OnlineWoerterBuecher.de
Internes

Lexikon


brute force attack


A method of breaking a cipher (that is, to decrypt a specific encrypted text) by trying every possible key. The quicker the brute force attack, the weaker the cipher. Feasibility of brute force attack depends on the key length of the cipher, and on the amount of computational POWER available to the attacker. Brute force attack is impossible against the ciphers with variable-size key, such as a one-time pad cipher. {Breaking ciphers with many workstations (http://www.distributed.net/projects.html.en)}. (2000-01-16)

In addition suitable contents:
[ 2 ] [ = ] [ ad ] [ ag ] [ ai ] [ al ] [ am ] [ an ] [ ar ] [ arc ] [ as ] [ at ] [ av ] [ B ] [ b ] [ bi ] [ br ] [ break ] [ by ] [ ch ] [ ci ] [ ck ] [ co ] [ com ] [ cr ] [ crypt ] [ cryptography ] [ de ] [ dec ] [ du ] [ ec ] [ ed ] [ er ] [ et ] [ fi ] [ file ] [ fo ] [ for ] [ ga ] [ gr ] [ graph ] [ gt ] [ h ] [ hat ] [ hr ] [ ht ] [ id ] [ il ] [ in ] [ io ] [ is ] [ it ] [ ke ] [ key ] [ ki ] [ la ] [ Lex ] [ li ] [ ma ] [ man ] [ method ] [ ml ] [ mo ] [ mod ] [ module ] [ mount ] [ mp ] [ na ] [ nc ] [ ne ] [ net ] [ ng ] [ ns ] [ om ] [ pa ] [ pe ] [ ph ] [ pr ] [ pt ] [ query ] [ rc ] [ re ] [ ro ] [ ru ] [ se ] [ si ] [ spec ] [ st ] [ su ] [ T ] [ text ] [ th ] [ tm ] [ to ] [ tp ] [ tr ] [ tt ] [ va ] [ var ] [ variable ] [ ve ] [ workstation ] [ brute force ]






Go Back ]

Free On-line Dictionary of Computing

Copyright © by OnlineWoerterBuecher.de - (4445 Reads)

All logos and trademarks in this site are property of their respective owner.

Page Generation in 0.0861 Seconds, with 16 Database-Queries
Zurück zur Startseite