CRYPTO ATTACKS

 

-THE ONE TIME PAD

-WHAT IS A SECURE CIPHER

-INFORMATION THEORITIC SECURITY

-HOW OTP IS MADE PRACTICAL

-BLOCK CIPHERS

-EXHAUSTIVE SEARCH

-EXHAUSTIVE KEY SEARCH

-DEEP CRACK

-ATTACK ON THE IMPLEMENTION

-HASHES, MACs