-
1 try-all-possible-keys cryptanalysis
криптоанализ методом перебора всех возможных вариантов ключа.English-Russian cryptological dictionary > try-all-possible-keys cryptanalysis
-
2 криптоанализ методом перебора всех возможных вариантов ключа
Русско-английский словарь нормативно-технической терминологии > криптоанализ методом перебора всех возможных вариантов ключа
-
3 переборный криптоанализ
Универсальный русско-английский словарь > переборный криптоанализ
-
4 криптоанализ методом перебора всех возможных вариантов ключа
Универсальный русско-английский словарь > криптоанализ методом перебора всех возможных вариантов ключа
См. также в других словарях:
криптоанализ методом перебора всех возможных вариантов ключа — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=4887] Тематики защита информации EN try all possible keys cryptanalysis … Справочник технического переводчика
Brute-force attack — The EFF s US$250,000 DES cracking machine contained over 1,800 custom chips and could brute force a DES key in a matter of days. The photograph shows a DES Cracker circuit board fitted with 32 Deep Crack chips and some control chips. In… … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Enigma machine — Military Enigma machine … Wikipedia
Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… … Wikipedia
Advanced Encryption Standard — Infobox block cipher name = AES caption = The SubBytes step, one of four stages in a round of AES designers = Vincent Rijmen, Joan Daemen publish date = 1998 derived from = Square derived to = Anubis, Grand Cru related to = certification = AES… … Wikipedia
Common Scrambling Algorithm — The Common Scrambling Algorithm (or CSA) is the encryption algorithm used in the DVB digital television broadcasting for encrypting video streams. CSA was specified by ETSI and adopted by the DVB consortium in May 1994. Contents 1 History 2… … Wikipedia
Diffie–Hellman key exchange — (D–H)[nb 1] is a specific method of exchanging keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge … Wikipedia
Reverse engineering — is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation. It often involves taking something (e.g., a mechanical device, electronic component, software… … Wikipedia
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium