[prev in list] [next in list] [prev in thread] [next in thread] 

List:       linux-crypto
Subject:    Re: (AES) loopback crypto questions
From:       Sandy Harris <sandy () storm ! ca>
Date:       2001-07-12 14:07:11
[Download RAW message or body]

"Michael H. Warfield" wrote:

> ... if you have a known plaintext
> situation, you have a condition for a "meet in the middle" attack where
> you attack the crypto system from both ends, encrypting the plaintext
> with K2 and decrypting with K1 searching for matching results in the
> middle.  Bruce Schneier covers this attack in "Applied Cryptography"
> ...

One online explanation is:
http://www.freeswan.org/freeswan_trees/freeswan-1.91/doc/glossary.html#meet

For others, follow the "other crypto glossaries" links at the top of that
file.

Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic