cryptanalysis - определение. Что такое cryptanalysis
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

Что (кто) такое cryptanalysis - определение

STUDY OF ANALYZING INFORMATION SYSTEMS IN ORDER TO DISCOVER THEIR HIDDEN ASPECTS
CryptanalysiS; Cryptanalytic; Cryptoanalysis; Codebreaking; Cryptanalyst; Code-breaking; Cryptanalysts; Code breaker; Codebreakers; Cryptoanalyst; Statistical cryptanalysis; Code Breakers; Code breaking; Modern cryptanalysis; Cipher System Identification; Cryptanalytic attack; Cryptographic attack; Message indicator; Cryptanalyse; Codebreaker; Crypto analysis
Найдено результатов: 25
cryptanalysis         
The branch of cryptography concerned with decoding encrypted messages when you're not supposed to be able to. (1994-12-06)
cryptanalysis         
¦ noun the art or process of deciphering coded messages without being told the key.
Derivatives
cryptanalyst noun
cryptanalytic adjective
cryptanalytical adjective
Cryptanalysis         

Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

In addition to mathematical analysis of cryptographic algorithms, cryptanalysis includes the study of side-channel attacks that do not target weaknesses in the cryptographic algorithms themselves, but instead exploit weaknesses in their implementation.

Even though the goal has been the same, the methods and techniques of cryptanalysis have changed drastically through the history of cryptography, adapting to increasing cryptographic complexity, ranging from the pen-and-paper methods of the past, through machines like the British Bombes and Colossus computers at Bletchley Park in World War II, to the mathematically advanced computerized schemes of the present. Methods for breaking modern cryptosystems often involve solving carefully constructed problems in pure mathematics, the best-known being integer factorization.

Integral cryptanalysis         
TYPE OF CRYPTANALYTIC ATTACK
Integral attack; Square attack; Square cryptanalysis
In cryptography, integral cryptanalysis is a cryptanalytic attack that is particularly applicable to block ciphers based on substitution–permutation networks. It was originally designed by Lars Knudsen as a dedicated attack against Square, so it is commonly known as the Square attack.
Mod n cryptanalysis         
PARTITIONING ATTACK APPLICABLE TO BLOCK AND STREAM CIPHERS
Mod-n cryptanalysis
In cryptography, mod n cryptanalysis is an attack applicable to block and stream ciphers. It is a form of partitioning cryptanalysis that exploits unevenness in how the cipher operates over equivalence classes (congruence classes) modulo n.
Higher-order differential cryptanalysis         
TYPE OF CRYPTANALYTIC ATTACK
Higher order differential cryptanalysis
In cryptography, higher-order differential cryptanalysis is a generalization of differential cryptanalysis, an attack used against block ciphers. While in standard differential cryptanalysis the difference between only two texts is used, higher-order differential cryptanalysis studies the propagation of a set of differences between a larger set of texts.
Differential cryptanalysis         
GENERAL FORM OF CRYPTANALYSIS APPLICABLE PRIMARILY TO BLOCK CIPHERS, BUT ALSO TO STREAM CIPHERS AND CRYPTOGRAPHIC HASH FUNCTIONS
Differential attack; T-attack; Tickle attack; Degenerate Key; Differential Cryptanalysis; Differential attacks
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in information input can affect the resultant difference at the output.
Cryptanalysis of the Lorenz cipher         
  • A rebuilt British Tunny at [[the National Museum of Computing]], [[Bletchley Park]]. It emulated the functions of the Lorenz SZ40/42, producing printed cleartext from ciphertext input.
  • A Mark 2 Colossus computer. The Wren operators are (left to right) Dorothy Du Boisson and Elsie Booker. The slanted control panel on the left was used to set the pin patterns on the Lorenz. The "bedstead" paper tape transport is on the right.
  • A typical distribution of letters in [[English language]] text. Inadequate encipherment may not sufficiently mask the non-uniform nature of the distribution. This property was exploited in cryptanalysis of the Lorenz cipher by weakening part of the key.
  • A Lorenz SZ42 cipher machine with its covers removed at [[The National Museum of Computing]] on [[Bletchley Park]]
  • Cams on wheels 9 and 10 showing their raised (active) and lowered (inactive) positions. An active cam reversed the value of a bit ('''•'''→'''x''' and '''x'''→'''•''').
  • 2}} wide, produced by an undulator similar to those used during the Second World War for intercepted 'Tunny' wireless telegraphic traffic at Knockholt, for translation into ITA2 characters to be sent to Bletchley Park
DECODING PROCESS
Cryptanalysis of Tunny; British Tunny
Cryptanalysis of the Lorenz cipher was the process that enabled the British to read high-level German army messages during World War II. The British Government Code and Cypher School (GC&CS) at Bletchley Park decrypted many communications between the Oberkommando der Wehrmacht (OKW, German High Command) in Berlin and their army commands throughout occupied Europe, some of which were signed "Adolf Hitler, Führer".
Kiss (cryptanalysis)         
TERM IN CRYPTANALYSIS
Kisses (cryptanalysis)
In cryptanalysis, a kiss is a pair of identical messages sent using different ciphers, one of which has been broken. The term was used at Bletchley Park during World War II.
Impossible differential cryptanalysis         
FORM OF DIFFERENTIAL CRYPTANALYSIS FOR BLOCK CIPHERS THAT EXPLOITS DIFFERENCES THAT CANNOT OCCUR
Impossible differential attack; Miss in the middle attack; Impossible cryptanalysis; Miss-in-the-middle attack
In cryptography, impossible differential cryptanalysis is a form of differential cryptanalysis for block ciphers. While ordinary differential cryptanalysis tracks differences that propagate through the cipher with greater than expected probability, impossible differential cryptanalysis exploits differences that are impossible (having probability 0) at some intermediate state of the cipher algorithm.

Википедия

Cryptanalysis

Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

In addition to mathematical analysis of cryptographic algorithms, cryptanalysis includes the study of side-channel attacks that do not target weaknesses in the cryptographic algorithms themselves, but instead exploit weaknesses in their implementation.

Even though the goal has been the same, the methods and techniques of cryptanalysis have changed drastically through the history of cryptography, adapting to increasing cryptographic complexity, ranging from the pen-and-paper methods of the past, through machines like the British Bombes and Colossus computers at Bletchley Park in World War II, to the mathematically advanced computerized schemes of the present. Methods for breaking modern cryptosystems often involve solving carefully constructed problems in pure mathematics, the best-known being integer factorization.