OnlineWoerterBuecher.de
Internes

Lexikon


brute force attack


A method of breaking a cipher (that is, to decrypt a specific encrypted text) by trying every possible key. The quicker the brute force attack, the weaker the cipher. Feasibility of brute force attack depends on the key length of the cipher, and on the amount of computational power available to the attacker. Brute force attack is impossible against the ciphers with variable-size key, such as a one-time pad cipher. {Breaking ciphers with many workstations (http://www.distributed.net/projects.html.en)}. (2000-01-16)

In addition suitable contents:
[ 2 ] [ = ] [ ad ] [ ag ] [ ai ] [ al ] [ am ] [ an ] [ ar ] [ arc ] [ as ] [ at ] [ av ] [ B ] [ b ] [ bi ] [ br ] [ break ] [ by ] [ ch ] [ ci ] [ ck ] [ co ] [ com ] [ cr ] [ crypt ] [ cryptography ] [ de ] [ dec ] [ du ] [ ec ] [ ed ] [ er ] [ et ] [ fi ] [ file ] [ fo ] [ for ] [ ga ] [ gr ] [ graph ] [ gt ] [ h ] [ hat ] [ hr ] [ ht ] [ id ] [ il ] [ in ] [ io ] [ is ] [ it ] [ ke ] [ key ] [ ki ] [ la ] [ Lex ] [ li ] [ ma ] [ man ] [ method ] [ ml ] [ mo ] [ mod ] [ module ] [ mount ] [ mp ] [ na ] [ nc ] [ ne ] [ net ] [ ng ] [ ns ] [ om ] [ pa ] [ pe ] [ ph ] [ pr ] [ pt ] [ query ] [ rc ] [ re ] [ ro ] [ ru ] [ se ] [ si ] [ spec ] [ st ] [ su ] [ T ] [ text ] [ th ] [ tm ] [ to ] [ tp ] [ tr ] [ tt ] [ va ] [ var ] [ variable ] [ ve ] [ workstation ] [ brute force ]






Go Back ]

Free On-line Dictionary of Computing

Copyright © by OnlineWoerterBuecher.de - (4425 Reads)

All logos and trademarks in this site are property of their respective owner.

Page Generation in 0.1893 Seconds, with 17 Database-Queries
Zurück zur Startseite