Category:Cryptographic attacks
![]() | Computing portal |
Here is a list of articles in the Cryptographic attacks category of the Computing portal that unifies foundations of mathematics and computations using computers. A cryptographic attack is a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme. This process is also called "cryptanalysis".
See also Category:Computer security exploits, Category:Malware.
Subcategories
This category has the following 2 subcategories, out of 2 total.
Pages in category "Cryptographic attacks"
The following 115 pages are in this category, out of 115 total.
- Cryptographic attack (computing)
3
- 3-subset meet-in-the-middle attack (computing)
A
- Acoustic cryptanalysis (physics)
- Adaptive chosen-ciphertext attack (computing)
- Adversary (cryptography) (computing)
- Attack model (computing)
B
- Banburismus (computing)
- Biclique attack (computing)
- Birthday attack (computing)
- Bit-flipping attack (computing)
- Black bag operation (computing)
- Black-bag cryptanalysis (computing)
- Boomerang attack (computing)
- Brute-force attack (computing)
C
- Chosen-ciphertext attack (computing)
- Ciphertext-only attack (computing)
- Clock drift (computing)
- Collision attack (computing)
- Contact analysis (cryptanalysis) (computing)
- Coppersmith's attack (computing)
- Correlation attack (computing)
- Cracking of wireless networks (computing)
- CRIME (computing)
- Cryptanalysis (computing)
- Cryptanalytic computer (computing)
- CryptoLocker (engineering)
- Cube attack (computing)
- Custom hardware attack (computing)
D
- Davies attack (computing)
- Dictionary attack (computing)
- Differential cryptanalysis (computing)
- Differential equations of addition (computing)
- Differential-linear attack (computing)
- Distinguishing attack (computing)
- Distributed.net (computing)
- Downgrade attack (computing)
- DROWN attack (computing)
- Duqu (computing)
F
- Flame (malware) (computing)
- Fluhrer, Mantin and Shamir attack (computing)
- FREAK (computing)
- Frequency analysis (computing)
G
- Gardening (cryptanalysis) (computing)
H
- Hardware backdoor (computing)
- Hardware keylogger (computing)
- Higher-order differential cryptanalysis (computing)
I
- Impossible differential cryptanalysis (computing)
- Index of coincidence (computing)
- Integral cryptanalysis (computing)
- Interlock protocol (computing)
- Interpolation attack (computing)
K
- Kappa test (computing)
- Kasiski examination (computing)
- Key-recovery attack (computing)
- Keystroke logging (computing)
- Kiss (cryptanalysis) (computing)
- Known-key distinguishing attack (computing)
- Known-plaintext attack (computing)
L
- Length extension attack (computing)
- Linear cryptanalysis (computing)
- Locky (engineering)
- LogicLocker (computing)
- Lucky Thirteen attack (computing)
M
- Man-in-the-middle attack (computing)
- MD5CRK (computing)
- Meet-in-the-middle attack (computing)
- Message forgery (computing)
- Metasploit Project (organization)
- Microsoft Office password protection (computing)
- Military Cryptanalytics (computing)
- Mod n cryptanalysis (computing)
P
- Padding oracle attack (computing)
- Partial-matching meet-in-the-middle attack (computing)
- Partitioning cryptanalysis (computing)
- Passive attack (computing)
- Password cracking (computing)
- Piling-up lemma (computing)
- Pre-play attack (computing)
- Preimage attack (computing)
- Pwdump (computing)
R
- Rainbow table (computing)
- Random number generator attack (computing)
- Rebound attack (computing)
- Regin (malware) (computing)
- Related-key attack (computing)
- Replay attack (computing)
- Riverbank Publications (computing)
- ROCA vulnerability (computing)
- Rootkit (computing)
- Rotational cryptanalysis (computing)
- Rubber-hose cryptanalysis (computing)
S
- SciEngines GmbH (computing)
- Self-service password reset (computing)
- Side-channel attack (computing)
- Sinkov statistic (computing)
- Slide attack (computing)
- Small subgroup confinement attack (computing)
- Steganalysis (computing)
- Stream cipher attacks (computing)
- Stuxnet (engineering)
- Supply chain attack (computing)
T
- Table of costs of operations in elliptic curves (computing)
- Tempest (codename) (computing)
- TeslaCrypt (engineering)
- Traffic analysis (computing)
- Truncated differential cryptanalysis (computing)
- Turingery (computing)
U
- Unicity distance (computing)
W
- Wannacry (computing)
- Watermarking attack (computing)
- Weak key (computing)
- Wiener's attack (computing)
X
- XSL attack (computing)
Z
- Zendian problem (computing)
- Zygalski sheets (computing)