Search results
Jump to navigation
Jump to search
Page title matches
- ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system32 KB (4,916 words) - 05:49, 8 April 2024
- #REDIRECT [[Talk:Cryptanalysis/Draft]]38 bytes (4 words) - 15:38, 2 October 2013
- 12 bytes (1 word) - 00:06, 1 October 2009
- ** Practical cryptanalysis Then the topics we currently have under "Mathematical cryptanalysis".35 KB (5,600 words) - 10:40, 15 May 2024
- | article url = http://en.citizendium.org/wiki?title=Cryptanalysis&oldid=100694598573 bytes (49 words) - 17:57, 1 August 2010
- | pagename = Cryptanalysis | abc = Cryptanalysis856 bytes (76 words) - 09:31, 3 October 2020
- 122 bytes (16 words) - 11:08, 24 October 2008
- ...hrough all 2<sup>k</sup> possibilities. For k=1, this is just differential cryptanalysis, but with k>1 it is a new technique.1 KB (171 words) - 05:48, 8 April 2024
- | pagename = Integral cryptanalysis | abc = Integral cryptanalysis963 bytes (98 words) - 03:45, 2 March 2010
- 189 bytes (22 words) - 00:07, 1 October 2009
- ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system32 KB (4,913 words) - 14:38, 18 March 2024
- {{r|Linear cryptanalysis}} {{r|Differential cryptanalysis}}701 bytes (92 words) - 10:46, 5 January 2009
- 194 bytes (26 words) - 02:00, 2 November 2008
- 162 bytes (24 words) - 02:02, 2 November 2008
- ...nowhere near certain. Do those get articles? Redirects into sections of [[cryptanalysis]]? Should they include lists of other attacks, such as I've started in [[ac ...message saying the island's fresh water plant had failed. Later, the JN25 cryptanalysis produced "AF is short of fresh water", giving a significant entry point int3 KB (441 words) - 08:27, 2 November 2008
Page text matches
- #REDIRECT [[Cryptanalysis]]27 bytes (2 words) - 01:30, 9 September 2013
- #REDIRECT [[Integral cryptanalysis]]36 bytes (3 words) - 11:32, 9 August 2009
- #REDIRECT [[Talk:Cryptanalysis/Draft]]38 bytes (4 words) - 15:38, 2 October 2013
- {{r|cryptanalysis}} {{r|linear cryptanalysis}}160 bytes (18 words) - 02:26, 31 March 2009
- | pagename = Cryptanalysis | abc = Cryptanalysis856 bytes (76 words) - 09:31, 3 October 2020
- A Japanese [[cryptographer]] best known for discovering [[linear cryptanalysis]].95 bytes (10 words) - 23:16, 22 October 2010
- {{r|Cryptanalysis}} These are subtopics only with respect to their cryptanalysis.287 bytes (37 words) - 18:47, 3 January 2009
- A [[Japan|Japanese]] [[cryptographer]] best known for discovering [[linear cryptanalysis]]126 bytes (13 words) - 14:49, 22 May 2011
- ...hrough all 2<sup>k</sup> possibilities. For k=1, this is just differential cryptanalysis, but with k>1 it is a new technique.1 KB (171 words) - 05:48, 8 April 2024
- ...grapher, best known as co-author of the first public paper on differential cryptanalysis.139 bytes (17 words) - 22:01, 23 August 2010
- The long history of the antithetical disciplines [[cryptography]] and [[cryptanalysis]].124 bytes (13 words) - 05:07, 19 October 2010
- | pagename = Integral cryptanalysis | abc = Integral cryptanalysis963 bytes (98 words) - 03:45, 2 March 2010
- ===Cryptanalysis=== {{r|Cryptanalysis}}2 KB (194 words) - 14:48, 4 April 2024
- {{r|Linear cryptanalysis}} {{r|Differential cryptanalysis}}701 bytes (92 words) - 10:46, 5 January 2009
- ...netic communications until 1939, but with some coverage of mail intercept, cryptanalysis, etc.220 bytes (26 words) - 19:09, 14 September 2009
- ...st cryptologist in history, he pioneered the application of mathematics to cryptanalysis and built the U.S. Army Signal Intelligence Service technical base.211 bytes (28 words) - 17:53, 12 May 2008
