Search results

Jump to navigation Jump to search

Page title matches

  • ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system
    32 KB (4,916 words) - 05:49, 8 April 2024
  • 122 bytes (16 words) - 11:08, 24 October 2008
  • ...hrough all 2<sup>k</sup> possibilities. For k=1, this is just differential cryptanalysis, but with k>1 it is a new technique.
    1 KB (171 words) - 05:48, 8 April 2024
  • | article url = http://en.citizendium.org/wiki?title=Cryptanalysis&oldid=100694598
    573 bytes (49 words) - 17:57, 1 August 2010
  • {{r|Linear cryptanalysis}} {{r|Differential cryptanalysis}}
    701 bytes (92 words) - 10:46, 5 January 2009
  • 194 bytes (26 words) - 02:00, 2 November 2008
  • 162 bytes (24 words) - 02:02, 2 November 2008
  • 189 bytes (22 words) - 00:07, 1 October 2009
  • ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system
    32 KB (4,913 words) - 14:38, 18 March 2024

Page text matches

  • #REDIRECT [[Cryptanalysis]]
    27 bytes (2 words) - 01:30, 9 September 2013
  • #REDIRECT [[Integral cryptanalysis]]
    36 bytes (3 words) - 11:32, 9 August 2009
  • {{r|cryptanalysis}} {{r|linear cryptanalysis}}
    160 bytes (18 words) - 02:26, 31 March 2009
  • A Japanese [[cryptographer]] best known for discovering [[linear cryptanalysis]].
    95 bytes (10 words) - 23:16, 22 October 2010
  • {{r|Cryptanalysis}} These are subtopics only with respect to their cryptanalysis.
    287 bytes (37 words) - 18:47, 3 January 2009
  • A [[Japan|Japanese]] [[cryptographer]] best known for discovering [[linear cryptanalysis]]
    126 bytes (13 words) - 14:49, 22 May 2011
  • ...hrough all 2<sup>k</sup> possibilities. For k=1, this is just differential cryptanalysis, but with k>1 it is a new technique.
    1 KB (171 words) - 05:48, 8 April 2024
  • ...grapher, best known as co-author of the first public paper on differential cryptanalysis.
    139 bytes (17 words) - 22:01, 23 August 2010
  • The long history of the antithetical disciplines [[cryptography]] and [[cryptanalysis]].
    124 bytes (13 words) - 05:07, 19 October 2010
  • ===Cryptanalysis=== {{r|Cryptanalysis}}
    2 KB (194 words) - 14:48, 4 April 2024
  • {{r|Linear cryptanalysis}} {{r|Differential cryptanalysis}}
    701 bytes (92 words) - 10:46, 5 January 2009
  • ...netic communications until 1939, but with some coverage of mail intercept, cryptanalysis, etc.
    220 bytes (26 words) - 19:09, 14 September 2009
  • ...st cryptologist in history, he pioneered the application of mathematics to cryptanalysis and built the U.S. Army Signal Intelligence Service technical base.
    211 bytes (28 words) - 17:53, 12 May 2008
  • ...ips. 2nd Edition is disappointing; it just appends a chapter on US-UK WWII cryptanalysis, rather than revising all relevant sections in the book. First chapter, "On * Friedman, William F. ''Military Cryptanalysis''
    1 KB (159 words) - 15:30, 27 May 2008
  • ...e of [[Nazi Germany]]. Unknown to the Germans, it had been substantially [[cryptanalysis|cryptanalyzed]] by the British [[Government Code and Cipher School]], with
    321 bytes (39 words) - 10:20, 14 June 2010
  • There has been no published cryptanalysis of the full E2, but there is an attack on a reduced-round version | title = Cryptanalysis of a Reduced Version of the Block Cipher E2
    941 bytes (134 words) - 05:48, 8 April 2024
  • ...ligence agencies of the United States and United Kingdom that involved the cryptanalysis of messages sent by several intelligence agencies of the Soviet Union.
