Skip to content

general/cryptographic-attacks

Surf Wiki
Contact analysis

Concept in cryptanalysis

general/cryptographic-attacks
Chosen-ciphertext attack

Attack model for cryptanalysis

general/cryptographic-attacks
Gardening (cryptanalysis)

Schemes to entice the Germans to include known plaintext during World War II

general/cryptographic-attacks
Password cracking

Recovering passwords stored by computer systems

general/cryptographic-attacks
Custom hardware attack

Concept in cryptography

general/cryptographic-attacks
Kasiski examination

Method in cryptanalysis

general/cryptographic-attacks
Cube attack

Method of cryptanalysis

general/cryptographic-attacks
Slide attack

Form of cryptanalysis

general/cryptographic-attacks
XSL attack

Theoretical attack on block ciphers

general/cryptographic-attacks
Birthday attack

Type of cryptographic attack

general/cryptographic-attacks
Hardware keylogger

Device to record all keyboard activity

general/cryptographic-attacks
Random number generator attack

Class of attack on cryptographic systems

general/cryptographic-attacks
Brute-force attack

Cryptanalytic method for unauthorized users to access data

general/cryptographic-attacks
Replay attack

Network attack in which valid data transmission is repeated or delayed

general/cryptographic-attacks
Steganalysis

Study of detecting messages hidden using steganography

general/cryptographic-attacks
Stream cipher attacks

Methods to break a stream cipher

general/cryptographic-attacks
Weak key

Key that is easy to break with a specific cipher

general/cryptographic-attacks
Mod n cryptanalysis

Attack applicable to block and stream ciphers

general/cryptographic-attacks
Watermarking attack

Attack on disk encryption methods

general/cryptographic-attacks
Black-bag cryptanalysis

Acquisition of cryptographic secrets via burglary, or other covert means

general/cryptographic-attacks
Bit-flipping attack

Cryptographic attack

general/cryptographic-attacks
Differential-linear attack

Form of cryptanalysis

general/cryptographic-attacks
Fluhrer, Mantin and Shamir attack

Crypyographic attack method

general/cryptographic-attacks
Interpolation attack

Type of cryptanalytic attack

general/cryptographic-attacks
Impossible differential cryptanalysis

Exploitation of impossible differences in block ciphers

general/cryptographic-attacks
Length extension attack

Attack against cryptographical hash functions

general/cryptographic-attacks
Keystroke logging

Action of recording the keys struck on a keyboard

general/cryptographic-attacks
Higher-order differential cryptanalysis

Type of cryptanalytic attack

general/cryptographic-attacks
Linear cryptanalysis

Form of cryptanalysis

general/cryptographic-attacks
Coppersmith's attack

Class of cryptographic attacks

general/cryptographic-attacks
Rebound attack

Type of cryptographic statistical attack

general/cryptographic-attacks
Meet-in-the-middle attack

Generic space–time tradeoff cryptographic attack

general/cryptographic-attacks
Distinguishing attack

Form of cryptanalysis

general/cryptographic-attacks
Ciphertext-only attack

Attack model in cryptanalysis

general/cryptographic-attacks
Attack model

Classification of cryptographic attack

general/cryptographic-attacks
Integral cryptanalysis

Type of cryptanalytic attack

general/cryptographic-attacks
Adaptive chosen-ciphertext attack

Cryptographic attack

general/cryptographic-attacks
Known-plaintext attack

Attack model for cryptanalysis with access to both plaintext and ciphertext

general/cryptographic-attacks
Side-channel attack

Any attack based on information gained from the implementation of a computer system

general/cryptographic-attacks
Differential cryptanalysis

General form of cryptanalysis applicable primarily to block ciphers

general/cryptographic-attacks
Supply chain attack

Cyberattack via an industry's supply chain

general/cryptographic-attacks
Dictionary attack

Technique for defeating password protection using lists of likely possibilities

general/cryptographic-attacks
Piling-up lemma

Principle used in linear cryptanalysis

general/cryptographic-attacks
Boomerang attack

Form of cryptanalysis

general/cryptographic-attacks
Preimage attack

Attack model against cryptographic hash functions

general/cryptographic-attacks
Related-key attack

Type of cryptographic attack

general/cryptographic-attacks