- ...ips. 2nd Edition is disappointing; it just appends a chapter on US-UK WWII cryptanalysis, rather than revising all relevant sections in the book. First chapter, "On * Friedman, William F. ''Military Cryptanalysis''1 KB (159 words) - 15:30, 27 May 2008
- ...e of [[Nazi Germany]]. Unknown to the Germans, it had been substantially [[cryptanalysis|cryptanalyzed]] by the British [[Government Code and Cipher School]], with321 bytes (39 words) - 10:20, 14 June 2010
- There has been no published cryptanalysis of the full E2, but there is an attack on a reduced-round version | title = Cryptanalysis of a Reduced Version of the Block Cipher E2941 bytes (134 words) - 05:48, 8 April 2024
- ...ligence agencies of the United States and United Kingdom that involved the cryptanalysis of messages sent by several intelligence agencies of the Soviet Union.256 bytes (34 words) - 20:39, 4 September 2009
- ...ting known text ([[ULTRA]] called this "gardening") — but the actual cryptanalysis is a passive attack. Two passive attacks — [[linear cryptanalysis]] and [[differential cryptanalysis]] — are very powerful. They are the only known attacks that break [[D3 KB (440 words) - 05:49, 8 April 2024
- ...literature, and published at about the same time as the first differential cryptanalysis paper. It turned out to have some weaknesses against that. Also, [[Lars Knu1 KB (192 words) - 05:48, 8 April 2024
- ...g the cipher; they use [[Cryptanalysis#Practical_cryptanalysis | practical cryptanalysis]] techniques such as breaking into an office to steal keys. ...ar cryptanalysis]] and [[differential cryptanalysis]] in particular, and [[cryptanalysis]] in general. ''It also makes the payoff for breaking that key very large''3 KB (459 words) - 05:49, 8 April 2024
- appeared in days and other papers on cryptanalysis of Skipjack | title = Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials.1 KB (187 words) - 05:48, 8 April 2024
- {{r|cryptanalysis}}177 bytes (20 words) - 18:54, 3 January 2009
- ...hers which are provably immune to [[differential cryptanalysis]], [[linear cryptanalysis]], and any other attacks that meet some fairly broad assumptions. However, some attacks on DFC were found by going outside those assumptions, [[Cryptanalysis#Side_channel_attacks|timing attack]]s on some implementations2 KB (309 words) - 05:48, 8 April 2024
- {{r|Cryptanalysis}}266 bytes (29 words) - 09:03, 2 April 2009
- {{r|Cryptanalysis}}141 bytes (15 words) - 19:39, 3 January 2009
- {{r|cryptanalysis}}200 bytes (21 words) - 03:38, 14 June 2010
- * Gaines, Helen F. ''Cryptanalysis'' * Sinkov, Abraham. ''Elementary Cryptanalysis: A Mathematical Approach'' Excellent; readable at a high school level3 KB (478 words) - 21:53, 10 May 2011
- {{r|cryptanalysis}}237 bytes (29 words) - 01:06, 22 March 2009
- {{r|cryptanalysis}}141 bytes (16 words) - 06:04, 31 March 2009
- {{r|Cryptanalysis}}130 bytes (12 words) - 00:54, 12 May 2008
- ...it too slow to be a competitive candidate for AES. There were also some [[cryptanalysis|cryptanalytic]] results | title = Key-Schedule Cryptanalysis of DEAL1 KB (215 words) - 14:23, 30 September 2009
- ...Government Code and Cipher School, which was responsible for the [[ULTRA]] cryptanalysis of the [[Enigma machine]]. ...cryptanalysis of the German [[Enigma machine]], although Polish and French cryptanalysis made important early breakthroughs. GCCS also obtained valuable intelligen3 KB (353 words) - 05:48, 8 April 2024
- {{r|Cryptanalysis}}605 bytes (77 words) - 14:41, 18 March 2024
- {{r|Cryptanalysis}}686 bytes (86 words) - 21:24, 30 November 2013
- {{r|Cryptanalysis}}531 bytes (66 words) - 19:06, 14 September 2009
- {{r|Cryptanalysis}}467 bytes (61 words) - 20:28, 11 January 2010
