[prev in list] [next in list] [prev in thread] [next in thread]
List: linux-crypto
Subject: Re: (AES) loopback crypto questions
From: Sandy Harris <sandy () storm ! ca>
Date: 2001-07-12 14:07:11
[Download RAW message or body]
"Michael H. Warfield" wrote:
> ... if you have a known plaintext
> situation, you have a condition for a "meet in the middle" attack where
> you attack the crypto system from both ends, encrypting the plaintext
> with K2 and decrypting with K1 searching for matching results in the
> middle. Bruce Schneier covers this attack in "Applied Cryptography"
> ...
One online explanation is:
http://www.freeswan.org/freeswan_trees/freeswan-1.91/doc/glossary.html#meet
For others, follow the "other crypto glossaries" links at the top of that
file.
Linux-crypto: cryptography in and on the Linux system
Archive: http://mail.nl.linux.org/linux-crypto/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic