Active attack/Related Articles

From Citizendium
< Active attack
Revision as of 03:36, 14 June 2010 by imported>Sandy Harris (→‎Parent topics)
Jump to navigation Jump to search
This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Active attack.
See also changes related to Active attack, or pages that link to Active attack or to this page or whose text contains "Active attack".

Parent topics

  • Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
  • Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]

Subtopics

  • Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]
  • Rewrite attack [r]: An attack on a communication system in which the attacker replaces a legitimate message with his own. [e]

Other related topics

  • Passive attack [r]: An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them. [e]
  • Cryptographic authentication [r]: Cryptographic techniques for authenticating both senders and messages; the most common are digital signatures and hashed message authentication codes. [e]