- {{r|Cryptanalysis}}640 bytes (81 words) - 04:17, 27 April 2010
- {{r|cryptanalysis}}563 bytes (72 words) - 22:09, 13 June 2008
- {{r|Cryptanalysis}}715 bytes (96 words) - 02:45, 25 November 2010
- {{r|Cryptanalysis}}715 bytes (85 words) - 20:16, 9 February 2010
- ...nowhere near certain. Do those get articles? Redirects into sections of [[cryptanalysis]]? Should they include lists of other attacks, such as I've started in [[ac ...message saying the island's fresh water plant had failed. Later, the JN25 cryptanalysis produced "AF is short of fresh water", giving a significant entry point int3 KB (441 words) - 08:27, 2 November 2008
- {{r|Cryptanalysis}}751 bytes (97 words) - 17:31, 12 September 2009
- [[Lars Knudsen]] invented a new attack, called [[integral cryptanalysis]] or the '''square attack''', to break Square. It was published at the same659 bytes (101 words) - 05:48, 8 April 2024
- * [[Differential cryptanalysis]], discovered by IBM's DES team, but kept secret at [[NSA]] request. Re-dis * [[Linear cryptanalysis]], from [[Mitsuru Matsui]].5 KB (823 words) - 20:23, 19 September 2011
- ..."BAD DOG" would become "EDG GRJ". This type of encryption is trivial to [[cryptanalysis | cryptanalize]] using [[frequency analysis]].714 bytes (116 words) - 05:48, 8 April 2024
- {{r|Cryptanalysis}}815 bytes (100 words) - 15:37, 11 January 2010
- {{r|Cryptanalysis}}695 bytes (93 words) - 10:38, 9 May 2024
- ...passes both cryptography (the study of techniques for keeping secrets) and cryptanalysis (codebreaking, acquiring secrets without authorisation). The field has a l848 bytes (113 words) - 16:46, 25 March 2024
- {{r|Cryptanalysis}}724 bytes (100 words) - 14:31, 22 March 2024
- {{r|Cryptanalysis}}830 bytes (103 words) - 14:41, 18 March 2024
- {{r|Cryptanalysis}}896 bytes (110 words) - 18:21, 12 May 2008
- {{r|Cryptanalysis}}881 bytes (109 words) - 20:17, 9 February 2010
- {{r|Cryptanalysis}}854 bytes (123 words) - 01:07, 2 November 2008
- | title = Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES | title = Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA3 KB (367 words) - 05:49, 8 April 2024
- ...> While such traffic was normally immune from [[cryptography#cryptanalysis|cryptanalysis]] because it used the [[one-time pad]] system, Soviet resource constraints ===Cryptanalysis begins===5 KB (731 words) - 08:11, 4 May 2024
- {{r|Cryptanalysis}}1 KB (133 words) - 21:04, 11 January 2010
- ...include artificial intelligence, computer/network security, cryptography, cryptanalysis, and robotics. [Note: I am also very interested in computational biology an1 KB (149 words) - 04:51, 22 November 2023
- {{r|MAGIC (cryptanalysis)}}1 KB (143 words) - 20:40, 2 April 2024
- {{r|Cryptanalysis}}1 KB (148 words) - 19:44, 6 September 2010
- An '''algebraic attack''' is a method of [[cryptanalysis]] against a [[cipher]]. It involves: | title = Cryptanalysis of Block Ciphers with Overdefined Systems of Equations6 KB (882 words) - 05:49, 8 April 2024
- ...yalphabetic substitution with a cryptoperiod of 52. Challenging for manual cryptanalysis, but not for machine analysis.944 bytes (153 words) - 18:17, 13 May 2011
- ...://www.schneier.com/paper-self-study.pdf Self-study course in block cipher cryptanalysis] from [[Bruce Schneier]], PDF format * [http://www.citeulike.org/user/sgros/article/229817 Cryptanalysis of Block Ciphers: A Survey] by Standaert et al.4 KB (600 words) - 23:49, 7 June 2012
- Many of the references given for the parent topics [[cryptanalysis]] and [[cryptography]] discuss brute force attacks.1 KB (163 words) - 22:27, 26 March 2009
- ...tial_attacks | resistance]] to [[linear cryptanalysis]] and [[differential cryptanalysis]].3 KB (507 words) - 05:48, 8 April 2024
