Known-plaintext attack

Results: 101



#Item
81Keystream / Stream cipher / Modular arithmetic

A known plaintext attack on the ISAAC keystream generator Marina Pudovkina [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-06-19 10:18:33
82Affine cipher / Caesar cipher / Ciphertext / Cipher / Cryptanalysis / Known-plaintext attack / One-time pad / Vigenère cipher / Transposition cipher / Cryptography / Stream ciphers / Substitution cipher

Cryptology: From Caesar Ciphers to Public-Key Cryptosystems Author(s): Dennis Luciano and Gordon Prichett Source: The College Mathematics Journal, Vol. 18, No. 1 (Jan., 1987), pp. 2-17

Add to Reading List

Source URL: www.math.sunysb.edu

Language: English - Date: 2010-04-15 11:12:49
83Cipher / Floradora / Code / Known-plaintext attack / Cryptanalysis / One-time pad / Cryptography / Espionage / Cyberwarfare

How the Allies broke the German Diplomatic cipher Floradora. During World War 2, the Germans believed their two major diplomatic cryptographic systems were impregnable. Both were based on a

Add to Reading List

Source URL: www.cryptoden.com

Language: English - Date: 2012-08-05 04:37:06
84Biuro Szyfrów / Military intelligence / Ultra / Enigma machine / Bomba / Known-plaintext attack / Bombe / Zygalski sheets / Alan Turing / Cryptography / Espionage / Bletchley Park

The Influence of ULTRA in the Second World War [ Changed 26th November[removed]Last year Sir Harry Hinsley kindly agreed to speak about Bletchley Park, where he worked during the

Add to Reading List

Source URL: www.cdpa.co.uk

Language: English - Date: 2008-02-11 06:08:56
85Vigenère cipher / Substitution cipher / Classical cipher / Block cipher / Caesar cipher / Cipher / Known-plaintext attack / Cryptanalysis / Symmetric-key algorithm / Cryptography / Stream ciphers / Ciphertext

22 Chapter 2

Add to Reading List

Source URL: www.eit.lth.se

Language: English - Date: 2008-11-05 05:17:40
86Ciphertext / Block cipher / Cipher / Differential cryptanalysis / Cryptanalysis / Blowfish / Known-plaintext attack / Weak key / Vigenère cipher / Cryptography / Espionage / Slide attack

A Tutorial on Slide Attacks By Chalermpong Worawannotai and Isabelle Stanton

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2008-10-23 15:16:37
87Block cipher modes of operation / Block cipher / Initialization vector / Ciphertext / Cipher / One-time pad / Symmetric-key algorithm / Known-plaintext attack / Data Encryption Standard / Cryptography / Stream ciphers / Keystream

Building Stream Ciphers from Block Ciphers and their Security Hans Christoph Hudde

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
88Known-plaintext attack / Cyclic redundancy check / Ciphertext / Py / XOR cipher / Block cipher modes of operation / Padding / Stream ciphers / Cryptography / Completeness

ZIP Attacks with Reduced Known Plaintext Michael Stay AccessData Corporation

Add to Reading List

Source URL: math.ucr.edu

Language: English - Date: 2006-03-09 16:25:49
89Alan Turing / Enigma machine / Banburismus / Vigenère cipher / Known-plaintext attack / Bombe / Lorenz cipher / Playfair cipher / Cipher / Cryptography / Espionage / Bletchley Park

The Bletchley Park 1944 Cryptographic Dictionary formatted by Tony Sale (c[removed]EDITORIAL NOTE

Add to Reading List

Source URL: www.codesandciphers.org.uk

Language: English - Date: 2013-08-19 02:10:05
90NCR Corporation / Alan Turing / Rotor machines / Bombe / Enigma machine / Known-plaintext attack / Enigma / Cryptanalysis of the Enigma / Bomba / Cryptography / Espionage / Bletchley Park

The US 6812 Bombe Report 1944 formatted by Tony Sale (c[removed]6812TH SIGNAL SECURITY DETACHMENT (PROV) APO 413

Add to Reading List

Source URL: www.codesandciphers.org.uk

Language: English - Date: 2013-08-19 02:08:53
UPDATE