1) DES-brute-force
DES穷举攻击
1.
As a part of the grid system, the control system of the computational node is designedand implemented, and the system gotvery good effect when carrying through thetest of DES-brute-force.
此系统在DES穷举攻击实验中取得了非常好的效果,其它一些密码计算任务类似地也可用此系统分布式地实现。
2) exhaustive attack
穷举攻击
3) brute-force attack
穷尽攻击
1.
As the encryption system is apt to be cracked by brute-force attack, a general encryption system model is established, which is immune from this attack and also can be used for text, voice or picture data encryption with keys of any length.
针对加密系统易遭到穷尽密钥攻击的情况,利用杂凑函数和对称密码,设计出一种可有效地抗穷尽攻击的通用文件加密系统模型。
4) exhaustion attack
穷举法进攻
5) Exhaust search attack
穷搜索攻击
补充资料:举不胜举
1.列举不尽。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条