Skip to main content
IBM 
ShopSupportDownloads
IBM HomeProductsConsultingIndustriesNewsAbout IBM
IBM : developerWorks : Security : Education - online courses
Introduction to cryptology: Pt. 1
Download tutorial zip fileView letter-sized PDF fileView A4-sized PDF fileE-mail this tutorial to a friend
Main menuGive feedback on this tutorialNext
  
Cryptanalysis
 1. Weak-key attacks
 2. Plain text considerations
 3. Plain text considerations: Entropy
 4. Plain text considerations: Rate-of-language
 5. Plain text considerations: Unicity distance
 6. Schematic of basic attacks
 7. Schematic of basic attacks, part 2
 8. Schematic of "exotic" attacks
 9. Rubber-hose cryptanalysis
 10. Other non-cryptanalytic attacks
 11. Computational security
 12. One-time pads
PrivacyLegalContact