- {{main|Cryptanalysis}} There is also "rubber hose cryptanalysis", using force, threats, intimidation, or even torture to extract passwords.6 KB (903 words) - 05:49, 8 April 2024
- {{r|Cryptanalysis}}1 KB (173 words) - 14:49, 4 April 2024
- ===Cryptanalysis=== ...tic cryptosystems. Many histories assume Purple included Japanese military cryptanalysis, but those were separate projects, although generally under the same organi6 KB (782 words) - 12:48, 2 April 2024
- ...us forms of [[signals intelligence]], including [[traffic analysis]] and [[cryptanalysis]]. It has SIGINT collection stations scattered throughout Canada, in positi2 KB (206 words) - 05:48, 8 April 2024
- ...both [[cryptography]] (the study of techniques for keeping secrets) and [[cryptanalysis]] (codebreaking, acquiring secrets without authorisation). The field has a ==Cryptanalysis and communications intelligence==9 KB (1,312 words) - 05:49, 8 April 2024
- : (Aug 2010): [[Plane (geometry)]] (E) / [[Cryptanalysis]] (A)2 KB (195 words) - 03:09, 8 March 2024
- | title=Cryptanalysis of short RSA secret exponents1 KB (215 words) - 05:48, 8 April 2024
- A '''meet-in-the middle attack''' is a technique of [[cryptanalysis]] against a [[block cipher]]. It is a [[passive attack]]; it may allow the ...lculates some possible values each way and compares the results. It is a [[Cryptanalysis#Known_plaintext|known plaintext]] attack; the attacker must get or guess on6 KB (921 words) - 05:48, 8 April 2024
- | title = Cryptanalysis of Magenta2 KB (235 words) - 05:49, 8 April 2024
- {{rpl|Cryptanalysis}}2 KB (243 words) - 17:48, 13 March 2024
- | title= Cryptanalysis of FROG1 KB (225 words) - 14:53, 30 September 2009
- ==Books on WWII cryptanalysis in general== ...Park", Oxford University, Oxford, 1993 - Participants cover all aspects of cryptanalysis at Bletchley in some detail, along with general material about Bletchley; m8 KB (1,107 words) - 20:30, 10 February 2010
- ...ercept either an originally transmitted [[cleartext]] or obtain it through cryptanalysis, the language of the communication and a translation (when needed) ==Cryptanalysis==12 KB (1,821 words) - 06:04, 8 April 2024
- ...plex electro-mechanical [[cipher]] to protect sensitive communications. [[Cryptanalysis of the Enigma|Breaking the Enigma]] cipher at Polish [[Biuro Szyfrów]], an2 KB (271 words) - 22:27, 19 May 2010
- ...at are not vulnerable to either [[linear cryptanalysis]] or [[differential cryptanalysis]] ...ffort than brute force. More generally, they are the most powerful known [[cryptanalysis | cryptanalytic]] methods of attacking block ciphers. Both, however, requir9 KB (1,452 words) - 05:49, 8 April 2024
- ...lf — easily guessed passwords, poorly chosen keys, poorly designed [[Cryptanalysis#Vulnerabilities_of_cryptographic_protocols | protocols]], implementation bu In the simplest brute force attack, the attacker has some [[Cryptanalysis#Known_plaintext | known plaintext]] so that he can tell which is the correc11 KB (1,819 words) - 05:48, 8 April 2024
- You mention cryptanalysis in the last paragraph. Should [[Radiofrequency MASINT]] and [[Communication ...ve]], but the term passive attack is somewhat broader than just its use in cryptanalysis. [[User:Sandy Harris|Sandy Harris]] 02:45, 23 April 2012 (UTC)8 KB (1,286 words) - 14:38, 18 March 2024
- {{r|Cryptanalysis}}2 KB (294 words) - 14:41, 18 March 2024
- ...ns were working along similar lines in the same time period. Previously, [[cryptanalysis]] had been largely done by linguists, but solving machine ciphers needed s .... Lawrence Waterhouse is an American who meets Turing at Princeton, learns cryptanalysis from a character apparently based on [[William Friedman]], and later works5 KB (854 words) - 05:49, 8 April 2024