    256 bytes (34 words) - 20:39, 4 September 2009
  • ...ting known text ([[ULTRA]] called this "gardening") &mdash; but the actual cryptanalysis is a passive attack. Two passive attacks &mdash; [[linear cryptanalysis]] and [[differential cryptanalysis]] &mdash; are very powerful. They are the only known attacks that break [[D
    3 KB (440 words) - 05:49, 8 April 2024
  • ...literature, and published at about the same time as the first differential cryptanalysis paper. It turned out to have some weaknesses against that. Also, [[Lars Knu
    1 KB (192 words) - 05:48, 8 April 2024
  • ...g the cipher; they use [[Cryptanalysis#Practical_cryptanalysis | practical cryptanalysis]] techniques such as breaking into an office to steal keys. ...ar cryptanalysis]] and [[differential cryptanalysis]] in particular, and [[cryptanalysis]] in general. ''It also makes the payoff for breaking that key very large''
    3 KB (459 words) - 05:49, 8 April 2024
  • appeared in days and other papers on cryptanalysis of Skipjack | title = Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials.
    1 KB (187 words) - 05:48, 8 April 2024
  • {{r|cryptanalysis}}
    177 bytes (20 words) - 18:54, 3 January 2009
  • ...hers which are provably immune to [[differential cryptanalysis]], [[linear cryptanalysis]], and any other attacks that meet some fairly broad assumptions. However, some attacks on DFC were found by going outside those assumptions, [[Cryptanalysis#Side_channel_attacks|timing attack]]s on some implementations
    2 KB (309 words) - 05:48, 8 April 2024
  • {{r|Cryptanalysis}}
    266 bytes (29 words) - 09:03, 2 April 2009
  • {{r|Cryptanalysis}}
    141 bytes (15 words) - 19:39, 3 January 2009
  • {{r|cryptanalysis}}
    200 bytes (21 words) - 03:38, 14 June 2010
  • * Gaines, Helen F. ''Cryptanalysis'' * Sinkov, Abraham. ''Elementary Cryptanalysis: A Mathematical Approach'' Excellent; readable at a high school level
    3 KB (478 words) - 21:53, 10 May 2011
  • {{r|cryptanalysis}}
    237 bytes (29 words) - 01:06, 22 March 2009
  • {{r|cryptanalysis}}
    141 bytes (16 words) - 06:04, 31 March 2009
  • {{r|Cryptanalysis}}
    130 bytes (12 words) - 00:54, 12 May 2008
  • ...it too slow to be a competitive candidate for AES. There were also some [[cryptanalysis|cryptanalytic]] results | title = Key-Schedule Cryptanalysis of DEAL
    1 KB (215 words) - 14:23, 30 September 2009
  • ...Government Code and Cipher School, which was responsible for the [[ULTRA]] cryptanalysis of the [[Enigma machine]]. ...cryptanalysis of the German [[Enigma machine]], although Polish and French cryptanalysis made important early breakthroughs. GCCS also obtained valuable intelligen
    3 KB (353 words) - 05:48, 8 April 2024
  • {{r|Cryptanalysis}}
    605 bytes (77 words) - 14:41, 18 March 2024
  • {{r|Cryptanalysis}}
    686 bytes (86 words) - 21:24, 30 November 2013
  • {{r|Cryptanalysis}}
    531 bytes (66 words) - 19:06, 14 September 2009
  • {{r|Cryptanalysis}}
    467 bytes (61 words) - 20:28, 11 January 2010
  • {{r|Cryptanalysis}}
    640 bytes (81 words) - 04:17, 27 April 2010
  • {{r|cryptanalysis}}
    563 bytes (72 words) - 22:09, 13 June 2008
  • {{r|Cryptanalysis}}
    715 bytes (96 words) - 02:45, 25 November 2010
  • {{r|Cryptanalysis}}
    715 bytes (85 words) - 20:16, 9 February 2010
  • {{r|Cryptanalysis}}
    751 bytes (97 words) - 17:31, 12 September 2009
  • [[Lars Knudsen]] invented a new attack, called [[integral cryptanalysis]] or the '''square attack''', to break Square. It was published at the same
    659 bytes (101 words) - 05:48, 8 April 2024
  • * [[Differential cryptanalysis]], discovered by IBM's DES team, but kept secret at [[NSA]] request. Re-dis * [[Linear cryptanalysis]], from [[Mitsuru Matsui]].
