-
1 атака предварительным вычислением
атака предварительным вычислением
При такой атаке нападающий заранее рассчитывает таблицу значений, используемых для взлома шифра или пароля. См. также dictionary attack (атака по словарю). [Криптографический словарь Карэна Исагулиева - www.racal.ru]
[ http://www.morepc.ru/dict/]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > атака предварительным вычислением
См. также в других словарях:
Cube attack — Cryptography portal The cube attack is a method of cryptanalysis applicable to a wide variety of symmetric key algorithms, published by Itai Dinur and Adi Shamir in a September 2008 preprint. A revised version of this preprint was placed online… … Wikipedia
Dictionary attack — In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching likely possibilities. Contents 1 Technique 2 Pre… … Wikipedia
атака предварительным вычислением — При такой атаке нападающий заранее рассчитывает таблицу значений, используемых для взлома шифра или пароля. См. также dictionary attack (атака по словарю). [Криптографический словарь Карэна Исагулиева www.racal.ru] [http://www.morepc.ru/dict/]… … Справочник технического переводчика
Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… … Wikipedia
Rainbow table — A rainbow table is a lookup table offering a time memory tradeoff used in recovering the plaintext password from a password hash generated by a hash function, often a cryptographic hash function. A common application is to make attacks against… … Wikipedia
A5/1 — is a stream cipher used to provide over the air communication privacy in the GSM cellular telephone standard. It was initially kept secret, but became public knowledge through leaks and reverse engineering. A number of serious weaknesses in the… … Wikipedia
MIFARE — is the NXP Semiconductors owned trademark of a series of chips widely used in contactless smart cards and proximity cards. According to the producers, billions of smart card chips and many millions of reader modules have been sold.[1] The… … Wikipedia
E0 (cipher) — E0 is a stream cipher used in the Bluetooth protocol. It generates a sequence of pseudorandom numbers and combines it with the data using the XOR operator. The key length may vary, but is generally 128 bits. At each iteration, E0 generates a bit… … Wikipedia
Disk encryption theory — Disk encryption is a special case of data at rest protection when the storage media is a sector addressable device (e.g., a hard disk). This article presents cryptographic aspects of the problem. For discussion of different software packages and… … Wikipedia