- ...ES]], it still has a vulnerability against the technique of [[differential cryptanalysis]], although its practical use against commercial traffic may not be a matte ...it completely, but two — [[differential cryptanalysis]] and [[linear cryptanalysis]] — give attacks theoretically significantly better than brute force.16 KB (2,456 words) - 05:48, 8 April 2024
- ...i-outline]], a major gap is that we lack articles on linear & differential cryptanalysis. Could you fill those in? [[User:Sandy Harris|Sandy Harris]] 00:29, 17 Febr ...Howard & I has been looking at it much; comments would be most welcome. [[Cryptanalysis]] is more problematic; it both contains and links to some good stuff, and t6 KB (896 words) - 14:37, 18 March 2024
- ...tial_attacks | resistance]] to [[linear cryptanalysis]] and [[differential cryptanalysis]]. | title= Cryptanalysis of FROG21 KB (3,252 words) - 05:49, 8 April 2024
- == Cryptanalysis ==3 KB (398 words) - 04:18, 22 November 2023
- A '''birthday attack''' is a [[cryptanalysis | cryptanalytic]] attack based on the mathematics exemplified by the [[birt3 KB (415 words) - 05:48, 8 April 2024
- ...e Middle Ages. Even [[cryptography|encrypted]] communications were being [[cryptanalysis|deciphered]], such as by [[Francis Walsingham|Sir Francis Walsingham]], [[E3 KB (437 words) - 23:20, 8 August 2010
- ...can intercept them, he cannot read them unless he is remarkably good at [[cryptanalysis]]. If the threat is [[traffic analysis]], then neither BTNS nor full IPsec3 KB (516 words) - 05:48, 8 April 2024
- ...that there was no back door, but carefully said nothing about differential cryptanalysis.3 KB (474 words) - 19:28, 27 October 2008
- {{Notice|Cryptanalysis|NHAA}}4 KB (458 words) - 03:09, 8 March 2024
- ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system32 KB (4,913 words) - 14:38, 18 March 2024
- ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system32 KB (4,916 words) - 05:49, 8 April 2024
- ...ating cryptosystems have a long history and an extensive literature; see [[cryptanalysis]]. Anyone designing or deploying a cyptosystem must take cryptanalytic resu ...g the cipher; they use [[Cryptanalysis#Practical_cryptanalysis | practical cryptanalysis]] techniques such as breaking into an office to steal keys.28 KB (4,396 words) - 06:22, 16 December 2008
- ...to a sliding strip system, only began to yield to machine-assisted German cryptanalysis in the Second World War. By then, however, the technique still required hum ...called "Y Stations", with Admiralty Room 40 doing the traffic analysis and cryptanalysis <ref name=Lee>Lee p. 10-12</ref>. In World War II, the British referred to16 KB (2,460 words) - 06:04, 8 April 2024
- ...cle}} about Enigma, we should probably snarf that. (I see they have a {{WP|Cryptanalysis of the Enigma|separate article}} on the attack on it.) ...icians" - from which came the U.S. designation of intelligence produced by cryptanalysis as "Magic"23 KB (3,728 words) - 02:20, 1 April 2024
- ** Practical cryptanalysis Then the topics we currently have under "Mathematical cryptanalysis".35 KB (5,600 words) - 10:40, 15 May 2024
- As for [[cryptography]] and [[cryptanalysis]], it is possible to distinguish between steganography (the art of hiding m ...may be a fine, jail time, or even torture). The usual term is "rubber hose cryptanalysis". As a result cryptography can only provide increased privacy for the commu11 KB (1,766 words) - 09:26, 31 October 2015
