mount a cryptanalytic attack

  • 1предпринимать (организовывать) криптоаналитическую атаку — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN mount a cryptanalytic attack …

    Справочник технического переводчика

  • 2Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… …

    Wikipedia

  • 3Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis …

    Wikipedia

  • 4Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… …

    Wikipedia

  • 5Elizebeth Friedman — The following article is taken from the Hall of Honor from the National Cryptologic Museum [http://www.nsa.gov/honor/honor00005.cfm] :Elizebeth Smith Friedman (1892 ndash;31 October, 1980) was cryptanalyst and author, and a pioneer in U.S.… …

    Wikipedia

  • 6Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… …

    Wikipedia