cryptanalytic


Also found in: Dictionary, Encyclopedia, Wikipedia.
Graphic Thesaurus  🔍
Display ON
Animation ON
Legend
Synonym
Antonym
Related
  • adj

Synonyms for cryptanalytic

of or relating to cryptanalysis

References in periodicals archive ?
However, as is typically the case for most cryptographic products, over time the ability of the product to deter cryptanalytic attacks decreases as the computing power necessary to defeat its cryptographic properties increases.
Vulnerability on this scale is indiscriminate"it impacts everybody's security, including American citizens and companies"but we hope that a clearer technical understanding of the cryptanalytic machinery behind government surveillance will be an important step towards better security for everyone.
Operations Access Tools and Hacking leasing services, Support Services (Enabling or VPN services, bul- Products Full Service) work as letproof hosting, needed, are set up compromised sites correctly, and can and hosts) overcome "speed-bumps" or * Cryptanalytic obstacles services (e.
Although it nowadays bears only a historical significance, Caesar cipher readily lends itself to demonstration of basic cryptologic concepts, be it cryptographic (algorithm and key) or cryptanalytic (attack techniques).
Cryptographic hash functions such as SHA512 are hash functions that must be able to withstand all known types of cryptanalytic attack and have very strong cryptographic requirements [3].
NEC confirmed that this technology has sufficient resistance, on a par with existing cryptanalytic methods such as the AES security evaluation method.
Page=HRS_CE_JOB_DTL&Action=A&JobOpeningID=1016132) Cryptanalytic Computer Network Operations Development Program .
8) Known-plaintext Attack Resistance: Known-plaintext attack resistance is a cryptanalytic attack in which the attacker obtains both the plaintext and its corresponding cipher text, and then the attacker tries to discover secret information.
Reading the handwriting of informants in many cases called for advanced cryptanalytic skills, so special thanks are owed to Robyn Surville and Lynne McMorran who wrestled with loosely-structured data-collection forms as they entered GOPA-sorting data.
This textbook on cryptographic algorithms for students and IT professionals who work with computer architectures focuses on advanced cryptanalytic methods used for LFSR-based stream ciphers, lattice methods, elliptic curves and index calculus.
Reference [12] presents two quantitative cryptanalytic findings on the performance of ciphers against plaintext attacks based on a general model of permutation-only multimedia ciphers.
Scrabble and Boggle are popular word games in which letters and words are merely used as symbols of a cryptanalytic problem in which no semantics is involved.
The Navy sent over 600 WAVES to Dayton, Ohio, to help build and train on cryptanalytic machines called Bombes.
Friedman's cryptanalytic work and testimony helped convict numerous rumrunners, including a large, powerful smuggling syndicate that ran a virtual smuggling monopoly in the Gulf of Mexico and on the West Coast (Mowry 2001).
There are many books that contain references to the Japanese intelligence system, but see generally, Elphick, ibid; Tony Matthews, Shadows Dancing: Japanese Espionage Against the West 1939-1945, Robert Hale, London, 1993; John Prados, Combined Fleet Decoded: The Secret History of American Intelligence and the Japanese Navy in World War II, Random House, New York, 1995; and JW Bennett, WA Hobart and JB Spitzer, Intelligence and Cryptanalytic Activities of the Japanese During World War II, Aegean Park Press, Laguna Hills CA, 1986.