Contact analysis
Concept in cryptanalysis
general/cryptographic-attacks
Chosen-ciphertext attack
Attack model for cryptanalysis
general/cryptographic-attacks
Gardening (cryptanalysis)
Schemes to entice the Germans to include known plaintext during World War II
general/cryptographic-attacks
Password cracking
Recovering passwords stored by computer systems
general/cryptographic-attacks
Custom hardware attack
Concept in cryptography
general/cryptographic-attacks
Kasiski examination
Method in cryptanalysis
general/cryptographic-attacks
Cube attack
Method of cryptanalysis
general/cryptographic-attacks
Slide attack
Form of cryptanalysis
general/cryptographic-attacks
XSL attack
Theoretical attack on block ciphers
general/cryptographic-attacks
Birthday attack
Type of cryptographic attack
general/cryptographic-attacks
Hardware keylogger
Device to record all keyboard activity
general/cryptographic-attacks
Random number generator attack
Class of attack on cryptographic systems
general/cryptographic-attacks
Brute-force attack
Cryptanalytic method for unauthorized users to access data
general/cryptographic-attacks
Replay attack
Network attack in which valid data transmission is repeated or delayed
general/cryptographic-attacks
Steganalysis
Study of detecting messages hidden using steganography
general/cryptographic-attacks
Stream cipher attacks
Methods to break a stream cipher
general/cryptographic-attacks
Weak key
Key that is easy to break with a specific cipher
general/cryptographic-attacks
Mod n cryptanalysis
Attack applicable to block and stream ciphers
general/cryptographic-attacks
Watermarking attack
Attack on disk encryption methods
general/cryptographic-attacks
Black-bag cryptanalysis
Acquisition of cryptographic secrets via burglary, or other covert means
general/cryptographic-attacks
Bit-flipping attack
Cryptographic attack
general/cryptographic-attacks
Differential-linear attack
Form of cryptanalysis
general/cryptographic-attacks
Fluhrer, Mantin and Shamir attack
Crypyographic attack method
general/cryptographic-attacks
Interpolation attack
Type of cryptanalytic attack
general/cryptographic-attacks
Impossible differential cryptanalysis
Exploitation of impossible differences in block ciphers
general/cryptographic-attacks
Length extension attack
Attack against cryptographical hash functions
general/cryptographic-attacks
Keystroke logging
Action of recording the keys struck on a keyboard
general/cryptographic-attacks
Higher-order differential cryptanalysis
Type of cryptanalytic attack
general/cryptographic-attacks
Linear cryptanalysis
Form of cryptanalysis
general/cryptographic-attacks
Coppersmith's attack
Class of cryptographic attacks
general/cryptographic-attacks
Rebound attack
Type of cryptographic statistical attack
general/cryptographic-attacks
Meet-in-the-middle attack
Generic space–time tradeoff cryptographic attack
general/cryptographic-attacks
Distinguishing attack
Form of cryptanalysis
general/cryptographic-attacks
Ciphertext-only attack
Attack model in cryptanalysis
general/cryptographic-attacks
Attack model
Classification of cryptographic attack
general/cryptographic-attacks
Integral cryptanalysis
Type of cryptanalytic attack
general/cryptographic-attacks
Adaptive chosen-ciphertext attack
Cryptographic attack
general/cryptographic-attacks
Known-plaintext attack
Attack model for cryptanalysis with access to both plaintext and ciphertext
general/cryptographic-attacks
Side-channel attack
Any attack based on information gained from the implementation of a computer system
general/cryptographic-attacks
Differential cryptanalysis
General form of cryptanalysis applicable primarily to block ciphers
general/cryptographic-attacks
Supply chain attack
Cyberattack via an industry's supply chain
general/cryptographic-attacks
Dictionary attack
Technique for defeating password protection using lists of likely possibilities
general/cryptographic-attacks
Piling-up lemma
Principle used in linear cryptanalysis
general/cryptographic-attacks
Boomerang attack
Form of cryptanalysis
general/cryptographic-attacks
Preimage attack
Attack model against cryptographic hash functions
general/cryptographic-attacks
Related-key attack
Type of cryptographic attack
general/cryptographic-attacks