REDIRECT [[Cryptanalysis]]27 bytes (2 words) - 01:30, 9 September 2013
- #REDIRECT [[Integral cryptanalysis]]36 bytes (3 words) - 11:32, 9 August 2009
- {{r|cryptanalysis}} {{r|linear cryptanalysis}}160 bytes (18 words) - 02:26, 31 March 2009
- A Japanese [[cryptographer]] best known for discovering [[linear cryptanalysis]].95 bytes (10 words) - 23:16, 22 October 2010
- {{r|Cryptanalysis}} These are subtopics only with respect to their cryptanalysis.287 bytes (37 words) - 18:47, 3 January 2009
- A [[Japan|Japanese]] [[cryptographer]] best known for discovering [[linear cryptanalysis]]126 bytes (13 words) - 14:49, 22 May 2011
- ...hrough all 2<sup>k</sup> possibilities. For k=1, this is just differential cryptanalysis, but with k>1 it is a new technique.1 KB (171 words) - 05:48, 8 April 2024
- ...grapher, best known as co-author of the first public paper on differential cryptanalysis.139 bytes (17 words) - 22:01, 23 August 2010
- The long history of the antithetical disciplines [[cryptography]] and [[cryptanalysis]].124 bytes (13 words) - 05:07, 19 October 2010
- ===Cryptanalysis=== {{r|Cryptanalysis}}2 KB (194 words) - 14:48, 4 April 2024
- {{r|Linear cryptanalysis}} {{r|Differential cryptanalysis}}701 bytes (92 words) - 10:46, 5 January 2009
- ...netic communications until 1939, but with some coverage of mail intercept, cryptanalysis, etc.220 bytes (26 words) - 19:09, 14 September 2009
- ...st cryptologist in history, he pioneered the application of mathematics to cryptanalysis and built the U.S. Army Signal Intelligence Service technical base.211 bytes (28 words) - 17:53, 12 May 2008
- ...ips. 2nd Edition is disappointing; it just appends a chapter on US-UK WWII cryptanalysis, rather than revising all relevant sections in the book. First chapter, "On * Friedman, William F. ''Military Cryptanalysis''1 KB (159 words) - 15:30, 27 May 2008
- ...e of [[Nazi Germany]]. Unknown to the Germans, it had been substantially [[cryptanalysis|cryptanalyzed]] by the British [[Government Code and Cipher School]], with321 bytes (39 words) - 10:20, 14 June 2010
- There has been no published cryptanalysis of the full E2, but there is an attack on a reduced-round version | title = Cryptanalysis of a Reduced Version of the Block Cipher E2941 bytes (134 words) - 05:48, 8 April 2024
- ...ligence agencies of the United States and United Kingdom that involved the cryptanalysis of messages sent by several intelligence agencies of the Soviet Union.256 bytes (34 words) - 20:39, 4 September 2009
- ...ting known text ([[ULTRA]] called this "gardening") — but the actual cryptanalysis is a passive attack. Two passive attacks — [[linear cryptanalysis]] and [[differential cryptanalysis]] — are very powerful. They are the only known attacks that break [[D3 KB (440 words) - 05:49, 8 April 2024
- ...literature, and published at about the same time as the first differential cryptanalysis paper. It turned out to have some weaknesses against that. Also, [[Lars Knu1 KB (192 words) - 05:48, 8 April 2024
- ...g the cipher; they use [[Cryptanalysis#Practical_cryptanalysis | practical cryptanalysis]] techniques such as breaking into an office to steal keys. ...ar cryptanalysis]] and [[differential cryptanalysis]] in particular, and [[cryptanalysis]] in general. ''It also makes the payoff for breaking that key very large''3 KB (459 words) - 05:49, 8 April 2024
- appeared in days and other papers on cryptanalysis of Skipjack | title = Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials.1 KB (187 words) - 05:48, 8 April 2024
- {{r|cryptanalysis}}177 bytes (20 words) - 18:54, 3 January 2009
- ...hers which are provably immune to [[differential cryptanalysis]], [[linear cryptanalysis]], and any other attacks that meet some fairly broad assumptions. However, some attacks on DFC were found by going outside those assumptions, [[Cryptanalysis#Side_channel_attacks|timing attack]]s on some implementations2 KB (309 words) - 05:48, 8 April 2024
- {{r|Cryptanalysis}}266 bytes (29 words) - 09:03, 2 April 2009
- {{r|Cryptanalysis}}141 bytes (15 words) - 19:39, 3 January 2009
- {{r|cryptanalysis}}200 bytes (21 words) - 03:38, 14 June 2010
- * Gaines, Helen F. ''Cryptanalysis'' * Sinkov, Abraham. ''Elementary Cryptanalysis: A Mathematical Approach'' Excellent; readable at a high school level3 KB (478 words) - 21:53, 10 May 2011
