Code book attack/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Chris Day
(New page: {{subpages}} <!-- INSTRUCTIONS, DELETE AFTER READING: Related Articles pages link to existing and proposed articles that are related to the present article. These lists of links double as...)
 
imported>Sandy Harris
(→‎Other related topics: remove place holder)
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{subpages}}
{{subpages}}
<!-- INSTRUCTIONS, DELETE AFTER READING:
Related Articles pages link to existing and proposed articles that are related to the present article.
These lists of links double as glossaries; to achieve this, all the article names in the list should be defined, using the {{r}} template system for definitions; see below for instructions.
For more info, see both [[CZ:Related Articles]] and [[CZ:Definitions]]. -->


==Parent topics==
==Parent topics==
{{r|Cryptanalysis}}
{{r|Cryptanalysis}}
{{r|passive attack}}


==Subtopics==
==Subtopics==
<!-- List topics here that are included by this topic. -->
These are subtopics only with respect to their cryptanalysis.
{{r|Block cipher}}
{{r|Stream cipher}}
{{r|Internet key exchange}}


==Other related topics==
==Other related topics==
<!-- List topics here that are related to this topic, but neither wholly include it nor are wholly included by it. -->
{{r|Birthday paradox}}
{{r|birthday attack}}

Latest revision as of 18:47, 3 January 2009

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Code book attack.
See also changes related to Code book attack, or pages that link to Code book attack or to this page or whose text contains "Code book attack".

Parent topics

  • Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
  • Passive attack [r]: An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them. [e]

Subtopics

These are subtopics only with respect to their cryptanalysis.

  • Block cipher [r]: A symmetric cipher that operates on fixed-size blocks of plaintext, giving a block of ciphertext for each [e]
  • Stream cipher [r]: A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step. [e]
  • Internet key exchange [r]: Add brief definition or description

Other related topics

  • Birthday paradox [r]: The counterintuitive result that for any (random) group of 23 or more people it is more likely than not that two of them celebrate their birthday on the same day of the year. [e]
  • Birthday attack [r]: An attack on a cryptographic system that works by finding two identical outputs from the system. [e]