Man-in-the-middle attack/Related Articles
Jump to navigation
Jump to search
- See also changes related to Man-in-the-middle attack, or pages that link to Man-in-the-middle attack or to this page or whose text contains "Man-in-the-middle attack".
Parent topics
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]
Subtopics
- Hashed message authentication code [r]: A technique for authenticating a message using a hash function and a secret key. [e]
- Digital signature [r]: A technique based on public key cryptography to allow people to "sign" documents using their private keys. [e]
- Iraq War [r]: (2003-2011) Invasion and occupation of Iraq by a coalition of countries led by the U.S. to depose Saddam Hussein, who was accused of stockpiling weapons of mass destruction (which were never found). [e]
- Opportunistic encryption [r]: A technique whereby computers can set up their own encrypted connections, without any connection-specific setup by an administrator. [e]
- IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]