all-key attack


all-key attack
атака с перебором всех возможных вариантов ключа.

English-Russian cryptological dictionary . 2014.

Смотреть что такое "all-key attack" в других словарях:

  • Related-key attack — In cryptography, a related key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the… …   Wikipedia

  • Key Biscayne — is an island located in Miami Dade County, Florida, United States, between the Atlantic Ocean and Biscayne Bay. It is the southernmost of the barrier islands along the Atlantic coast of Florida, and lies south of Miami Beach and southeast of… …   Wikipedia

  • Attack on Pearl Harbor — Part of the Pacific Theater of World War II …   Wikipedia

  • Attack tree — Attack trees are conceptual diagrams of threats on computer systems and possible attacks to reach those threats. The concept was suggested by Bruce Schneier] . Basic Attack trees are multi leveled diagrams consisting of one root, leaves, and… …   Wikipedia

  • Key West — is an island in the Straits of Florida on the North American continent at the southernmost tip of the Florida Keys.Key West is politically within the limits of the city of Key West, Monroe County, Florida, United States. The city also occupies… …   Wikipedia

  • Key deer — A male Key Deer on No Name Key in the Florida Keys Conservation status …   Wikipedia

  • Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… …   Wikipedia

  • Key to the Highway — Charlie Segar Veröffentlichung 1940 Länge 2:45 Genre(s) Blues Auszeichnung(en) Blues Hall of Fame …   Deutsch Wikipedia

  • Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… …   Wikipedia

  • Attack on the Sui-ho Dam — Infobox Military Conflict conflict=Attack on the Sui ho Dam partof=Korean War caption= date=June 23–June 24, 1952 place=Sui Ho (Sup ung ho), Choshin (Changjin, Fusen (Pujǒn), and Kyosen (P ungsan), North Korea result=United Nations victory… …   Wikipedia

  • Key strengthening — In cryptography, key strengthening or key stretching refer to techniques used to make a possibly weak key, typically a password or passphrase, more secure against a brute force attack by increasing the time it takes to test each possible key.… …   Wikipedia

Книги

Другие книги по запросу «all-key attack» >>


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.