-
1 MITM attack
-
2 MITM attack
The New English-Russian Dictionary of Radio-electronics > MITM attack
-
3 attack
1) (агрессивное) (воз)действие среды || оказывать (агрессивное) действие ( о среде)2) коррозия || вызывать коррозию3) бомбардировка (напр. ионная) бомбардировать (напр. ионами)4) вчт атака (1. внезапные согласованные действия группы лиц с целью несанкционированного проникновения в защищённую систему или сеть 2. попытка злоумышленника нарушить нормальный ход информационного процесса 3. начало музыкальной фразы 4. манера исполнения начала музыкальной фразы) || атаковать•- adaptive chosen plaintext attack
- algebraic attack
- birthday attack
- brute force attack
- chemical attack
- chosen key attack
- chosen plaintext attack
- chosen text attack
- ciphertext only attack
- codebook attack
- correlation attack
- cryptoanalytic attack
- defined ciphertext attack
- deposit attack
- dictionary attack
- differential cryptoanalysis attack
- divide-and-conquer attack
- Einstein-Podolsky-Rosen attack
- electrolytic attack
- electronic attack
- EPR attack
- exhaustive key search attack
- fault analysis attack
- formal coding attack
- hacker attack
- hash attack
- key authentication attack
- key schedule attack
- known plaintext attack
- linear cryptoanalysis attack
- man-in-the-middle attack
- meet-in-the-middle attack
- MITM attack
- replay attack
- timing attack -
4 attack
1) (агрессивное) (воз)действие среды || оказывать (агрессивное) действие ( о среде)2) коррозия || вызывать коррозию3) бомбардировка (напр. ионная) бомбардировать (напр. ионами)4) вчт. атака (1. внезапные согласованные действия группы лиц с целью несанкционированного проникновения в защищённую систему или сеть 2. попытка злоумышленника нарушить нормальный ход информационного процесса 3. начало музыкальной фразы 4. манера исполнения начала музыкальной фразы) || атаковать•- adaptive chosen plaintext attack
- algebraic attack
- birthday attack
- brute force attack
- chemical attack
- chosen key attack
- chosen plaintext attack
- chosen text attack
- ciphertext only attack
- codebook attack
- correlation attack
- cryptoanalytic attack
- defined ciphertext attack
- deposit attack
- dictionary attack
- differential cryptoanalysis attack
- divide-and-conquer attack
- Einstein-Podolsky-Rosen attack
- electrolytic attack
- electronic attack
- EPR attack
- exhaustive key search attack
- fault analysis attack
- formal coding attack
- hacker attack
- hash attack
- key authentication attack
- key schedule attack
- known plaintext attack
- linear cryptoanalysis attack
- man-in-the-middle attack
- meet-in-the-middle attack
- MITM attack
- replay attack
- timing attackThe New English-Russian Dictionary of Radio-electronics > attack
-
5 MitM
English-German dictionary of Electrical Engineering and Electronics > MitM
-
6 MITM
= man-in-the-middle, = man-in-the-middle attackатака с-подставкой, атака методом перехвата сообщений и-подмены ключей -
7 MITM
сокр. от man-in-the-middle (attack)атака с подставкой, атака методом перехвата сообщений и подмены ключейThe New English-Russian Dictionary of Radio-electronics > MITM
-
8 man-in-the-middle attack
man-in-the-middle attack (MitM) Man-in-the-Middle-Angriff m (ein Angreifer kann die Kommunikation im Netz mithören und modifizieren)English-German dictionary of Electrical Engineering and Electronics > man-in-the-middle attack
См. также в других словарях:
MITM — Attaque de l homme du milieu L attaque de l homme du milieu (HDM) ou man in the middle attack (MITM) en cryptographie est une attaque qui a pour but d intercepter les communications entre deux parties, sans que ni l une ni l autre ne puisse se… … Wikipédia en Français
MITM — may refer to: Man in the middle attack, a computer networking attack method Meet in the middle attack, a cryptographic attack method Malcolm in the Middle, is an American comedy television series Man in the Mirror, is a song by Michael Jackson… … Wikipedia
Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent … Wikipedia
ZRTP — is a cryptographic key agreement protocol to negotiate the keys to encrypt VoIP phone calls. ZRTP describes a method of Diffie Hellman key agreement for Secure Real time Transport Protocol (SRTP). It was submitted to the IETF by Phil Zimmermann,… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
ArpON — ARP handler inspection Original author(s) Andrea Di Pasquale spikey Initial release July 24, 2008 Stable release 2.7 / July 27, 2011; 3 months ago … Wikipedia
Interlock protocol — The interlock protocol, as described by Ron Rivest and Adi Shamir, was designed to frustrate eavesdropper attack against two parties that use an anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an … Wikipedia
Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… … Wikipedia
Digest access authentication — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia
PGP word list — The PGP Word List (also called a biometric word list for reasons explained below) is a list of words for conveying data bytes in a clear unambiguous way via a voice channel. They are analogous in purpose to the NATO phonetic alphabet used by… … Wikipedia
Attaque De L'homme Du Milieu — L attaque de l homme du milieu (HDM) ou man in the middle attack (MITM) en cryptographie est une attaque qui a pour but d intercepter les communications entre deux parties, sans que ni l une ni l autre ne puisse se douter que le canal de… … Wikipédia en Français