Talk:Cryptanalysis/Draft: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
No edit summary
imported>Sandy Harris
No edit summary
Line 5: Line 5:
** Side channel attacks
** Side channel attacks
** Bypassing authentication
** Bypassing authentication
** Guessing secrets
*** Dictionary attacks on passwords
*** Random number weaknesses
*** Small keys
* Attacks on the ciphers
* Attacks on the ciphers
Then the topics we currently have under "Mathematical cryptanalysis".
Then the topics we currently have under "Mathematical cryptanalysis".


Things like man-in-the-middle would then turn up in two places, first under "Bypassing authentication" because if you can do that then you don't have to break the actual encryption, and second under "Attacks on the ciphers" for details of attacks on different authentication mechanisms since those details are much he same as other attacks on RSA, block ciphers or whatever. [[User:Sandy Harris|Sandy Harris]] 01:51, 17 October 2008 (UTC)
Things like man-in-the-middle would then turn up in two places, first under "Bypassing authentication" because if you can do that then you don't have to break the actual encryption, and second under "Attacks on the ciphers" for details of attacks on different authentication mechanisms since those details are much the same as other attacks on RSA, block ciphers or whatever. [[User:Sandy Harris|Sandy Harris]] 01:51, 17 October 2008 (UTC)

Revision as of 23:39, 16 October 2008

I am thinking of a re-organisation here, along the lines:

  • Attacks on the system
    • Practical cryptanalysis
    • Traffic analysis
    • Side channel attacks
    • Bypassing authentication
    • Guessing secrets
      • Dictionary attacks on passwords
      • Random number weaknesses
      • Small keys
  • Attacks on the ciphers

Then the topics we currently have under "Mathematical cryptanalysis".

Things like man-in-the-middle would then turn up in two places, first under "Bypassing authentication" because if you can do that then you don't have to break the actual encryption, and second under "Attacks on the ciphers" for details of attacks on different authentication mechanisms since those details are much the same as other attacks on RSA, block ciphers or whatever. Sandy Harris 01:51, 17 October 2008 (UTC)