    5 KB (823 words) - 20:23, 19 September 2011
  • ..."BAD DOG" would become "EDG GRJ". This type of encryption is trivial to [[cryptanalysis | cryptanalize]] using [[frequency analysis]].
    714 bytes (116 words) - 05:48, 8 April 2024
  • {{r|Cryptanalysis}}
    815 bytes (100 words) - 15:37, 11 January 2010
  • {{r|Cryptanalysis}}
    712 bytes (96 words) - 14:31, 22 March 2024
  • ...passes both cryptography (the study of techniques for keeping secrets) and cryptanalysis (codebreaking, acquiring secrets without authorisation). The field has a l
    848 bytes (113 words) - 16:46, 25 March 2024
  • {{r|Cryptanalysis}}
    724 bytes (100 words) - 14:31, 22 March 2024
  • {{r|Cryptanalysis}}
    830 bytes (103 words) - 14:41, 18 March 2024
  • {{r|Cryptanalysis}}
    896 bytes (110 words) - 18:21, 12 May 2008
  • {{r|Cryptanalysis}}
    881 bytes (109 words) - 20:17, 9 February 2010
  • {{r|Cryptanalysis}}
    854 bytes (123 words) - 01:07, 2 November 2008
  • | title = Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES | title = Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA
    3 KB (367 words) - 05:49, 8 April 2024
  • ...> While such traffic was normally immune from [[cryptography#cryptanalysis|cryptanalysis]] because it used the [[one-time pad]] system, Soviet resource constraints ===Cryptanalysis begins===
    5 KB (731 words) - 05:48, 8 April 2024
  • {{r|Cryptanalysis}}
    1 KB (133 words) - 21:04, 11 January 2010
  • {{r|MAGIC (cryptanalysis)}}
    1 KB (143 words) - 20:40, 2 April 2024
  • {{r|Cryptanalysis}}
    1 KB (148 words) - 19:44, 6 September 2010
  • An '''algebraic attack''' is a method of [[cryptanalysis]] against a [[cipher]]. It involves: | title = Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
    6 KB (882 words) - 05:49, 8 April 2024
  • ...://www.schneier.com/paper-self-study.pdf Self-study course in block cipher cryptanalysis] from [[Bruce Schneier]], PDF format * [http://www.citeulike.org/user/sgros/article/229817 Cryptanalysis of Block Ciphers: A Survey] by Standaert et al.
    4 KB (600 words) - 23:49, 7 June 2012
  • Many of the references given for the parent topics [[cryptanalysis]] and [[cryptography]] discuss brute force attacks.
    1 KB (163 words) - 22:27, 26 March 2009
  • ...tial_attacks | resistance]] to [[linear cryptanalysis]] and [[differential cryptanalysis]].
    3 KB (507 words) - 05:48, 8 April 2024
  • {{main|Cryptanalysis}} There is also "rubber hose cryptanalysis", using force, threats, intimidation, or even torture to extract passwords.
