expand for answer

Meet-In-The-Middle Attack

An attack in which the attacker uses a known plain-text message. The plain text is then encrypted using every possible key (k1), while the equivalent cipher text is decrypted using all possible keys (k2).


Similar items:
An attack in which the attacker has a copy of the encrypted message along with the plain-text message used to generate the cipher text (the copy). This greatly assists the attacker in breaking weaker codes.
[view]
An attack in which the attacker has the ability to decrypt chosen portions of the cipher-text message.
[view]
Cipher that uses an encryption algorithm to rearrange the letters of a plain-text message to form the cipher-text message.
[view]
An attack in which the attacker has the ability to encrypt plain- text messages of their choosing and then analyze the cipher-text output of the encryption algorithm.
[view]
Cipher that uses an encryption algorithm to replace each character or bit of the plain-text message with a different character, such as a Caesar cipher.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in