home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!ames!sun-barr!cs.utexas.edu!csc.ti.com!tilde.csc.ti.com!fstop.csc.ti.com!usenet
- From: jdailey@dadd.ti.com (Jim Dailey)
- Subject: Attack Methods
- Message-ID: <1992Nov11.213535.17788@csc.ti.com>
- Followup-To: sci.crypt
- Sender: usenet@csc.ti.com
- Nntp-Posting-Host: iccl1.asic.sc.ti.com
- Reply-To: jdailey@dadd.ti.com
- Organization: Design Automaton Div., Texas Instruments, Inc.
- Date: Wed, 11 Nov 1992 21:35:35 GMT
- Lines: 13
-
- In article 3997@randvax.rand.org, jim@rand.org (Jim Gillogly) writes:
- >
- >And another word of advice: don't try constructing new ciphers for some
- >niche unless you have practical experience in breaking them. There's no
- >way you will anticipate the kinds of attacks that are available without
- >starting from the cryptanalysis end.
-
- So what are some of the methods used to attack an encrypted text, when the
- encryption method is unknown?
-
- Jim jdailey@dadd.ti.com
- TI pays absolutely no attention to me or my opinions; therefore,
- the foregoing posting cannot possibly represent TI's viewpoint.
-