- *<s>[[Cryptanalysis]] (seems to be more to do with codebreaking) [[User:John Stephenson|John St5 KB (781 words) - 11:16, 11 November 2007
- ...operations are resolving this conflict. One early example comes from WWII cryptanalysis, where the former missionaries translating a Japanese naval codebook were u5 KB (719 words) - 08:11, 4 May 2024
- ...ly stronger as there is no block size to use as one controlled variable in cryptanalysis. ...ation. The early asymmetric techniques were vulnerable to some forms of [[cryptanalysis]], until Diffie and Hellman showed that public-key cryptography was practuc12 KB (1,872 words) - 06:17, 16 December 2008
- A '''code book attack''' is a technique for [[cryptanalysis]]. The name comes from the attack on a [[block cipher]]; the attacker trie6 KB (1,064 words) - 02:04, 24 January 2017
- Because of the importance of cryptanalysis in [[World War II]] (in particular, see [[ULTRA]]) and an expectation that ...June 15, 2000</ref>. DES was designed to be secure against [[differential cryptanalysis]]<ref name="coppersmith-des">20 KB (2,946 words) - 05:49, 8 April 2024
- == Approval of [[cryptanalysis]] == :Dear Howard. I do not understand some things in the [[cryptanalysis]] . First, who is attaker, robot or human? In any of this case, the trollin22 KB (3,459 words) - 10:49, 7 March 2024
- ...read the material without authorisation, and often without the key. See [[cryptanalysis]] for his methods. ...cryptography is difficult]]. In particular, block ciphers must withstand [[cryptanalysis]]; it is impossible to design a good block cipher, or to evaluate the secur53 KB (8,371 words) - 05:48, 8 April 2024
- ...er implications during World War II. The combined effort of intercepts and cryptanalysis for the whole of the British forces in World War II came under the code nam ...tic, US submarines in the Pacific enjoyed the freedom of fish. While ULTRA cryptanalysis certainly played a role in dealing with German submarines, HF/DF and traffi23 KB (3,456 words) - 18:47, 3 April 2024
- ...g McCann and Peter Thorne, ISBN 0-7340-2024-4.</ref> Others were used in [[cryptanalysis]], for example the first programmable (though not general-purpose) digital7 KB (1,016 words) - 08:49, 22 April 2024
- ...e study of secrets") may refer to the field of cryptography as a whole. [[Cryptanalysis]] or "codebreaking" may refer to the study of how to circumvent break into ==Cryptanalysis==51 KB (7,594 words) - 02:25, 1 April 2024
- ...e study of secrets") may refer to the field of cryptography as a whole. [[Cryptanalysis]] or "codebreaking" may refer to the study of how to circumvent break into ==Cryptanalysis==52 KB (7,723 words) - 02:25, 1 April 2024
- Efforts toward [[cryptanalysis]] are intense; attacks, or at least observations that may lead to an attack From an Israeli team: [[Eli Biham]], one of the inventors of [[differential cryptanalysis]], and [[Orr Dunkelman]].16 KB (2,641 words) - 15:51, 8 April 2024
- #[[Cryptanalysis/Citable Version]]9 KB (1,161 words) - 03:09, 8 March 2024
- ...us forms of [[signals intelligence]], including [[traffic analysis]] and [[cryptanalysis]]. It has SIGINT collection stations scattered throughout Canada, in positi8 KB (1,088 words) - 08:11, 4 May 2024
- ...plex electro-mechanical [[cipher]] to protect sensitive communications. [[Cryptanalysis of the Enigma|Breaking the Enigma]] cipher at Polish [[Biuro Szyfrów]], an ...cryptography is a subset of cryptology. Personally, I prefer to introduce cryptanalysis only after first introducing the basics of [[signals intelligence]] and [[c69 KB (10,750 words) - 09:02, 4 May 2024
