Brute force attack/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} ==Parent topics== {{r|Cryptanalysis}} ==Subtopics== <!-- List topics here that are included by this topic. --> ==Other related topics== <!-- List topics here that are r...) |
No edit summary |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 4: | Line 4: | ||
==Parent topics== | ==Parent topics== | ||
{{r|Computability theory}} | |||
{{r|Computational complexity theory}} | |||
{{r|Complexity of algorithms}} | |||
{{r|Cryptanalysis}} | {{r|Cryptanalysis}} | ||
{{r|Passive attack}} | |||
==Subtopics== | ==Subtopics== | ||
{{r|Plaintext recognition}} | |||
==Other related topics== | ==Other related topics== | ||
{{r|Parallel computation}} | |||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Robert Ley}} | |||
{{r|Herman Hollerith}} | |||
{{r|Hybrid cryptosystem}} | |||
{{r|Code book attack}} |
Latest revision as of 17:01, 21 July 2024
- See also changes related to Brute force attack, or pages that link to Brute force attack or to this page or whose text contains "Brute force attack".
Parent topics
- Computability theory [r]: Add brief definition or description
- Computational complexity theory [r]: Add brief definition or description
- Complexity of algorithms [r]: How fast the execution time (or memory usage) increases as the data set to be processed grows. [e]
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Passive attack [r]: An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them. [e]
Subtopics
- Robert Ley [r]: Add brief definition or description
- Herman Hollerith [r]: (February 29, 1860 – November 17, 1929) An American engineer and businessman important in the history of computing for having invented punched card input for program instructions and developed the tabulating company that became International Business Machines. [e]
- Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
- Code book attack [r]: Attacking a block cipher by creating a code book, collecting plaintext/ciphertext pairs. [e]