- {{r|cryptanalysis}}237 bytes (29 words) - 01:06, 22 March 2009
- {{r|cryptanalysis}}141 bytes (16 words) - 06:04, 31 March 2009
- {{r|Cryptanalysis}}130 bytes (12 words) - 00:54, 12 May 2008
- ...it too slow to be a competitive candidate for AES. There were also some [[cryptanalysis|cryptanalytic]] results | title = Key-Schedule Cryptanalysis of DEAL1 KB (215 words) - 14:23, 30 September 2009
- ...Government Code and Cipher School, which was responsible for the [[ULTRA]] cryptanalysis of the [[Enigma machine]]. ...cryptanalysis of the German [[Enigma machine]], although Polish and French cryptanalysis made important early breakthroughs. GCCS also obtained valuable intelligen3 KB (353 words) - 05:48, 8 April 2024
- {{r|Cryptanalysis}}605 bytes (77 words) - 14:41, 18 March 2024
- {{r|Cryptanalysis}}686 bytes (86 words) - 21:24, 30 November 2013
- {{r|Cryptanalysis}}531 bytes (66 words) - 19:06, 14 September 2009
- {{r|Cryptanalysis}}467 bytes (61 words) - 20:28, 11 January 2010
- {{r|Cryptanalysis}}640 bytes (81 words) - 04:17, 27 April 2010
- {{r|cryptanalysis}}563 bytes (72 words) - 22:09, 13 June 2008
- {{r|Cryptanalysis}}715 bytes (96 words) - 02:45, 25 November 2010
- {{r|Cryptanalysis}}715 bytes (85 words) - 20:16, 9 February 2010
- {{r|Cryptanalysis}}751 bytes (97 words) - 17:31, 12 September 2009
- [[Lars Knudsen]] invented a new attack, called [[integral cryptanalysis]] or the '''square attack''', to break Square. It was published at the same659 bytes (101 words) - 05:48, 8 April 2024
- * [[Differential cryptanalysis]], discovered by IBM's DES team, but kept secret at [[NSA]] request. Re-dis * [[Linear cryptanalysis]], from [[Mitsuru Matsui]].5 KB (823 words) - 20:23, 19 September 2011
- ..."BAD DOG" would become "EDG GRJ". This type of encryption is trivial to [[cryptanalysis | cryptanalize]] using [[frequency analysis]].714 bytes (116 words) - 05:48, 8 April 2024
- {{r|Cryptanalysis}}815 bytes (100 words) - 15:37, 11 January 2010
- {{r|Cryptanalysis}}695 bytes (93 words) - 10:38, 9 May 2024
- ...passes both cryptography (the study of techniques for keeping secrets) and cryptanalysis (codebreaking, acquiring secrets without authorisation). The field has a l848 bytes (113 words) - 16:46, 25 March 2024
- {{r|Cryptanalysis}}724 bytes (100 words) - 14:31, 22 March 2024
- {{r|Cryptanalysis}}830 bytes (103 words) - 14:41, 18 March 2024
- {{r|Cryptanalysis}}896 bytes (110 words) - 18:21, 12 May 2008
- {{r|Cryptanalysis}}881 bytes (109 words) - 20:17, 9 February 2010
- {{r|Cryptanalysis}}854 bytes (123 words) - 01:07, 2 November 2008
- | title = Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES | title = Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA3 KB (367 words) - 05:49, 8 April 2024
- ...> While such traffic was normally immune from [[cryptography#cryptanalysis|cryptanalysis]] because it used the [[one-time pad]] system, Soviet resource constraints ===Cryptanalysis begins===5 KB (731 words) - 08:11, 4 May 2024
- {{r|Cryptanalysis}}1 KB (133 words) - 21:04, 11 January 2010
- {{r|MAGIC (cryptanalysis)}}1 KB (143 words) - 20:40, 2 April 2024
- {{r|Cryptanalysis}}1 KB (148 words) - 19:44, 6 September 2010
- An '''algebraic attack''' is a method of [[cryptanalysis]] against a [[cipher]]. It involves: | title = Cryptanalysis of Block Ciphers with Overdefined Systems of Equations6 KB (882 words) - 05:49, 8 April 2024
- ...://www.schneier.com/paper-self-study.pdf Self-study course in block cipher cryptanalysis] from [[Bruce Schneier]], PDF format * [http://www.citeulike.org/user/sgros/article/229817 Cryptanalysis of Block Ciphers: A Survey] by Standaert et al.4 KB (600 words) - 23:49, 7 June 2012
- Many of the references given for the parent topics [[cryptanalysis]] and [[cryptography]] discuss brute force attacks.1 KB (163 words) - 22:27, 26 March 2009
- ...tial_attacks | resistance]] to [[linear cryptanalysis]] and [[differential cryptanalysis]].3 KB (507 words) - 05:48, 8 April 2024
- {{main|Cryptanalysis}} There is also "rubber hose cryptanalysis", using force, threats, intimidation, or even torture to extract passwords.6 KB (903 words) - 05:49, 8 April 2024
- {{r|Cryptanalysis}}1 KB (173 words) - 14:49, 4 April 2024