    6 KB (903 words) - 05:49, 8 April 2024
  • {{r|Cryptanalysis}}
    1 KB (173 words) - 14:49, 4 April 2024
  • ===Cryptanalysis=== ...tic cryptosystems. Many histories assume Purple included Japanese military cryptanalysis, but those were separate projects, although generally under the same organi
    6 KB (782 words) - 12:48, 2 April 2024
  • ...us forms of [[signals intelligence]], including [[traffic analysis]] and [[cryptanalysis]]. It has SIGINT collection stations scattered throughout Canada, in positi
    2 KB (206 words) - 05:48, 8 April 2024
  • ...both [[cryptography]] (the study of techniques for keeping secrets) and [[cryptanalysis]] (codebreaking, acquiring secrets without authorisation). The field has a ==Cryptanalysis and communications intelligence==
    9 KB (1,312 words) - 05:49, 8 April 2024
  • | title=Cryptanalysis of short RSA secret exponents
    1 KB (215 words) - 05:48, 8 April 2024
  • A '''meet-in-the middle attack''' is a technique of [[cryptanalysis]] against a [[block cipher]]. It is a [[passive attack]]; it may allow the ...lculates some possible values each way and compares the results. It is a [[Cryptanalysis#Known_plaintext|known plaintext]] attack; the attacker must get or guess on
    6 KB (921 words) - 05:48, 8 April 2024
  • | title = Cryptanalysis of Magenta
    2 KB (235 words) - 05:49, 8 April 2024
  • | title= Cryptanalysis of FROG
    1 KB (225 words) - 14:53, 30 September 2009
  • ==Books on WWII cryptanalysis in general== ...Park", Oxford University, Oxford, 1993 - Participants cover all aspects of cryptanalysis at Bletchley in some detail, along with general material about Bletchley; m
    8 KB (1,107 words) - 20:30, 10 February 2010
  • ...ercept either an originally transmitted [[cleartext]] or obtain it through cryptanalysis, the language of the communication and a translation (when needed) ==Cryptanalysis==
    12 KB (1,821 words) - 06:04, 8 April 2024
  • ...at are not vulnerable to either [[linear cryptanalysis]] or [[differential cryptanalysis]] ...ffort than brute force. More generally, they are the most powerful known [[cryptanalysis | cryptanalytic]] methods of attacking block ciphers. Both, however, requir
    9 KB (1,452 words) - 05:49, 8 April 2024
  • ...lf &mdash; easily guessed passwords, poorly chosen keys, poorly designed [[Cryptanalysis#Vulnerabilities_of_cryptographic_protocols | protocols]], implementation bu In the simplest brute force attack, the attacker has some [[Cryptanalysis#Known_plaintext | known plaintext]] so that he can tell which is the correc
    11 KB (1,819 words) - 05:48, 8 April 2024
  • ...ns were working along similar lines in the same time period. Previously, [[cryptanalysis]] had been largely done by linguists, but solving machine ciphers needed s .... Lawrence Waterhouse is an American who meets Turing at Princeton, learns cryptanalysis from a character apparently based on [[William Friedman]], and later works
    5 KB (854 words) - 05:49, 8 April 2024
  • ...ES]], it still has a vulnerability against the technique of [[differential cryptanalysis]], although its practical use against commercial traffic may not be a matte ...it completely, but two &mdash; [[differential cryptanalysis]] and [[linear cryptanalysis]] &mdash; give attacks theoretically significantly better than brute force.
    16 KB (2,456 words) - 05:48, 8 April 2024
  • ...tial_attacks | resistance]] to [[linear cryptanalysis]] and [[differential cryptanalysis]]. | title= Cryptanalysis of FROG
    21 KB (3,252 words) - 05:49, 8 April 2024
  • A '''birthday attack''' is a [[cryptanalysis | cryptanalytic]] attack based on the mathematics exemplified by the [[birt
    3 KB (415 words) - 05:48, 8 April 2024
  • ...e Middle Ages. Even [[cryptography|encrypted]] communications were being [[cryptanalysis|deciphered]], such as by [[Francis Walsingham|Sir Francis Walsingham]], [[E
    3 KB (437 words) - 23:20, 8 August 2010
  • ...can intercept them, he cannot read them unless he is remarkably good at [[cryptanalysis]]. If the threat is [[traffic analysis]], then neither BTNS nor full IPsec
    3 KB (516 words) - 05:48, 8 April 2024
  • ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system
    32 KB (4,913 words) - 14:38, 18 March 2024
  • ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system
    32 KB (4,916 words) - 05:49, 8 April 2024
  • ...to a sliding strip system, only began to yield to machine-assisted German cryptanalysis in the Second World War. By then, however, the technique still required hum ...called "Y Stations", with Admiralty Room 40 doing the traffic analysis and cryptanalysis <ref name=Lee>Lee p. 10-12</ref>. In World War II, the British referred to
