Search results
Jump to navigation
Jump to search
Page title matches
- ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system32 KB (4,916 words) - 05:49, 8 April 2024
- ...hrough all 2<sup>k</sup> possibilities. For k=1, this is just differential cryptanalysis, but with k>1 it is a new technique.1 KB (171 words) - 05:48, 8 April 2024
- | article url = http://en.citizendium.org/wiki?title=Cryptanalysis&oldid=100694598573 bytes (49 words) - 17:57, 1 August 2010
- 122 bytes (16 words) - 11:08, 24 October 2008
- {{r|Linear cryptanalysis}} {{r|Differential cryptanalysis}}701 bytes (92 words) - 10:46, 5 January 2009
- 194 bytes (26 words) - 02:00, 2 November 2008
- 162 bytes (24 words) - 02:02, 2 November 2008
- 189 bytes (22 words) - 00:07, 1 October 2009
- ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system32 KB (4,913 words) - 14:38, 18 March 2024
Page text matches
- #REDIRECT [[Cryptanalysis]]27 bytes (2 words) - 01:30, 9 September 2013
- #REDIRECT [[Integral cryptanalysis]]36 bytes (3 words) - 11:32, 9 August 2009
- {{r|cryptanalysis}} {{r|linear cryptanalysis}}160 bytes (18 words) - 02:26, 31 March 2009
- A Japanese [[cryptographer]] best known for discovering [[linear cryptanalysis]].95 bytes (10 words) - 23:16, 22 October 2010
- {{r|Cryptanalysis}} These are subtopics only with respect to their cryptanalysis.287 bytes (37 words) - 18:47, 3 January 2009
- A [[Japan|Japanese]] [[cryptographer]] best known for discovering [[linear cryptanalysis]]126 bytes (13 words) - 14:49, 22 May 2011
- ...hrough all 2<sup>k</sup> possibilities. For k=1, this is just differential cryptanalysis, but with k>1 it is a new technique.1 KB (171 words) - 05:48, 8 April 2024
- ...grapher, best known as co-author of the first public paper on differential cryptanalysis.139 bytes (17 words) - 22:01, 23 August 2010
- The long history of the antithetical disciplines [[cryptography]] and [[cryptanalysis]].124 bytes (13 words) - 05:07, 19 October 2010
- ===Cryptanalysis=== {{r|Cryptanalysis}}2 KB (194 words) - 14:48, 4 April 2024
- {{r|Linear cryptanalysis}} {{r|Differential cryptanalysis}}701 bytes (92 words) - 10:46, 5 January 2009
- ...netic communications until 1939, but with some coverage of mail intercept, cryptanalysis, etc.220 bytes (26 words) - 19:09, 14 September 2009
- ...st cryptologist in history, he pioneered the application of mathematics to cryptanalysis and built the U.S. Army Signal Intelligence Service technical base.211 bytes (28 words) - 17:53, 12 May 2008
- ...ips. 2nd Edition is disappointing; it just appends a chapter on US-UK WWII cryptanalysis, rather than revising all relevant sections in the book. First chapter, "On * Friedman, William F. ''Military Cryptanalysis''1 KB (159 words) - 15:30, 27 May 2008
- ...e of [[Nazi Germany]]. Unknown to the Germans, it had been substantially [[cryptanalysis|cryptanalyzed]] by the British [[Government Code and Cipher School]], with321 bytes (39 words) - 10:20, 14 June 2010
- There has been no published cryptanalysis of the full E2, but there is an attack on a reduced-round version | title = Cryptanalysis of a Reduced Version of the Block Cipher E2941 bytes (134 words) - 05:48, 8 April 2024
- ...ligence agencies of the United States and United Kingdom that involved the cryptanalysis of messages sent by several intelligence agencies of the Soviet Union.256 bytes (34 words) - 20:39, 4 September 2009
- ...ting known text ([[ULTRA]] called this "gardening") — but the actual cryptanalysis is a passive attack. Two passive attacks — [[linear cryptanalysis]] and [[differential cryptanalysis]] — are very powerful. They are the only known attacks that break [[D3 KB (440 words) - 05:49, 8 April 2024
- ...literature, and published at about the same time as the first differential cryptanalysis paper. It turned out to have some weaknesses against that. Also, [[Lars Knu1 KB (192 words) - 05:48, 8 April 2024