- ===Cryptanalysis=== ...tic cryptosystems. Many histories assume Purple included Japanese military cryptanalysis, but those were separate projects, although generally under the same organi6 KB (782 words) - 12:48, 2 April 2024
- ...us forms of [[signals intelligence]], including [[traffic analysis]] and [[cryptanalysis]]. It has SIGINT collection stations scattered throughout Canada, in positi2 KB (206 words) - 05:48, 8 April 2024
- ...both [[cryptography]] (the study of techniques for keeping secrets) and [[cryptanalysis]] (codebreaking, acquiring secrets without authorisation). The field has a ==Cryptanalysis and communications intelligence==9 KB (1,312 words) - 05:49, 8 April 2024
- | title=Cryptanalysis of short RSA secret exponents1 KB (215 words) - 05:48, 8 April 2024
- A '''meet-in-the middle attack''' is a technique of [[cryptanalysis]] against a [[block cipher]]. It is a [[passive attack]]; it may allow the ...lculates some possible values each way and compares the results. It is a [[Cryptanalysis#Known_plaintext|known plaintext]] attack; the attacker must get or guess on6 KB (921 words) - 05:48, 8 April 2024
- | title = Cryptanalysis of Magenta2 KB (235 words) - 05:49, 8 April 2024
- | title= Cryptanalysis of FROG1 KB (225 words) - 14:53, 30 September 2009
- ==Books on WWII cryptanalysis in general== ...Park", Oxford University, Oxford, 1993 - Participants cover all aspects of cryptanalysis at Bletchley in some detail, along with general material about Bletchley; m8 KB (1,107 words) - 20:30, 10 February 2010
- ...ercept either an originally transmitted [[cleartext]] or obtain it through cryptanalysis, the language of the communication and a translation (when needed) ==Cryptanalysis==12 KB (1,821 words) - 06:04, 8 April 2024
- ...at are not vulnerable to either [[linear cryptanalysis]] or [[differential cryptanalysis]] ...ffort than brute force. More generally, they are the most powerful known [[cryptanalysis | cryptanalytic]] methods of attacking block ciphers. Both, however, requir9 KB (1,452 words) - 05:49, 8 April 2024
- ...lf — easily guessed passwords, poorly chosen keys, poorly designed [[Cryptanalysis#Vulnerabilities_of_cryptographic_protocols | protocols]], implementation bu In the simplest brute force attack, the attacker has some [[Cryptanalysis#Known_plaintext | known plaintext]] so that he can tell which is the correc11 KB (1,819 words) - 05:48, 8 April 2024
- ...ns were working along similar lines in the same time period. Previously, [[cryptanalysis]] had been largely done by linguists, but solving machine ciphers needed s .... Lawrence Waterhouse is an American who meets Turing at Princeton, learns cryptanalysis from a character apparently based on [[William Friedman]], and later works5 KB (854 words) - 05:49, 8 April 2024
- ...ES]], it still has a vulnerability against the technique of [[differential cryptanalysis]], although its practical use against commercial traffic may not be a matte ...it completely, but two — [[differential cryptanalysis]] and [[linear cryptanalysis]] — give attacks theoretically significantly better than brute force.16 KB (2,456 words) - 05:48, 8 April 2024
- ...tial_attacks | resistance]] to [[linear cryptanalysis]] and [[differential cryptanalysis]]. | title= Cryptanalysis of FROG21 KB (3,252 words) - 05:49, 8 April 2024
- A '''birthday attack''' is a [[cryptanalysis | cryptanalytic]] attack based on the mathematics exemplified by the [[birt3 KB (415 words) - 05:48, 8 April 2024
- ...e Middle Ages. Even [[cryptography|encrypted]] communications were being [[cryptanalysis|deciphered]], such as by [[Francis Walsingham|Sir Francis Walsingham]], [[E3 KB (437 words) - 23:20, 8 August 2010
- ...can intercept them, he cannot read them unless he is remarkably good at [[cryptanalysis]]. If the threat is [[traffic analysis]], then neither BTNS nor full IPsec3 KB (516 words) - 05:48, 8 April 2024
- ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system32 KB (4,913 words) - 14:38, 18 March 2024
- ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system32 KB (4,916 words) - 05:49, 8 April 2024
- ...to a sliding strip system, only began to yield to machine-assisted German cryptanalysis in the Second World War. By then, however, the technique still required hum ...called "Y Stations", with Admiralty Room 40 doing the traffic analysis and cryptanalysis <ref name=Lee>Lee p. 10-12</ref>. In World War II, the British referred to16 KB (2,460 words) - 06:04, 8 April 2024
