• Thumbnail for Cryptanalytic computer
    A cryptanalytic computer is a computer designed to be used for cryptanalysis, which nowadays involves massive statistical analysis and multiple trial decryptions...
    2 KB (197 words) - 09:46, 28 May 2025
  • Thumbnail for Cryptanalysis
    Cryptanalysis (redirect from Cryptanalytic)
    attack. Cryptographic attacks can be characterized in a number of ways: Cryptanalytical attacks can be classified based on what type of information the attacker...
    44 KB (5,215 words) - 21:55, 19 June 2025
  • Thumbnail for IBM 7950 Harvest
    declined to re-implement the architecture in a more modern technology. Cryptanalytic computer IBM (May 1, 1957). Preliminary Manual, Harvest System (PDF). IBM...
    8 KB (954 words) - 02:53, 1 May 2025
  • Thumbnail for Colossus computer
    designed for a range of cryptanalytic tasks, most involving counting the results of evaluating Boolean algorithms. A Colossus computer was thus not a fully...
    66 KB (7,190 words) - 09:10, 11 May 2025
  • Thumbnail for Cryptography
    originated among the Arabs, the first people to systematically document cryptanalytic methods. Al-Khalil (717–786) wrote the Book of Cryptographic Messages...
    100 KB (11,007 words) - 01:11, 20 June 2025
  • Thumbnail for List of IBM products
    Energy and the National Nuclear Security Administration IBM 7950: Cryptanalytic computer using 7030 as CPU; 1962 (Harvest) IBM 7951: IBM 7950 Stream coprocessor...
    189 KB (19,566 words) - 19:34, 30 May 2025
  • Thumbnail for FROSTBURG
    FROSTBURG (category Cryptanalytic devices)
    FROSTBURG is now on display at the National Cryptologic Museum. HARVEST Cryptanalytic computer "Ten of the coolest and most powerful supercomputers of all time"...
    2 KB (218 words) - 03:53, 17 April 2025
  • Cryptanalysis of the Enigma • Cryptanalysis of the Lorenz cipher • Cryptanalytic computer • Cryptex • Cryptico • Crypto AG • Crypto-anarchism • Crypto API...
    67 KB (2,932 words) - 23:20, 16 May 2025
  • Thumbnail for Data Encryption Standard
    Data Encryption Standard (category Computer-related introductions in 1977)
    According to Steven Levy, IBM Watson researchers discovered differential cryptanalytic attacks in 1974 and were asked by the NSA to keep the technique secret...
    60 KB (6,717 words) - 17:36, 25 May 2025
  • HEC 1 computer.htm". Our Computer Heritage. Computer Conservation Society. 2 April 2012. Archived from the original on 2 April 2012. "Computer Conservation...
    6 KB (635 words) - 01:14, 26 December 2024
  • Colossus computer vacuum tube cryptanalytic supercomputer, 1943 1×106: computing power of the Motorola 68000 commercial computer introduced in 1979.[citation...
    16 KB (1,497 words) - 17:37, 11 June 2025
  • Thumbnail for Bombe
    Bombe (category Cryptanalytic devices)
    February 1945), "Appendix II: U. S. Army Cryptanalytic Bombe", Solving the Enigma: History of the Cryptanalytic Bombe, a NSA phamphlet, archived from the...
    67 KB (7,962 words) - 17:24, 30 May 2025
  • Thumbnail for Hardware security module
    Hardware security module (category Cryptanalytic devices)
    form of a plug-in card or an external device that attaches directly to a computer or network server. A hardware security module contains one or more secure...
    14 KB (1,557 words) - 08:50, 19 May 2025
  • method of mathematical proof Brute-force attack, a cryptanalytic attack Brute-force search, a computer problem-solving technique Brute Force (musician)...
    1 KB (211 words) - 06:46, 9 March 2023
  • mechanism (KEM) designed to be resistant to cryptanalytic attacks with future powerful quantum computers. It is used to establish a shared secret between...
    15 KB (1,472 words) - 11:17, 9 June 2025
  • algorithms) that are currently thought to be secure against a cryptanalytic attack by a quantum computer. Most widely-used public-key algorithms rely on the difficulty...
    63 KB (6,418 words) - 00:46, 20 June 2025
  • Thumbnail for Alan Turing
    Alan Turing (category Computer chess people)
    violating the Act. Specifying the bombe was the first of five major cryptanalytical advances that Turing made during the war. The others were: deducing...
    148 KB (15,067 words) - 23:28, 20 June 2025
  • the industry has a considerably more advanced understanding of the cryptanalytic strength of common symmetric-key and public-key algorithms, these challenges...
    15 KB (853 words) - 21:19, 4 May 2025
  • hardware projects Bouncy Castle CrypTool - illustrates cryptographic and cryptanalytic concepts Britannica Encarta Encyclopædia Britannica Ultimate Reference...
    15 KB (576 words) - 13:41, 10 June 2025
  • Thumbnail for Symmetric-key algorithm
    generators or in their initialization vectors is disastrous and has led to cryptanalytic breaks in the past. Therefore, it is essential that an implementation...
    15 KB (1,540 words) - 21:14, 19 June 2025
  • and nondeterministic space complexity Hellman, Martin (July 1980). "A Cryptanalytic Time-Memory Tradeoff". IEEE Transactions on Information Theory. 26 (4):...
    6 KB (748 words) - 18:42, 7 June 2025
  • Thumbnail for Digital Millennium Copyright Act
    cryptography research community, since an argument can be made that any cryptanalytic research violates, or might violate, the DMCA. The arrest of Russian...
    114 KB (12,572 words) - 06:02, 5 June 2025
  • Banburismus was a cryptanalytic process developed by Alan Turing at Bletchley Park in Britain during the Second World War. It was used by Bletchley Park's...
    22 KB (2,803 words) - 02:50, 10 April 2024
  • the industry has a considerably more advanced understanding of the cryptanalytic strength of common symmetric-key and public-key algorithms, these challenges...
    63 KB (4,177 words) - 03:42, 30 May 2025
  • effort began the tradition of using the words "squeamish ossifrage" in cryptanalytic challenges. The difficulty of breaking the RSA cipher—recovering a plaintext...
    7 KB (727 words) - 16:20, 18 June 2025
  • In cryptography, a brute-force attack or exhaustive key search is a cryptanalytic attack that consists of an attacker submitting many possible keys or...
    21 KB (2,168 words) - 17:09, 27 May 2025
  • isogeny graph and was designed to resist cryptanalytic attack by an adversary in possession of a quantum computer. Before it was broken, SIDH boasted one...
    25 KB (3,674 words) - 07:36, 17 May 2025
  • Thumbnail for National Security Agency
    in 1919. The Black Chamber was the United States' first peacetime cryptanalytic organization. Jointly funded by the Army and the State Department, the...
    260 KB (24,829 words) - 20:14, 12 June 2025
  • Thumbnail for Eli Biham
    Eli Biham (category Israeli computer scientists)
    family of fast stream ciphers (see article for more detail on their cryptanalytic status). SHAvite-3 (with Orr Dunkelman), a hash function which was one...
    4 KB (319 words) - 11:00, 3 April 2025
  • In cryptography, rotational cryptanalysis is a generic cryptanalytic attack against algorithms that rely on three operations: modular addition, rotation...
    3 KB (315 words) - 05:31, 19 February 2025