IBM Home
Products
Consulting
Industries
News
About IBM
IBM
:
developerWorks
:
Security
:
Education - online courses
Cryptanalysis
1. Weak-key attacks
2. Plain text considerations
3. Plain text considerations: Entropy
4. Plain text considerations: Rate-of-language
5. Plain text considerations: Unicity distance
6. Schematic of basic attacks
7. Schematic of basic attacks, part 2
8. Schematic of "exotic" attacks
9. Rubber-hose cryptanalysis
10. Other non-cryptanalytic attacks
11. Computational security
12. One-time pads
Privacy
Legal
Contact