No Results Found!
44 Related Articles

Cryptography

cryptographiccryptographercryptology
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving their goal (primarily privacy, integrity, and availability of data).
Cryptography or cryptology (from "hidden, secret"; and graphein, "to write", or -logia, "study", respectively ) is the practice and study of techniques for secure communication in the presence of third parties called adversaries.

Security parameter

The advantage is specified as a function of the security parameter.
Both the resource requirements of the cryptographic algorithm or protocol as well as the adversary's probability of breaking security are expressed in terms of the security parameter.

Computationally bounded adversary

computational boundednesscomputationally bounded
computationally bounded or unbounded (i.e. in terms of time and storage resources),
In the computationally bounded adversary model the channel – the adversary – is restricted to only being able to perform a reasonable amount of computation to decide which bits of the code word need to change.

Cryptosystem

cryptosystemscryptographic systemcrypto system
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving their goal (primarily privacy, integrity, and availability of data).

Spoofing attack

spoofingspoofedspoof
An adversary's efforts might take the form of attempting to discover secret data, corrupting some of the data in the system, spoofing the identity of a message sender or receiver, or forcing system downtime.

Computer security

cybersecuritysecuritycyber security
Not surprisingly, the former term predominates in the cryptographic and the latter in the computer security literature.

Alice and Bob

AliceBobEve
Eve, Mallory, Oscar and Trudy are all adversarial characters widely used in both types of texts.

Network security

securitynetworkhigh-security
mobile or non-mobile (e.g. in the context of network security)

Provable security

provably secureproven securesecurity reduction
In such a proof, the capabilities of the attacker are defined by an adversarial model (also referred to as attacker model): the aim of the proof is to show that the attacker must solve the underlying hard problem in order to break the security of the modelled system.

Replay attack

replay attacksFreshnessreplay
This is carried out either by the originator or by an adversary who intercepts the data and re-transmits it, possibly as part of a masquerade attack by IP packet substitution.

Noisy-storage model

It assumes that the quantum memory device of an attacker (adversary) trying to break the protocol is imperfect (noisy).

Secure multi-party computation

secure multiparty computationsecure computationmulti-party computing
Unlike traditional cryptographic tasks, where cryptography assures security and integrity of communication or storage and the adversary is outside the system of participants (an eavesdropper on the sender and receiver), the adversary in this model controls actual participants.

Disk encryption theory

XTSLRWdisk encryption
The first property requires defining an adversary from whom the data is being kept confidential.

Information-theoretic security

information-theoretically secureinformation theoretic securityperfect secrecy
Information-theoretic security is a cryptosystem whose security derives purely from information theory, so that the system cannot be broken even if the adversary has unlimited computing power.

Standard model (cryptography)

standard modelstandard model of cryptography
In cryptography the standard model is the model of computation in which the adversary is only limited by the amount of time and computational power available.

Advantage (cryptography)

advantagedistinguishers
Note that in this context, the "adversary" is itself an algorithm and not a person.

Chosen-plaintext attack

chosen plaintextchosen plaintext attackchosen plaintexts
In a chosen-plaintext attack the adversary can (possibly adaptively) ask for the ciphertexts of arbitrary plaintext messages.

Cryptographic hash function

cryptographic hashhashhashing
Informally, these properties mean that a malicious adversary cannot replace or modify the input data without changing its digest.

Integrated Encryption Scheme

DHAES
Integrated Encryption Scheme (IES) is a hybrid encryption scheme which provides semantic security against an adversary who is allowed to use chosen-plaintext and chosen-ciphertext attacks.

Concrete security

asymptoticasymptotic settingconcrete
In cryptography, concrete security or exact security is a practice-oriented approach that aims to give more precise estimates of the computational complexities of adversarial tasks than polynomial equivalence would allow.

Digital signature

digital signaturesdigitally signeddigitally sign
A digital signature scheme is secure if for every non-uniform probabilistic polynomial time adversary, A

Distributed key generation

The involvement of many parties requires Distributed key generation to ensure secrecy in the presence of malicious contributions to the key calculation.

Trojan.Win32.DNSChanger

It may therefore perform several actions of an attacker's choice on an compromised computer, such as changing the Domain Name Server (DNS) settings in order to divert traffic to unsolicited, and potentially illegal and/or malicious domains.

Attacker (disambiguation)

For the term attacker in computer security, see Hacker (computer security), Adversary (cryptography), and Adversary model.''