Active attack/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
imported>Sandy Harris
Line 3: Line 3:
==Parent topics==
==Parent topics==
{{r|cryptanalysis}}
{{r|cryptanalysis}}
{{r|active attack}}


==Subtopics==
==Subtopics==

Revision as of 03:36, 14 June 2010

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Active attack.
See also changes related to Active attack, or pages that link to Active attack or to this page or whose text contains "Active attack".

Parent topics

  • Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
  • Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]

Subtopics

  • Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]
  • Rewrite attack [r]: An attack on a communication system in which the attacker replaces a legitimate message with his own. [e]

Other related topics

  • Passive attack [r]: An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them. [e]
  • Cryptographic authentication [r]: Cryptographic techniques for authenticating both senders and messages; the most common are digital signatures and hashed message authentication codes. [e]