- As for [[cryptography]] and [[cryptanalysis]], it is possible to distinguish between steganography (the art of hiding m ...may be a fine, jail time, or even torture). The usual term is "rubber hose cryptanalysis". As a result cryptography can only provide increased privacy for the commu11 KB (1,766 words) - 09:26, 31 October 2015
- *<s>[[Cryptanalysis]] (seems to be more to do with codebreaking) [[User:John Stephenson|John St5 KB (781 words) - 11:16, 11 November 2007
- ...operations are resolving this conflict. One early example comes from WWII cryptanalysis, where the former missionaries translating a Japanese naval codebook were u5 KB (719 words) - 08:11, 4 May 2024
- A '''code book attack''' is a technique for [[cryptanalysis]]. The name comes from the attack on a [[block cipher]]; the attacker trie6 KB (1,064 words) - 02:04, 24 January 2017
- Because of the importance of cryptanalysis in [[World War II]] (in particular, see [[ULTRA]]) and an expectation that ...June 15, 2000</ref>. DES was designed to be secure against [[differential cryptanalysis]]<ref name="coppersmith-des">20 KB (2,946 words) - 05:49, 8 April 2024
- ...read the material without authorisation, and often without the key. See [[cryptanalysis]] for his methods. ...cryptography is difficult]]. In particular, block ciphers must withstand [[cryptanalysis]]; it is impossible to design a good block cipher, or to evaluate the secur53 KB (8,371 words) - 05:48, 8 April 2024
- ...er implications during World War II. The combined effort of intercepts and cryptanalysis for the whole of the British forces in World War II came under the code nam ...tic, US submarines in the Pacific enjoyed the freedom of fish. While ULTRA cryptanalysis certainly played a role in dealing with German submarines, HF/DF and traffi23 KB (3,456 words) - 18:47, 3 April 2024
- Efforts toward [[cryptanalysis]] are intense; attacks, or at least observations that may lead to an attack From an Israeli team: [[Eli Biham]], one of the inventors of [[differential cryptanalysis]], and [[Orr Dunkelman]].16 KB (2,641 words) - 15:51, 8 April 2024
- ...us forms of [[signals intelligence]], including [[traffic analysis]] and [[cryptanalysis]]. It has SIGINT collection stations scattered throughout Canada, in positi8 KB (1,088 words) - 08:11, 4 May 2024
- As well as being aware of cryptographic history and techniques, and of [[cryptanalysis|cryptanalytic]] methods, cryptographers must also carefully consider probab | title = Cryptanalysis of Magenta52 KB (8,332 words) - 05:49, 8 April 2024
- ...ed the Allies with a major source of [[signals intelligence]], both from [[cryptanalysis]] of the [[Enigma machine]], as well as [[direction finding]].9 KB (1,305 words) - 05:33, 31 May 2009
- A [[one-time pad]], which is provably secure against cryptanalysis, has a totally random key of the same length as the message. It is not secu12 KB (1,744 words) - 05:48, 8 April 2024
- ...see [http://cyber.law.harvard.edu/openlaw/DVD/resources/crypto.gq.nu.html Cryptanalysis of Contents Scrambling System]. It indicates that CSS did not even achieve ...-Philipp Weimann |date=2008-03-01 |title=Algebraic Methods in Block Cipher Cryptanalysis |publisher=[[Darmstadt University of Technology]] |url=http://tuprints.ulb.47 KB (7,475 words) - 05:49, 8 April 2024
- ...w the Japanese were planning an invasion of a more eastern U.S. base, from cryptanalysis of communications in the [[JN-25]] communications channel. The actual targe13 KB (1,923 words) - 05:46, 3 September 2010
- ...nsitive information is often encrypted, SIGINT often involves the use of [[cryptanalysis]]. However, traffic analysis—the study of who is signalling whom and ...breach of the Japanese PURPLE system, and never could return to full-time cryptanalysis.36 KB (5,247 words) - 05:49, 8 April 2024
- ...ku Yamamoto]], on 18 April 1943. Knowledge of Yamamoto's route came from [[cryptanalysis]], and it was a careful balance between risking the Japanese learning of th17 KB (2,581 words) - 20:45, 2 April 2024
- ...cations intelligence]] of the war. Targeting was in its infancy, but, had cryptanalysis and operations research convinced top bomber commanders of their findings,17 KB (2,638 words) - 09:26, 5 April 2024