-
1 partially-known plaintext cryptanalysis
криптоанализ с использованием частично известного открытого текста
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > partially-known plaintext cryptanalysis
-
2 partially known plaintext cryptanalysis
Универсальный англо-русский словарь > partially known plaintext cryptanalysis
-
3 partially known plaintext cryptanalysis
криптоанализ с использованием частично известного открытого текста (с частично известным открытым текстом)Англо-русский словарь по компьютерной безопасности > partially known plaintext cryptanalysis
-
4 partially-known plaintext cryptanalysis
криптоанализ с использованием частично известного открытого текстаEnglish-Russian cryptological dictionary > partially-known plaintext cryptanalysis
-
5 cryptanalysis
криптоанализ; конкретное применение криптоанализа; анализ зашифрованного текста, дешифрованиеАнгло-русский словарь по компьютерной безопасности > cryptanalysis
-
6 криптоанализ с использованием частично известного открытого текста
криптоанализ с использованием частично известного открытого текста
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > криптоанализ с использованием частично известного открытого текста
-
7 криптоанализ с использованием частично известного открытого текста
Security: partially known plaintext cryptanalysisУниверсальный русско-английский словарь > криптоанализ с использованием частично известного открытого текста
-
8 криптоанализ с частично известным открытым текстом
Security: partially known plaintext cryptanalysisУниверсальный русско-английский словарь > криптоанализ с частично известным открытым текстом
См. также в других словарях:
криптоанализ с использованием частично известного открытого текста — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN partially known plaintext cryptanalysis … Справочник технического переводчика
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
XSL attack — In cryptography, the XSL attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002 by researchers Nicolas Courtois and Josef Pieprzyk. It has caused some controversy as it was claimed to have the potential to… … Wikipedia
Chosen-ciphertext attack — A chosen ciphertext attack (CCA) is an attack model for cryptanalysis in which the cryptanalyst gathers information, at least in part, by choosing a ciphertext and obtaining its decryption under an unknown key. In the attack, an adversary has a… … Wikipedia
One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit … Wikipedia
Venona project — The VENONA project was a long running secret collaboration of the United States and United Kingdom intelligence agencies involving cryptanalysis of messages sent by intelligence agencies of the Soviet Union, the majority during World War II.… … Wikipedia
Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… … Wikipedia
Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… … Wikipedia
Colossus computer — Colossus MkI/MkII A Colossus Mark 2 computer. The operator on the left is Dorothy Duboisson. The slanted control panel on the left was used to set the pin patterns on the Lorenz. The bedstead paper tape transport is on the right. Developer Tommy… … Wikipedia
One-way compression function — In cryptography, a one way compression function is a function that transforms two fixed length inputs to an output of the same size as one of the inputs. The transformation is one way , meaning that it is difficult given a particular output to… … Wikipedia