Black-bag cryptanalysis

Black-bag cryptanalysis

In cryptography, black-bag cryptanalysis is a euphemism for the acquisition of cryptographic secrets via burglary, or the covert installation of keystroke logging or trojan horse software/hardware on target computers or ancillary devices. Such methods are intended to capture highly sensitive information e.g. cryptographic keys, key-rings, passwords or unencrypted plaintext. Typically, the capture takes place without the victim(s) realising it has occurred. Black-bag cryptanalysis is in contrast to a mathematical or technical cryptanalytic attack. The term refers to the black bag of equipment that a burglar would carry or a Black Bag Operation.

As with rubber-hose cryptanalysis, this is technically not a form of cryptanalysis; the term is used sardonically. However, given the free availability of very high strength cryptographic systems, this type of attack is a much more serious threat to most users than mathematical attacks.

Popular culture

Black bag cryptanalysis is the underlying theme of video game "Tom Clancy's Splinter Cell" and its sequels.

ee also

* Social engineering (computer security)
* Rubber-hose cryptanalysis
* Black Bag Operation


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Black bag operation — Black bag operations (or black bag jobs ) are covert or clandestine surreptitious entries into structures to obtain information for human intelligence operations. This usually entails breaking and entering into denied areas. Some of the tactics,… …   Wikipedia

  • Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… …   Wikipedia

  • Rubber-hose cryptanalysis — In cryptography, rubber hose cryptanalysis is a euphemism for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion, in contrast to a mathematical or technical cryptanalytic attack. The term… …   Wikipedia

  • Pretty Good Privacy — Original author(s) Phil Zimmermann Developer(s) Phil Zimmermann Initial release In 1991 Written in Multi language …   Wikipedia

  • Keystroke logging — (often called keylogging) is a method of capturing and recording user keystrokes. The technique and name came from before the era of the graphical user interface; loggers nowadays would expect to capture mouse operations too. Keylogging can be… …   Wikipedia

  • TrueCrypt — infobox software caption = TrueCrypt on Windows Vista developer = TrueCrypt Foundation latest release version = 6.0a latest release date = release date|2008|7|8 programming language = C, C++, Assembly operating system = Cross platform language =… …   Wikipedia

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Outline of cryptography — See also: Index of cryptography articles The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the… …   Wikipedia

  • Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… …   Wikipedia

  • Espionage — Spy and Secret agent redirect here. For other uses, see Spy (disambiguation) and Secret agent (disambiguation). For other uses, see Espionage (disambiguation). Espionage or spying involves an individual obtaining information that is considered… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”