precomputation attack

precomputation attack
  1. атака предварительным вычислением

 

атака предварительным вычислением
При такой атаке нападающий заранее рассчитывает таблицу значений, используемых для взлома шифра или пароля. См. также dictionary attack (атака по словарю). [Криптографический словарь Карэна Исагулиева - www.racal.ru]
[http://www.morepc.ru/dict/]

Тематики

  • информационные технологии в целом

EN

  • precomputation attack


Англо-русский словарь нормативно-технической терминологии. . 2015.

Игры ⚽ Поможем решить контрольную работу

Смотреть что такое "precomputation attack" в других словарях:

  • Cube attack — Cryptography portal The cube attack is a method of cryptanalysis applicable to a wide variety of symmetric key algorithms, published by Itai Dinur and Adi Shamir in a September 2008 preprint. A revised version of this preprint was placed online… …   Wikipedia

  • Dictionary attack — In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching likely possibilities. Contents 1 Technique 2 Pre… …   Wikipedia

  • атака предварительным вычислением — При такой атаке нападающий заранее рассчитывает таблицу значений, используемых для взлома шифра или пароля. См. также dictionary attack (атака по словарю). [Криптографический словарь Карэна Исагулиева www.racal.ru] [http://www.morepc.ru/dict/]… …   Справочник технического переводчика

  • Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… …   Wikipedia

  • Rainbow table — A rainbow table is a lookup table offering a time memory tradeoff used in recovering the plaintext password from a password hash generated by a hash function, often a cryptographic hash function. A common application is to make attacks against… …   Wikipedia

  • A5/1 — is a stream cipher used to provide over the air communication privacy in the GSM cellular telephone standard. It was initially kept secret, but became public knowledge through leaks and reverse engineering. A number of serious weaknesses in the… …   Wikipedia

  • MIFARE — is the NXP Semiconductors owned trademark of a series of chips widely used in contactless smart cards and proximity cards. According to the producers, billions of smart card chips and many millions of reader modules have been sold.[1] The… …   Wikipedia

  • E0 (cipher) — E0 is a stream cipher used in the Bluetooth protocol. It generates a sequence of pseudorandom numbers and combines it with the data using the XOR operator. The key length may vary, but is generally 128 bits. At each iteration, E0 generates a bit… …   Wikipedia

  • Disk encryption theory — Disk encryption is a special case of data at rest protection when the storage media is a sector addressable device (e.g., a hard disk). This article presents cryptographic aspects of the problem. For discussion of different software packages and… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»