cryptographic attack - definition. What is cryptographic attack
Diclib.com
قاموس ChatGPT
أدخل كلمة أو عبارة بأي لغة 👆
اللغة:

ترجمة وتحليل الكلمات عن طريق الذكاء الاصطناعي ChatGPT

في هذه الصفحة يمكنك الحصول على تحليل مفصل لكلمة أو عبارة باستخدام أفضل تقنيات الذكاء الاصطناعي المتوفرة اليوم:

  • كيف يتم استخدام الكلمة في اللغة
  • تردد الكلمة
  • ما إذا كانت الكلمة تستخدم في كثير من الأحيان في اللغة المنطوقة أو المكتوبة
  • خيارات الترجمة إلى الروسية أو الإسبانية، على التوالي
  • أمثلة على استخدام الكلمة (عدة عبارات مع الترجمة)
  • أصل الكلمة

%ما هو (من)٪ 1 - تعريف

STUDY OF ANALYZING INFORMATION SYSTEMS IN ORDER TO DISCOVER THEIR HIDDEN ASPECTS
CryptanalysiS; Cryptanalytic; Cryptoanalysis; Codebreaking; Cryptanalyst; Code-breaking; Cryptanalysts; Code breaker; Codebreakers; Cryptoanalyst; Statistical cryptanalysis; Code Breakers; Code breaking; Modern cryptanalysis; Cipher System Identification; Cryptanalytic attack; Cryptographic attack; Message indicator; Cryptanalyse; Codebreaker; Crypto analysis

one-way hash function         
SPECIAL CLASS OF HASH FUNCTION THAT HAS CERTAIN PROPERTIES WHICH MAKE IT SUITABLE FOR USE IN CRYPTOGRAPHY
Message digest; Cryptographic hash; Cryptographic message digest; One-way hash; Modification Detection Code; Cryptographic hash functions; Hash function (cryptography); One-way hash function; CRHF; Secure hash function; One way encryption; Numerical hash; Cryptograhic hash; Cryptographic hash value; Cryptographic Hash Function; Cryptographic one-way hash function; Message-digest; Message-digest algorithm; Sphincter hash; Terahash; Cryptographic hashing; Wide pipe; Wide pipe hash; Wide pipe design; Wide pipe construction; Wide-pipe; Widepipe; Narrowpipe; Narrow-pipe; Narrow pipe; Applications of cryptographic hash functions; Cryptographic hashes; Hash (cryptography)
<algorithm> (Or "message digest function") A {one-way function} which takes a variable-length message and produces a fixed-length hash. Given the hash it is computationally infeasible to find a message with that hash; in fact one can't determine any usable information about a message with that hash, not even a single bit. For some one-way hash functions it's also computationally impossible to determine two messages which produce the same hash. A one-way hash function can be private or public, just like an encryption function. MD5, SHA and Snefru are examples of public one-way hash functions. A public one-way hash function can be used to speed up a public-key digital signature system. Rather than sign a long message, which can take a long time, compute the one-way hash of the message, and sign the hash. {sci.crypt FAQ (ftp://src.doc.ic.ac.uk/usenet/usenet-by-group/sci.crypt/)}. (2001-05-10)
Attack aircraft         
  • Rebel infantry advancing under air attack by a [[Waco CSO]] (or [[Potez 25]]) airplane of the Brazilian government during the [[Constitutionalist Revolution of 1932]]
  • Boeing GA-1, ~1920
  • An [[A-1 Skyraider]] of the [[USAF]]
  • An [[Ilyushin Il-2]] ''Sturmovik'' formation over Berlin, May 1945.
  • left
  • OA-37B Dragonfly]] of the [[169th Airlift Squadron]]
  • [[RAF]] [[Harrier GR9]] in flight, 2008
  • An [[AH-64 Apache]] of the [[Royal Netherlands Air Force]]
  • Republic P-47N]] Thunderbolt, flew combat missions during [[WW II]]
AIRCRAFT CLASS DESIGNED FOR AIR-TO-SURFACE WARFARE
A- (plane); Attack plane; Strike aircraft; Tactical bombers; Trench fighter; Ground attack aircraft; Ground-Attack Aircraft; Attack Aircraft; Attack Aviation; Ground attack airplane; Maritime strike aircraft; Tank plinker; Light attack aircraft; Schlachtflugzeug; Ground-attack aircraft; Attack bomber; Maritime strike
An attack aircraft, strike aircraft, or attack bomber is a tactical military aircraft that has a primary role of carrying out airstrikes with greater precision than bombers, and is prepared to encounter strong low-level air defenses while pressing the attack.Mortensen 1987, pp.
HMAS Attack (P 90)         
  • Ship's badge
ATTACK-CLASS PATROL BOAT OF THE ROYAL AUSTRALIAN NAVY
HMAS Attack; KRI Sikuda
HMAS Attack (P 90) was the lead ship of the s used by the Royal Australian Navy (RAN). Launched in April 1967 and commissioned in November that year, the ship was largely commercial in design and was used to protect fisheries in Australia's northern waters, and to support the survey ship .

ويكيبيديا

Cryptanalysis

Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

In addition to mathematical analysis of cryptographic algorithms, cryptanalysis includes the study of side-channel attacks that do not target weaknesses in the cryptographic algorithms themselves, but instead exploit weaknesses in their implementation.

Even though the goal has been the same, the methods and techniques of cryptanalysis have changed drastically through the history of cryptography, adapting to increasing cryptographic complexity, ranging from the pen-and-paper methods of the past, through machines like the British Bombes and Colossus computers at Bletchley Park in World War II, to the mathematically advanced computerized schemes of the present. Methods for breaking modern cryptosystems often involve solving carefully constructed problems in pure mathematics, the best-known being integer factorization.