-
1 cipher (search) attack
Безопасность: атака на шифр, попытка (злоумышленника) раскрыть шифрУниверсальный англо-русский словарь > cipher (search) attack
-
2 cipher search attack
Англо-русский словарь по компьютерной безопасности > cipher search attack
-
3 attack
1) нападение; атака, реализация угрозы2) действие нарушителя по перехвату информации; злонамеренное (воз) действие3) криптоанализ; метод криптоанализа (см. тж. cryptanalysis) -
4 cipher attack
-
5 unit
организационная единица; боевая единица (напр. корабль, ЛА танк); подразделение; часть; соединение; расчетно-снабженческая единица; секция; орган; элемент; комплект; агрегат; установка; см. тж. elementbulk petrol (transport) unit — Бр. часть [подразделение] подвоза наливного (бестарного) горючего
counter C3 unit — часть [подразделение] подавления системы оперативного управления и связи
Fleet Marine (Corps) reconnaissance unit — разведывательное подразделение [часть] флотских сил МП
multisensor (AA) firing unit 3PK — с приборным комплексом из нескольких систем обнаружения и сопровождения
photo (graphic) reconnaissance unit — фоторазведывательная часть [подразделение]
surface-launched unit, fuel air explosive — установка дистанционного разминирования объемным взрывом
surface-launched unit, mine — установка дистанционного минирования
tactical (air) control unit — часть [подразделение] управления ТА
war (time) strength (TOE) unit — часть, укомплектованная по штатам военного времени
— air unit— ASA unit— BM unit— border operation unit— car unit— depot support unit— dry unit— EW unit— GM unit— host country unit— HQ unit— logistics support unit— manpack radio unit— marksmanship training unit— mechanized infantry unit— missile-armed unit— nuclear weapon unit— provisional unit— QM unit— Rangers unit— supported unit— TOE unit— transportation unit— truck transport unit— van unit— wet unit* * *1) часть; 2) единица
См. также в других словарях:
Cipher — For other uses, see Cipher (disambiguation). Edward Larsson s rune cipher resembling that found on the Kensington Runestone. Also includes runically unrelated blackletter writing style and pigpen cipher. In cryptography, a cipher (or cypher) is… … Wikipedia
Boomerang attack — In cryptography, the boomerang attack is a method for the cryptanalysis of block ciphers based on differential cryptanalysis. The attack was published in 1999 by David Wagner, who used it to break the COCONUT98 cipher.The boomerang attack has… … Wikipedia
DFC (cipher) — This article is about the block cipher. For other uses, see DFC (disambiguation). DFC General Designers Jacques Stern, Serge Vaudenay, et al. First published 1998 Related to COCONUT98 Cipher detail … Wikipedia
Churning (cipher) — Churning is an encryption function used to scramble downstream user data of the ATM passive optical network system defined by the ITU G.983.1 standard. The standard states that churning offers a low level of protection for data confidentiality .… … Wikipedia
Correlation attack — In cryptography, correlation attacks are a class of known plaintext attacks for breaking stream ciphers whose keystream is generated by combining the output of several linear feedback shift registers (called LFSRs for the rest of this article)… … Wikipedia
Slide attack — The slide attack is a form of cryptanalysis designed to deal with the prevailing idea that even weak ciphers can become very strong by increasing the number of rounds, which can ward off a differential attack. The slide attack works in such a way … Wikipedia
XSL attack — In cryptography, the XSL attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002 by researchers Nicolas Courtois and Josef Pieprzyk. It has caused some controversy as it was claimed to have the potential to… … Wikipedia
Blowfish (cipher) — Infobox block cipher name = Blowfish caption = The round function (Feistel function) of Blowfish designers = Bruce Schneier publish date = 1993 derived from = derived to = Twofish key size = 32 448 bits in steps of 8 bits; default 128 bits block… … Wikipedia
Brute force attack — In cryptanalysis, a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example, possible keys in order to decrypt a message. In most schemes, the theoretical possibility of a brute… … Wikipedia
Meet-in-the-middle attack — Not to be confused with man in the middle attack. The meet in the middle attack is a cryptographic attack which, like the birthday attack, makes use of a space time tradeoff. While the birthday attack attempts to find two values in the domain of… … Wikipedia
Grain (cipher) — Grain is a stream cipher submitted to eSTREAM in 2004 by Martin Hell, Thomas Johansson and Willi Meier. It has been selected for the final eSTREAM portfolio for Profile 2 by the eSTREAM project. Grain is designed primarily for restricted hardware … Wikipedia