Re: (AES) loopback crypto questions

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



"Michael H. Warfield" wrote:

> ... if you have a known plaintext
> situation, you have a condition for a "meet in the middle" attack where
> you attack the crypto system from both ends, encrypting the plaintext
> with K2 and decrypting with K1 searching for matching results in the
> middle.  Bruce Schneier covers this attack in "Applied Cryptography"
> ...

One online explanation is:
http://www.freeswan.org/freeswan_trees/freeswan-1.91/doc/glossary.html#meet

For others, follow the "other crypto glossaries" links at the top of that
file.

Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux