- all-key attack
- криптоанализ с перебором всех вариантов ключа
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Related-key attack — In cryptography, a related key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the… … Wikipedia
Key Biscayne — is an island located in Miami Dade County, Florida, United States, between the Atlantic Ocean and Biscayne Bay. It is the southernmost of the barrier islands along the Atlantic coast of Florida, and lies south of Miami Beach and southeast of… … Wikipedia
Attack on Pearl Harbor — Part of the Pacific Theater of World War II … Wikipedia
Attack tree — Attack trees are conceptual diagrams of threats on computer systems and possible attacks to reach those threats. The concept was suggested by Bruce Schneier] . Basic Attack trees are multi leveled diagrams consisting of one root, leaves, and… … Wikipedia
Key West — is an island in the Straits of Florida on the North American continent at the southernmost tip of the Florida Keys.Key West is politically within the limits of the city of Key West, Monroe County, Florida, United States. The city also occupies… … Wikipedia
Key deer — A male Key Deer on No Name Key in the Florida Keys Conservation status … Wikipedia
Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… … Wikipedia
Key to the Highway — Charlie Segar Veröffentlichung 1940 Länge 2:45 Genre(s) Blues Auszeichnung(en) Blues Hall of Fame … Deutsch Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Attack on the Sui-ho Dam — Infobox Military Conflict conflict=Attack on the Sui ho Dam partof=Korean War caption= date=June 23–June 24, 1952 place=Sui Ho (Sup ung ho), Choshin (Changjin, Fusen (Pujǒn), and Kyosen (P ungsan), North Korea result=United Nations victory… … Wikipedia
Key strengthening — In cryptography, key strengthening or key stretching refer to techniques used to make a possibly weak key, typically a password or passphrase, more secure against a brute force attack by increasing the time it takes to test each possible key.… … Wikipedia