- As well as being aware of cryptographic history and techniques, and of [[cryptanalysis|cryptanalytic]] methods, cryptographers must also carefully consider probab | title = Cryptanalysis of Magenta52 KB (8,332 words) - 05:49, 8 April 2024
- ...ed the Allies with a major source of [[signals intelligence]], both from [[cryptanalysis]] of the [[Enigma machine]], as well as [[direction finding]].9 KB (1,305 words) - 05:33, 31 May 2009
- * [[Encryption]], [[Cryptography]], Cryptology, [[Cryptanalysis]], [[Cryptographic key]], [[RSA algorithm]], [[Steganography]], [[Asymmetri11 KB (1,718 words) - 14:38, 18 March 2024
- == Starting some new material for cryptanalysis. == ...re was a term used for active measures to tease out information useful for cryptanalysis, but I don't remember which talk page had it. Anyway, you might want to loo54 KB (8,743 words) - 14:38, 18 March 2024
- A [[one-time pad]], which is provably secure against cryptanalysis, has a totally random key of the same length as the message. It is not secu12 KB (1,744 words) - 05:48, 8 April 2024
- ...vy math not even started — [[linear cryptanalysis]], [[differential cryptanalysis]], ... [[User:Sandy Harris|Sandy Harris]] 07:27, 18 April 2010 (UTC) == Cryptanalysis ==52 KB (8,594 words) - 18:45, 28 August 2010
- ...hy, which to some extent is subordinate to information security. In turn, cryptanalysis helps judge strength of crypto, while the problem analysis part of infosec ...attack against a cipher; there are other means including classic analytic cryptanalysis against a sufficiently simple cipher, [[chosen plaintext attack]]s, etc." t41 KB (6,813 words) - 14:57, 20 March 2024
- ...see [http://cyber.law.harvard.edu/openlaw/DVD/resources/crypto.gq.nu.html Cryptanalysis of Contents Scrambling System]. It indicates that CSS did not even achieve ...-Philipp Weimann |date=2008-03-01 |title=Algebraic Methods in Block Cipher Cryptanalysis |publisher=[[Darmstadt University of Technology]] |url=http://tuprints.ulb.47 KB (7,475 words) - 05:49, 8 April 2024
- ...les on cryptography; there may be some in military/intelligence history of cryptanalysis, since the solution of [[ULTRA]] was at least partially based on group theo13 KB (2,191 words) - 21:34, 13 February 2009
- ...w the Japanese were planning an invasion of a more eastern U.S. base, from cryptanalysis of communications in the [[JN-25]] communications channel. The actual targe13 KB (1,923 words) - 05:46, 3 September 2010
- ...overed elsewhere. See, for example, [[communications intelligence#acoustic cryptanalysis]]. ...There are, however, a huge number of existing, low-risk applications where cryptanalysis is the lowest of threats. The article should not scare people; I believe it58 KB (9,554 words) - 14:37, 18 March 2024
- ...nsitive information is often encrypted, SIGINT often involves the use of [[cryptanalysis]]. However, traffic analysis—the study of who is signalling whom and ...breach of the Japanese PURPLE system, and never could return to full-time cryptanalysis.36 KB (5,247 words) - 05:49, 8 April 2024
- ...ku Yamamoto]], on 18 April 1943. Knowledge of Yamamoto's route came from [[cryptanalysis]], and it was a careful balance between risking the Japanese learning of th17 KB (2,581 words) - 20:45, 2 April 2024
- ...incidence to get the number of polyalphabets, but things like differential cryptanalysis is its own advanced topic.53 KB (8,698 words) - 15:00, 20 March 2024
- ...cations intelligence]] of the war. Targeting was in its infancy, but, had cryptanalysis and operations research convinced top bomber commanders of their findings,17 KB (2,638 words) - 09:26, 5 April 2024