- ...g the cipher; they use [[Cryptanalysis#Practical_cryptanalysis | practical cryptanalysis]] techniques such as breaking into an office to steal keys. ...ar cryptanalysis]] and [[differential cryptanalysis]] in particular, and [[cryptanalysis]] in general. ''It also makes the payoff for breaking that key very large''3 KB (459 words) - 05:49, 8 April 2024
- appeared in days and other papers on cryptanalysis of Skipjack | title = Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials.1 KB (187 words) - 05:48, 8 April 2024
- {{r|cryptanalysis}}177 bytes (20 words) - 18:54, 3 January 2009
- ...hers which are provably immune to [[differential cryptanalysis]], [[linear cryptanalysis]], and any other attacks that meet some fairly broad assumptions. However, some attacks on DFC were found by going outside those assumptions, [[Cryptanalysis#Side_channel_attacks|timing attack]]s on some implementations2 KB (309 words) - 05:48, 8 April 2024
- {{r|Cryptanalysis}}266 bytes (29 words) - 09:03, 2 April 2009
- {{r|Cryptanalysis}}141 bytes (15 words) - 19:39, 3 January 2009
- {{r|cryptanalysis}}200 bytes (21 words) - 03:38, 14 June 2010
- * Gaines, Helen F. ''Cryptanalysis'' * Sinkov, Abraham. ''Elementary Cryptanalysis: A Mathematical Approach'' Excellent; readable at a high school level3 KB (478 words) - 21:53, 10 May 2011
- {{r|cryptanalysis}}237 bytes (29 words) - 01:06, 22 March 2009
- {{r|cryptanalysis}}141 bytes (16 words) - 06:04, 31 March 2009
- {{r|Cryptanalysis}}130 bytes (12 words) - 00:54, 12 May 2008
- ...it too slow to be a competitive candidate for AES. There were also some [[cryptanalysis|cryptanalytic]] results | title = Key-Schedule Cryptanalysis of DEAL1 KB (215 words) - 14:23, 30 September 2009
- ...Government Code and Cipher School, which was responsible for the [[ULTRA]] cryptanalysis of the [[Enigma machine]]. ...cryptanalysis of the German [[Enigma machine]], although Polish and French cryptanalysis made important early breakthroughs. GCCS also obtained valuable intelligen3 KB (353 words) - 05:48, 8 April 2024
- {{r|Cryptanalysis}}605 bytes (77 words) - 14:41, 18 March 2024
- {{r|Cryptanalysis}}686 bytes (86 words) - 21:24, 30 November 2013
- {{r|Cryptanalysis}}531 bytes (66 words) - 19:06, 14 September 2009
- {{r|Cryptanalysis}}467 bytes (61 words) - 20:28, 11 January 2010
- {{r|Cryptanalysis}}640 bytes (81 words) - 04:17, 27 April 2010
- {{r|cryptanalysis}}563 bytes (72 words) - 22:09, 13 June 2008
- {{r|Cryptanalysis}}715 bytes (96 words) - 02:45, 25 November 2010
- {{r|Cryptanalysis}}715 bytes (85 words) - 20:16, 9 February 2010
- {{r|Cryptanalysis}}751 bytes (97 words) - 17:31, 12 September 2009
- [[Lars Knudsen]] invented a new attack, called [[integral cryptanalysis]] or the '''square attack''', to break Square. It was published at the same659 bytes (101 words) - 05:48, 8 April 2024
- * [[Differential cryptanalysis]], discovered by IBM's DES team, but kept secret at [[NSA]] request. Re-dis * [[Linear cryptanalysis]], from [[Mitsuru Matsui]].5 KB (823 words) - 20:23, 19 September 2011
- ..."BAD DOG" would become "EDG GRJ". This type of encryption is trivial to [[cryptanalysis | cryptanalize]] using [[frequency analysis]].714 bytes (116 words) - 05:48, 8 April 2024
- {{r|Cryptanalysis}}815 bytes (100 words) - 15:37, 11 January 2010
- {{r|Cryptanalysis}}712 bytes (96 words) - 14:31, 22 March 2024
- ...passes both cryptography (the study of techniques for keeping secrets) and cryptanalysis (codebreaking, acquiring secrets without authorisation). The field has a l848 bytes (113 words) - 16:46, 25 March 2024
- {{r|Cryptanalysis}}724 bytes (100 words) - 14:31, 22 March 2024
- {{r|Cryptanalysis}}830 bytes (103 words) - 14:41, 18 March 2024
- {{r|Cryptanalysis}}896 bytes (110 words) - 18:21, 12 May 2008