spurious connection initialization - definition. What is spurious connection initialization
Diclib.com
قاموس ChatGPT
أدخل كلمة أو عبارة بأي لغة 👆
اللغة:

ترجمة وتحليل الكلمات عن طريق الذكاء الاصطناعي ChatGPT

في هذه الصفحة يمكنك الحصول على تحليل مفصل لكلمة أو عبارة باستخدام أفضل تقنيات الذكاء الاصطناعي المتوفرة اليوم:

  • كيف يتم استخدام الكلمة في اللغة
  • تردد الكلمة
  • ما إذا كانت الكلمة تستخدم في كثير من الأحيان في اللغة المنطوقة أو المكتوبة
  • خيارات الترجمة إلى الروسية أو الإسبانية، على التوالي
  • أمثلة على استخدام الكلمة (عدة عبارات مع الترجمة)
  • أصل الكلمة

%ما هو (من)٪ 1 - تعريف

AMOUNT OF CIPHERTEXT NEEDED TO UNAMBIGUOUSLY BREAK AN ENCRYPTION SYSTEM
Spurious key

Initialization (programming)         
ASSIGNMENT OF AN INITIAL VALUE FOR A DATA OBJECT OR VARIABLE
Initializer; Copy-initialization; Initialization (computing); Initializer list
In computer programming, initialization (or initialisation) is the assignment of an initial value for a data object or variable. The manner in which initialization is performed depends on the programming language, as well as the type, storage class, etc.
UEFI Platform Initialization         
TECHNICAL SPECIFICATION
Platform Initialization Specification; UEFI PI; EFI Platform Initialization; EFI PI; Platform Initialization
The Platform Initialization Specification (PI Specification) is a specification published by the Unified EFI Forum that describes the internal interfaces between different parts of computer platform firmware. This allows for more interoperability between firmware components from different sources.
Connection pool         
CACHE OF DATABASE CONNECTIONS MAINTAINED BY THE DATABASE
Connection pooling; Connection Pool
In software engineering, a connection pool is a cache of database connections maintained so that the connections can be reused when future requests to the database are required.

ويكيبيديا

Unicity distance

In cryptography, unicity distance is the length of an original ciphertext needed to break the cipher by reducing the number of possible spurious keys to zero in a brute force attack. That is, after trying every possible key, there should be just one decipherment that makes sense, i.e. expected amount of ciphertext needed to determine the key completely, assuming the underlying message has redundancy.

Claude Shannon defined the unicity distance in his 1949 paper "Communication Theory of Secrecy Systems".

Consider an attack on the ciphertext string "WNAIW" encrypted using a Vigenère cipher with a five letter key. Conceivably, this string could be deciphered into any other string—RIVER and WATER are both possibilities for certain keys. This is a general rule of cryptanalysis: with no additional information it is impossible to decode this message.

Of course, even in this case, only a certain number of five letter keys will result in English words. Trying all possible keys we will not only get RIVER and WATER, but SXOOS and KHDOP as well. The number of "working" keys will likely be very much smaller than the set of all possible keys. The problem is knowing which of these "working" keys is the right one; the rest are spurious.