related key attack

related key attack
atak kluczami pokrewnymi

English-Polish dictionary for engineers. 2013.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Related-key attack — In cryptography, a related key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the… …   Wikipedia

  • Key schedule — In cryptography, the so called product ciphers are a certain kind of ciphers, where the (de )ciphering of data is done in rounds . The general setup of each round is the same, except for some hard coded parameters and a part of the cipher key,… …   Wikipedia

  • Slide attack — The slide attack is a form of cryptanalysis designed to deal with the prevailing idea that even weak ciphers can become very strong by increasing the number of rounds, which can ward off a differential attack. The slide attack works in such a way …   Wikipedia

  • Key Biscayne — is an island located in Miami Dade County, Florida, United States, between the Atlantic Ocean and Biscayne Bay. It is the southernmost of the barrier islands along the Atlantic coast of Florida, and lies south of Miami Beach and southeast of… …   Wikipedia

  • Chosen-plaintext attack — A chosen plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker has the capability to choose arbitrary plaintexts to be encrypted and obtain the corresponding ciphertexts. The goal of the attack is to gain… …   Wikipedia

  • Attack tree — Attack trees are conceptual diagrams of threats on computer systems and possible attacks to reach those threats. The concept was suggested by Bruce Schneier] . Basic Attack trees are multi leveled diagrams consisting of one root, leaves, and… …   Wikipedia

  • Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… …   Wikipedia

  • Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… …   Wikipedia

  • Key strengthening — In cryptography, key strengthening or key stretching refer to techniques used to make a possibly weak key, typically a password or passphrase, more secure against a brute force attack by increasing the time it takes to test each possible key.… …   Wikipedia

  • Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… …   Wikipedia

  • Attack of the 50 Foot Woman — Infobox Film name = Attack of the 50 Foot Woman caption = Original theatrical poster by Reynold Brown writer = Mark Hanna starring = Allison Hayes William Hudson Yvette Vickers director = Nathan H. Juran producer = Bernard Woolner music = Ronald… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”