- ...the predecessor of the modern "all-source" center, where tactical reports, cryptanalysis, direction finding, and other functions came together to locate German subm ...e with a problem like the one that the DI faces. One of the hard parts of cryptanalysis is developing an “attack” on a particular communications network. But,37 KB (5,534 words) - 20:45, 2 April 2024
- | title = Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP)24 KB (3,851 words) - 05:49, 8 April 2024
- ...val period, but, until quite recently, the bulk of advanced ciphers -- and cryptanalysis -- were coming from the military (in this broad sense). I'll note that I am30 KB (4,939 words) - 23:17, 31 August 2011
- ...d countermeasures against, a then-classified technique called differential cryptanalysis. That technique could be used against many targets besides DES. ...peration was disastrous, as the particular cryptosystem had been broken by cryptanalysis, who were reading the traffic in parallel with the intended recipients. The60 KB (8,909 words) - 18:47, 3 April 2024
- * [[Talk:Cryptanalysis/Draft]] ** [[Cryptanalysis]]51 KB (7,254 words) - 14:48, 16 May 2024
- [[Cryptography]] and [[cryptanalysis]] were rather important in WW II. The mainly British ULTRA project broke Ge33 KB (5,000 words) - 08:28, 4 May 2024
- == Cryptanalysis == ...a separate article on non-linearity or algebraic attacks, or covered in [[cryptanalysis]]. At this point, I think just get something written, then worry about orga119 KB (20,018 words) - 18:02, 1 April 2024
- * [[Cryptanalysis]]38 KB (5,783 words) - 12:48, 21 February 2021
- *[[Cryptanalysis]]35 KB (4,991 words) - 09:02, 4 May 2024
- == [[Cryptanalysis]] == I changed the status back to 1. [http://en.citizendium.org/wiki/Talk:Cryptanalysis#Toward_Approval See this]. [[User:D. Matt Innis|D. Matt Innis]] 18:17, 19 J142 KB (23,760 words) - 12:44, 24 September 2020
- ...re general, the redacted sections dealt with message content interception, cryptanalysis, and translation.<ref name=NSAVN-2 /> ...do tactical [[direction finding]], [[traffic analysis]], and field-level [[cryptanalysis]] against opposing ground forces.74 KB (11,149 words) - 11:11, 4 April 2024
- ...irly meager. Is that, or perhaps [[History of Cryptology]] or [[History of Cryptanalysis]], where the historical stuff in your old outline belongs? Are those three ...? I think [[Cryptography]] is near approval; what do you suggest there?. [[Cryptanalysis]] still needs work, perhaps even re-organisation. [[Hash (cryptography)]] a213 KB (35,248 words) - 12:35, 7 May 2024
- ...ical information to the French and British in 1939, and production British cryptanalysis was well underway in 1940. The Enigma, with German military enhancements, w61 KB (9,303 words) - 07:31, 18 March 2024
- ...to which the Allies could use effective radio direction-finding HF/DF and cryptanalysis of the messages sent by their Enigma machines. Eventually, the Allies combi59 KB (8,914 words) - 07:36, 18 March 2024
- ...bing some operation or entity, "nonlinearity" as the property, and "linear cryptanalysis" for a specific class of attack that works with linear approximations to pa86 KB (14,200 words) - 11:01, 7 March 2024
- ...k, [[FreeSWAN]], ...) and many purely technical ones ([[stream cipher]], [[cryptanalysis]], ...) that also need contributions or comment. [[User:Sandy Harris|Sandy67 KB (11,202 words) - 13:34, 6 April 2024
- ...do tactical [[direction finding]], [[traffic analysis]], and field-level [[cryptanalysis]] against opposing ground forces.72 KB (10,689 words) - 08:11, 4 May 2024
- ...ttle of the Atlantic]] was compromised by the navy's introduction of its [[Cryptanalysis of the Enigma#M4 (German Navy 4-rotor Enigma)|M4 4-rotor Enigma]], whose si171 KB (25,041 words) - 09:26, 5 April 2024