-
1 computer cryptanalysis
машинный криптоанализ (криптоанализ с использованием компьютера)English-Russian cryptological dictionary > computer cryptanalysis
-
2 computer-aided cryptanalysis
English-Russian cryptological dictionary > computer-aided cryptanalysis
-
3 computer-backed cryptanalysis
English-Russian cryptological dictionary > computer-backed cryptanalysis
-
4 computer-performing cryptanalysis
English-Russian cryptological dictionary > computer-performing cryptanalysis
-
5 computer-assisted cryp-tanalysis
English-Russian cryptological dictionary > computer-assisted cryp-tanalysis
-
6 машинный криптоанализ
машинный криптоанализ
Криптоанализ с использованием компьютера.
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > машинный криптоанализ
-
7 машинный криптоанализ
Универсальный русско-английский словарь > машинный криптоанализ
-
8 компьютерный криптоанализ
Универсальный русско-английский словарь > компьютерный криптоанализ
-
9 криптоанализ с использованием компьютеров
Универсальный русско-английский словарь > криптоанализ с использованием компьютеров
См. также в других словарях:
Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… … Wikipedia
Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… … Wikipedia
Cryptanalysis of the Lorenz cipher — The Lorenz SZ machines had 12 wheels each with a different number of cams (or pins). Wheel number 1 2 3 4 5 6 7 … Wikipedia
Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Computer forensics — Forensic science Physiological sciences … Wikipedia
Colossus computer — Colossus MkI/MkII A Colossus Mark 2 computer. The operator on the left is Dorothy Duboisson. The slanted control panel on the left was used to set the pin patterns on the Lorenz. The bedstead paper tape transport is on the right. Developer Tommy… … Wikipedia
Differential cryptanalysis — is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in an input can affect the resultant difference at… … Wikipedia
Integral cryptanalysis — In cryptography, integral cryptanalysis is a cryptanalytic attack that is particularly applicable to block ciphers based on substitution permutation networks. It was originally designed by Lars Knudsen as a dedicated attack against Square, so is… … Wikipedia
Cryptanalytic computer — ATLAS Cryptanalytic computers are computers designed to be used for cryptanalysis. Modern cryptanalysis involves massive statistical analysis and multiple trial decryptions. These are possible only with automated equipment. This has been true… … Wikipedia
Black-bag cryptanalysis — In cryptography, black bag cryptanalysis is a euphemism for the acquisition of cryptographic secrets via burglary, or the covert installation of keystroke logging or trojan horse software/hardware on target computers or ancillary devices. Such… … Wikipedia
Rubber-hose cryptanalysis — In cryptography, rubber hose cryptanalysis is a euphemism for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion, in contrast to a mathematical or technical cryptanalytic attack. The term… … Wikipedia