The Full Wiki

More info on Cryptographic attacks

Top cryptographic attacks (Trending topics)

  

The following are the current most viewed articles on Wikipedia within Wikipedia's Cryptographic attacks category. Think of it as a What's Hot list for Cryptographic attacks. More info »

This is a beta release and so the figures may be a day or two out of date. We'd love to get your thoughts.

Rank Topic Wikipedia views
1 Keystroke logging 2,750 Sparkline of topic views for 2 weeks
2 Password cracking 2,312 Sparkline of topic views for 2 weeks
3 Brute force attack 2,189 Sparkline of topic views for 2 weeks
4 Rainbow table 1,634 Sparkline of topic views for 2 weeks
5 Computer forensics 1,563 Sparkline of topic views for 2 weeks
6 Man-in-the-middle attack 1,421 Sparkline of topic views for 2 weeks
7 Cryptanalysis 1,150 Sparkline of topic views for 2 weeks
8 Keygen 909 Sparkline of topic views for 2 weeks
9 TEMPEST 887 Sparkline of topic views for 2 weeks
10 Metasploit Project 792 Sparkline of topic views for 2 weeks
11 Birthday attack 590 Sparkline of topic views for 2 weeks
12 Dictionary attack 505 Sparkline of topic views for 2 weeks
13 Frequency analysis 498 Sparkline of topic views for 2 weeks
14 LM hash 442 Sparkline of topic views for 2 weeks
15 Replay attack 369 Sparkline of topic views for 2 weeks
16 Cold boot attack 318 Sparkline of topic views for 2 weeks
17 Traffic analysis 246 Sparkline of topic views for 2 weeks
18 Collision (computer science) 242 Sparkline of topic views for 2 weeks
19 Side channel attack 227 Sparkline of topic views for 2 weeks
20 Known-plaintext attack 186 Sparkline of topic views for 2 weeks
21 Rubber-hose cryptanalysis 182 Sparkline of topic views for 2 weeks
22 Pwdump 177 Sparkline of topic views for 2 weeks
23 Differential cryptanalysis 165 Sparkline of topic views for 2 weeks
24 Preimage attack 164 Sparkline of topic views for 2 weeks
25 Kasiski examination 157 Sparkline of topic views for 2 weeks
26 Black bag operation 153 Sparkline of topic views for 2 weeks
27 Collision attack 131 Sparkline of topic views for 2 weeks
28 LAN Manager 128 Sparkline of topic views for 2 weeks
29 Chosen-plaintext attack 127 Sparkline of topic views for 2 weeks
30 Clock drift 127 Sparkline of topic views for 2 weeks
31 Hardware keylogger 126 Sparkline of topic views for 2 weeks
32 Meet-in-the-middle attack 125 Sparkline of topic views for 2 weeks
33 KeeLoq 116 Sparkline of topic views for 2 weeks
34 Index of coincidence 108 Sparkline of topic views for 2 weeks
35 Timing attack 108 Sparkline of topic views for 2 weeks
36 Ransomware (malware) 107 Sparkline of topic views for 2 weeks
37 Power analysis 100 Sparkline of topic views for 2 weeks
38 Distributed.net 88 Sparkline of topic views for 2 weeks
39 Self-service password reset 84 Sparkline of topic views for 2 weeks
40 Chosen-ciphertext attack 83 Sparkline of topic views for 2 weeks
41 Computer fraud case studies 81 Sparkline of topic views for 2 weeks
42 Acoustic cryptanalysis 78 Sparkline of topic views for 2 weeks
43 Impossible differential cryptanalysis 78 Sparkline of topic views for 2 weeks
44 Ciphertext-only attack 76 Sparkline of topic views for 2 weeks
45 Black-bag cryptanalysis 75 Sparkline of topic views for 2 weeks
46 Linear cryptanalysis 73 Sparkline of topic views for 2 weeks
47 Related-key attack 69 Sparkline of topic views for 2 weeks
48 Stream cipher attack 68 Sparkline of topic views for 2 weeks
49 XSL attack 67 Sparkline of topic views for 2 weeks
50 Weak key 64 Sparkline of topic views for 2 weeks
51 Random number generator attack 63 Sparkline of topic views for 2 weeks
52 Adversary (cryptography) 61 Sparkline of topic views for 2 weeks
53 Steganalysis 60 Sparkline of topic views for 2 weeks
54 Boomerang attack 58 Sparkline of topic views for 2 weeks
55 CrypTool 56 Sparkline of topic views for 2 weeks
