theoretical attack


theoretical attack
теоретическая атака (крипто-аналитическая атака на шифр, которая хотя и приносит желаемый успех при наличии определенных условий, но тем не менее не реализуема на практике, поскольку в реальной жизни эти условия невозможно соблюсти)

English-Russian cryptological dictionary . 2014.

Смотреть что такое "theoretical attack" в других словарях:

  • Theoretical ecology — Mathematical models developed in theoretical ecology predict complex food webs are less stable than simple webs.[1]:75–77[2]:64 …   Wikipedia

  • Brute force attack — In cryptanalysis, a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example, possible keys in order to decrypt a message. In most schemes, the theoretical possibility of a brute… …   Wikipedia

  • Brute-force attack — The EFF s US$250,000 DES cracking machine contained over 1,800 custom chips and could brute force a DES key in a matter of days. The photograph shows a DES Cracker circuit board fitted with 32 Deep Crack chips and some control chips. In… …   Wikipedia

  • Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent …   Wikipedia

  • Sicilian, Dragon, Yugoslav attack, 9.Bc4 — Chess diagram|= tright = 8 |rd| |bd|qd| |rd|kd| |= 7 |pd|pd| | |pd|pd|bd|pd|= 6 | | |nd|pd| |nd|pd| |= 5 | | | | | | | | |= 4 | | |bl|nl|pl| | | |= 3 | | |nl| |bl|pl| | |= 2 |pl|pl|pl|ql| | |pl|pl|= 1 |rl| | | |kl| | |rl|= a b c d e f g h… …   Wikipedia

  • XSL attack — In cryptography, the XSL attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002 by researchers Nicolas Courtois and Josef Pieprzyk. It has caused some controversy as it was claimed to have the potential to… …   Wikipedia

  • Timing attack — In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. The attack exploits the fact that every operation in a computer …   Wikipedia

  • Side-channel attack — In cryptography, a side channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms (compare cryptanalysis). For example, timing… …   Wikipedia

  • Distinguishing attack — In cryptography, a distinguishing attack is any form of cryptanalysis where the attacker can extract some information from encrypted data sufficient to distinguish it from random data. This information might then reveal the encryption method used …   Wikipedia

  • Adaptive chosen-ciphertext attack — An adaptive chosen ciphertext attack (abbreviated as CCA2) is an interactive form of chosen ciphertext attack in which an attacker sends a number of ciphertexts to be decrypted, then uses the results of these decryptions to select subsequent… …   Wikipedia

  • effective angle of attack — That part of a given angle of attack that lies between the chord of an airfoil and a line representing the resultant velocity of the disturbed flow. This angle is measured on a finite wing, but it has the same effective magnitude as that of an… …   Aviation dictionary

Книги

Другие книги по запросу «theoretical attack» >>


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.