Talk:Cryptanalysis/Draft: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
(New page: I am thinking of a re-organisation here, along the lines: * Attacks on the system ** Practical cryptanalysis ** Traffic analysis ** Side channel attacks ** Bypassing authentication * Attac...)
 
imported>Sandy Harris
No edit summary
Line 8: Line 8:
Then the topics we currently have under "Mathematical cryptanalysis".
Then the topics we currently have under "Mathematical cryptanalysis".


Things like man-in-the-middle would then turn up in two places, first under "Bypassing authentication" because if you can do that then you don't have to break the actual encryption, and second under "Attacks on the ciphers" for details of attacks on different authentication mechanisms since tose details are much he sameas other attacks on RSA, block ciphers or whatever. [[User:Sandy Harris|Sandy Harris]] 01:51, 17 October 2008 (UTC)
Things like man-in-the-middle would then turn up in two places, first under "Bypassing authentication" because if you can do that then you don't have to break the actual encryption, and second under "Attacks on the ciphers" for details of attacks on different authentication mechanisms since those details are much he same as other attacks on RSA, block ciphers or whatever. [[User:Sandy Harris|Sandy Harris]] 01:51, 17 October 2008 (UTC)

Revision as of 20:52, 16 October 2008

I am thinking of a re-organisation here, along the lines:

  • Attacks on the system
    • Practical cryptanalysis
    • Traffic analysis
    • Side channel attacks
    • Bypassing authentication
  • Attacks on the ciphers

Then the topics we currently have under "Mathematical cryptanalysis".

Things like man-in-the-middle would then turn up in two places, first under "Bypassing authentication" because if you can do that then you don't have to break the actual encryption, and second under "Attacks on the ciphers" for details of attacks on different authentication mechanisms since those details are much he same as other attacks on RSA, block ciphers or whatever. Sandy Harris 01:51, 17 October 2008 (UTC)