"Michael H. Warfield" wrote: > ... if you have a known plaintext > situation, you have a condition for a "meet in the middle" attack where > you attack the crypto system from both ends, encrypting the plaintext > with K2 and decrypting with K1 searching for matching results in the > middle. Bruce Schneier covers this attack in "Applied Cryptography" > ... One online explanation is: http://www.freeswan.org/freeswan_trees/freeswan-1.91/doc/glossary.html#meet For others, follow the "other crypto glossaries" links at the top of that file. Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/