    16 KB (2,460 words) - 06:04, 8 April 2024
  • As for [[cryptography]] and [[cryptanalysis]], it is possible to distinguish between steganography (the art of hiding m ...may be a fine, jail time, or even torture). The usual term is "rubber hose cryptanalysis". As a result cryptography can only provide increased privacy for the commu
    11 KB (1,766 words) - 09:26, 31 October 2015
  • *<s>[[Cryptanalysis]] (seems to be more to do with codebreaking) [[User:John Stephenson|John St
    5 KB (781 words) - 11:16, 11 November 2007
  • ...operations are resolving this conflict. One early example comes from WWII cryptanalysis, where the former missionaries translating a Japanese naval codebook were u
    5 KB (719 words) - 14:15, 22 March 2024
  • A '''code book attack''' is a technique for [[cryptanalysis]]. The name comes from the attack on a [[block cipher]]; the attacker trie
    6 KB (1,064 words) - 02:04, 24 January 2017
  • Because of the importance of cryptanalysis in [[World War II]] (in particular, see [[ULTRA]]) and an expectation that ...June 15, 2000</ref>. DES was designed to be secure against [[differential cryptanalysis]]<ref name="coppersmith-des">
    20 KB (2,946 words) - 05:49, 8 April 2024
  • ...read the material without authorisation, and often without the key. See [[cryptanalysis]] for his methods. ...cryptography is difficult]]. In particular, block ciphers must withstand [[cryptanalysis]]; it is impossible to design a good block cipher, or to evaluate the secur
    53 KB (8,371 words) - 05:48, 8 April 2024
  • ...er implications during World War II. The combined effort of intercepts and cryptanalysis for the whole of the British forces in World War II came under the code nam ...tic, US submarines in the Pacific enjoyed the freedom of fish. While ULTRA cryptanalysis certainly played a role in dealing with German submarines, HF/DF and traffi
    23 KB (3,456 words) - 18:47, 3 April 2024
  • Efforts toward [[cryptanalysis]] are intense; attacks, or at least observations that may lead to an attack From an Israeli team: [[Eli Biham]], one of the inventors of [[differential cryptanalysis]], and [[Orr Dunkelman]].
    16 KB (2,641 words) - 15:51, 8 April 2024
  • ...us forms of [[signals intelligence]], including [[traffic analysis]] and [[cryptanalysis]]. It has SIGINT collection stations scattered throughout Canada, in positi
    8 KB (1,088 words) - 04:30, 21 March 2024
  • As well as being aware of cryptographic history and techniques, and of [[cryptanalysis|cryptanalytic]] methods, cryptographers must also carefully consider probab | title = Cryptanalysis of Magenta
    52 KB (8,332 words) - 05:49, 8 April 2024
  • ...ed the Allies with a major source of [[signals intelligence]], both from [[cryptanalysis]] of the [[Enigma machine]], as well as [[direction finding]].
    9 KB (1,305 words) - 05:33, 31 May 2009
  • A [[one-time pad]], which is provably secure against cryptanalysis, has a totally random key of the same length as the message. It is not secu
    12 KB (1,744 words) - 05:48, 8 April 2024
  • ...see [http://cyber.law.harvard.edu/openlaw/DVD/resources/crypto.gq.nu.html Cryptanalysis of Contents Scrambling System]. It indicates that CSS did not even achieve ...-Philipp Weimann |date=2008-03-01 |title=Algebraic Methods in Block Cipher Cryptanalysis |publisher=[[Darmstadt University of Technology]] |url=http://tuprints.ulb.
    47 KB (7,475 words) - 05:49, 8 April 2024
  • ...w the Japanese were planning an invasion of a more eastern U.S. base, from cryptanalysis of communications in the [[JN-25]] communications channel. The actual targe
    13 KB (1,923 words) - 05:46, 3 September 2010
  • ...nsitive information is often encrypted, SIGINT often involves the use of [[cryptanalysis]]. However, traffic analysis&mdash;the study of who is signalling whom and ...breach of the Japanese PURPLE system, and never could return to full-time cryptanalysis.
    36 KB (5,247 words) - 05:49, 8 April 2024
  • ...ku Yamamoto]], on 18 April 1943. Knowledge of Yamamoto's route came from [[cryptanalysis]], and it was a careful balance between risking the Japanese learning of th
    17 KB (2,581 words) - 20:45, 2 April 2024
  • ...cations intelligence]] of the war. Targeting was in its infancy, but, had cryptanalysis and operations research convinced top bomber commanders of their findings,
    17 KB (2,638 words) - 09:26, 5 April 2024
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)