-
1 exhaustive cryptanalysis
переборные [неалгоритмический] криптоанализEnglish-Russian cryptological dictionary > exhaustive cryptanalysis
-
2 exhaustive key determination
English-Russian cryptological dictionary > exhaustive key determination
-
3 переборный (неалгоритмический) криптоанализ
переборный (неалгоритмический) криптоанализ
—
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > переборный (неалгоритмический) криптоанализ
-
4 переборный криптоанализ
Универсальный русско-английский словарь > переборный криптоанализ
-
5 криптоанализ с перебором всех возможных вариантов решений
Универсальный русско-английский словарь > криптоанализ с перебором всех возможных вариантов решений
См. также в других словарях:
Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… … Wikipedia
Differential cryptanalysis — is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in an input can affect the resultant difference at… … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Meet-in-the-middle attack — Not to be confused with man in the middle attack. The meet in the middle attack is a cryptographic attack which, like the birthday attack, makes use of a space time tradeoff. While the birthday attack attempts to find two values in the domain of… … Wikipedia
Brute-force attack — The EFF s US$250,000 DES cracking machine contained over 1,800 custom chips and could brute force a DES key in a matter of days. The photograph shows a DES Cracker circuit board fitted with 32 Deep Crack chips and some control chips. In… … Wikipedia
Brute force attack — In cryptanalysis, a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example, possible keys in order to decrypt a message. In most schemes, the theoretical possibility of a brute… … Wikipedia
Martin Hellman — Martin E. Hellman (* 2. Oktober 1945 in New York City) ist ein US amerikanischer Kryptologe, bekannt als einer der Entdecker der Public Key Kryptographie. Inhaltsverzeichnis … Deutsch Wikipedia
Ataque Meet-in-the-middle — Saltar a navegación, búsqueda El ataque por encuentro a medio camino o meet in the middle es un ataque similar al ataque de cumpleaños, que utiliza un compromiso entre tiempo y espacio. Mientras que el ataque de cumpleaños trata de encontrar dos… … Wikipedia Español
переборный (неалгоритмический) криптоанализ — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации EN exhaustive cryptanalysis … Справочник технического переводчика
XSL attack — In cryptography, the XSL attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002 by researchers Nicolas Courtois and Josef Pieprzyk. It has caused some controversy as it was claimed to have the potential to… … Wikipedia
Topics in cryptography — This article is intended to be an analytic glossary , or alternatively, an organized collection of annotated pointers.Classical ciphers*Autokey cipher *Permutation cipher*Polyalphabetic substitution **Vigenère cipher*Polygraphic substitution… … Wikipedia