keyspace - definizione. Che cos'è keyspace
Diclib.com
Dizionario ChatGPT
Inserisci una parola o una frase in qualsiasi lingua 👆
Lingua:

Traduzione e analisi delle parole tramite l'intelligenza artificiale ChatGPT

In questa pagina puoi ottenere un'analisi dettagliata di una parola o frase, prodotta utilizzando la migliore tecnologia di intelligenza artificiale fino ad oggi:

  • come viene usata la parola
  • frequenza di utilizzo
  • è usato più spesso nel discorso orale o scritto
  • opzioni di traduzione delle parole
  • esempi di utilizzo (varie frasi con traduzione)
  • etimologia

Cosa (chi) è keyspace - definizione

Flat key space; Flat keyspace; Linear keyspace; Linear key space

Weak key         
In cryptography, a weak key is a key, which, used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually represent a very small fraction of the overall keyspace, which usually means that, if one generates a random key to encrypt a message, weak keys are very unlikely to give rise to a security problem.
RC4         
STREAM CIPHER
RC4 Cipher; ARCFOUR; RC4 cipher; RC4 (cipher); Arcfour; Rc4; ARC4; RC4 decryption algorithm; Spritz (cipher); RC4 Keyspace; Arc4random; Key-scheduling algorithm
Rivest Cipher / Ron#&39;s Code 4 (Reference: cryptography)
RC4         
STREAM CIPHER
RC4 Cipher; ARCFOUR; RC4 cipher; RC4 (cipher); Arcfour; Rc4; ARC4; RC4 decryption algorithm; Spritz (cipher); RC4 Keyspace; Arc4random; Key-scheduling algorithm
<cryptography> A cipher designed by {RSA Data Security, Inc.} which can accept keys of arbitrary length, and is essentially a pseudo random number generator with the output of the generator being XORed with the data stream to produce the encrypted data. For this reason, it is very important that the same RC4 key never be used to encrypt two different data streams. The encryption mechanism used to be a trade secret, until someone posted source code for an algorithm onto Usenet News, claiming it to be equivalent to RC4. The algorithm is very fast, its security is unknown, but breaking it does not seem trivial either. There is very strong evidence that the posted algorithm is indeed equivalent to RC4. The United States government routinely approves RC4 with 40-bit keys for export. Keys this small can be easily broken by governments, criminals, and amateurs. The exportable version of Netscape's Secure Socket Layer, which uses RC4-40, was broken by at least two independent groups. Breaking it took about eight days; in many universities or companies the same computing power is available to any computer science student. See also {Damien Doligez's SSL cracking page (http://pauillac.inria.fr/RC4doligez/ssl/)}, {RC4 Source and Information (http://cs.hut.fi/crypto/rc4)}, {SSLeay (http://cs.hut.fi/crypto/software.html#ssleay)}, {Crypto++ (http://cs.hut.fi/crypto/software.html#crypto++)}, {Ssh (http://cs.hut.fi/crypto/software.html#ssh)}, {A collection of articles (http://cs.hut.fi/crypto/rc4-breaking)}. (1996-10-28)

Wikipedia

Weak key

In cryptography, a weak key is a key, which, used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually represent a very small fraction of the overall keyspace, which usually means that, a cipher key made by random number generation is very unlikely to give rise to a security problem. Nevertheless, it is considered desirable for a cipher to have no weak keys. A cipher with no weak keys is said to have a flat, or linear, key space.

Esempi dal corpus di testo per keyspace
1. "There is definitely an eastward development going on," KeySpace CEO William Oswald said.
2. KeySpace, which shares a parent company with OSG Records Management, opened its doors earlier this year.
3. Courtesy Of Keyspace By the end of this month, the finishing touches are to be added to the new facility.
4. "The rate might be too high for locals." Courtesy Of Keyspace Individuals and businesses alike can store things in locked units of varying sizes.
5. Mark Britten general director, KeySpace, Russia: "I think that any form of ‘borrowing‘ from the company should not be tolerated, unless it is completely open and agreed in advance.