cryptanalytic break

cryptanalytic break
Безопасность: раскрытие шифра криптоаналитическими методами, успешный криптоанализ

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Нужно решить контрольную?

Смотреть что такое "cryptanalytic break" в других словарях:

  • Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… …   Wikipedia

  • Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… …   Wikipedia

  • Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis …   Wikipedia

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Elizebeth Friedman — The following article is taken from the Hall of Honor from the National Cryptologic Museum [http://www.nsa.gov/honor/honor00005.cfm] :Elizebeth Smith Friedman (1892 ndash;31 October, 1980) was cryptanalyst and author, and a pioneer in U.S.… …   Wikipedia

  • Pearl Harbor advance-knowledge debate — The Pearl Harbor advance knowledge debate is a dispute over what, if any, advance knowledge American officials had of Japan s December 7, 1941 attack on Pearl Harbor.Ever since the Japanese attack there has been debate as to how and why the… …   Wikipedia

  • History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… …   Wikipedia

  • Colossus computer — Colossus MkI/MkII A Colossus Mark 2 computer. The operator on the left is Dorothy Duboisson. The slanted control panel on the left was used to set the pin patterns on the Lorenz. The bedstead paper tape transport is on the right. Developer Tommy… …   Wikipedia

  • SHA hash functions — The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. The five algorithms …   Wikipedia

  • Joseph Rochefort — Infobox Military Person name=Joseph John Rochefort born= 1898 died= death year and age|1976|1898 placeofbirth= placeofdeath= caption=Joseph J. Rochefort nickname= allegiance= United States of America branch= United States Navy serviceyears=1918… …   Wikipedia

  • One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»