56 Slide attack 50 Sparkline of topic views for 2 weeks
57 Zygalski sheets 49 Sparkline of topic views for 2 weeks
58 MD5CRK 47 Sparkline of topic views for 2 weeks
59 Custom hardware attack 46 Sparkline of topic views for 2 weeks
60 Watermarking attack 43 Sparkline of topic views for 2 weeks
61 Fluhrer, Mantin and Shamir attack 42 Sparkline of topic views for 2 weeks
62 Adaptive chosen-ciphertext attack 41 Sparkline of topic views for 2 weeks
63 Bit-flipping attack 39 Sparkline of topic views for 2 weeks
64 Banburismus 39 Sparkline of topic views for 2 weeks
65 Correlation attack 37 Sparkline of topic views for 2 weeks
66 Differential fault analysis 36 Sparkline of topic views for 2 weeks
67 Integral cryptanalysis 35 Sparkline of topic views for 2 weeks
68 Piling-up lemma 33 Sparkline of topic views for 2 weeks
69 Interlock protocol 31 Sparkline of topic views for 2 weeks
70 Mod n cryptanalysis 30 Sparkline of topic views for 2 weeks
71 Truncated differential cryptanalysis 28 Sparkline of topic views for 2 weeks
72 Supply chain attack 28 Sparkline of topic views for 2 weeks
73 Attack model 27 Sparkline of topic views for 2 weeks
74 Montgomery curve 26 Sparkline of topic views for 2 weeks
75 Rotational cryptanalysis 26 Sparkline of topic views for 2 weeks
76 Edwards curve 25 Sparkline of topic views for 2 weeks
77 Decimalization table attack 25 Sparkline of topic views for 2 weeks
78 John Herivel 25 Sparkline of topic views for 2 weeks
79 Passive attack 22 Sparkline of topic views for 2 weeks
80 TWINKLE 22 Sparkline of topic views for 2 weeks
81 Military Cryptanalytics 22 Sparkline of topic views for 2 weeks
82 Turingery 21 Sparkline of topic views for 2 weeks
83 Hessian form of an elliptic curve 20 Sparkline of topic views for 2 weeks
84 Table of costs of operations in elliptic curves 19 Sparkline of topic views for 2 weeks
85 Gardening (cryptanalysis) 18 Sparkline of topic views for 2 weeks
86 Cryptanalytic computer 18 Sparkline of topic views for 2 weeks
87 Zendian Problem 18 Sparkline of topic views for 2 weeks
88 Cube attack 18 Sparkline of topic views for 2 weeks
89 Jacobian curve 14 Sparkline of topic views for 2 weeks
90 Twisted Hessian curves 13 Sparkline of topic views for 2 weeks
91 Davies' attack 12 Sparkline of topic views for 2 weeks
92 Twists of curves 12 Sparkline of topic views for 2 weeks
93 Twisted Edwards curve 12 Sparkline of topic views for 2 weeks
94 Distinguishing attack 10 Sparkline of topic views for 2 weeks
95 Sinkov statistic 9 Sparkline of topic views for 2 weeks
96 Differential-linear attack 8 Sparkline of topic views for 2 weeks
97 Higher-order differential cryptanalysis 8 Sparkline of topic views for 2 weeks
98 Differential equations of addition 8 Sparkline of topic views for 2 weeks
99 Contact analysis (cryptanalysis) 7 Sparkline of topic views for 2 weeks
100 Doubling-oriented Doche–Icart–Kohel curve 7 Sparkline of topic views for 2 weeks
101 Interpolation attack 6 Sparkline of topic views for 2 weeks
102 Tripling-oriented Doche–Icart–Kohel curve 6 Sparkline of topic views for 2 weeks
103 Message forgery less than 5 views
104 Small subgroup confinement attack less than 5 views
105 Partitioning cryptanalysis less than 5 views

Subcategories

Parent categories


Encyclopedia

From Wikipedia, the free encyclopedia

A cryptographic attack is a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme. This process is also called "cryptanalysis".

See also Category:Computer security exploits, Category:Malware.

Subcategories

This category has only the following subcategory.

P

Pages in category "Cryptographic attacks"

The following 93 pages are in this category, out of 93 total. This list may not reflect recent changes (learn more).

A

B

C

D

D cont.

F

G

H

I

J

K

L

M

P

R

S

T

W

X

Z








Got something to say? Make a comment.
Your name
Your email address
Message