蠻力攻擊 的英文怎麼說

中文拼音 [mángōng]
蠻力攻擊 英文
brute force attack
  • : Ⅰ名詞1 (我國古代稱南方的民族) an ancient name for southern nationalities2 (姓氏) a surname Ⅱ...
  • : Ⅰ名1 (力量; 能力) power; strength; ability; capacity 2 [物理學] (改變物體運動狀態的作用) forc...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 蠻力 : brute force
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. To get the same security against birthday attacks as you d want against brute - force attacks, given a symmetric cipher with key length

    如果希望針對生日獲得和針對蠻力攻擊一樣的安全性,給定一個密鑰長度為
  2. If it would take alice a million years to perform a successful brute - force attack, she could probably perform a successful birthday attack in under a week

    如果alice執行一次成功的蠻力攻擊需要一百萬年,那麼她也許一周以內就可以完成一次成功的生日
  3. L0phtcrack can also be used in a brute force attack

    蠻力攻擊中還可以使用l0phtcrack 。
  4. Can t accept : it s an easily guessed word. enter new password : redrum can t accept : i read the shining, too

    的密碼術為了破解一個秘密消息,需要按某種順序嘗試每一個可能的密鑰。
  5. Another attack on cryptographic hashes is much easier to carry out than the average brute - force attack

    另一種對密碼雜湊的比平均蠻力攻擊容易實施得多。
  6. That s much more efficient than a brute - force attack, where the expected number of messages she would have to hash is

    這比蠻力攻擊要有效得多,如果使用蠻力攻擊,預計她必須雜湊的訊息數為2
  7. Some brute force attacks can take a week depending on the complexity of the password

    根據密碼的復雜程度,某些蠻力攻擊可能花費一個星期的時間。
  8. Searching for a collision on purpose amounts to a brute - force attack, and is usually fairly difficult

    對沖突的故意搜索意味著蠻力攻擊,這通常很難。
  9. A form of brute force attack, possibly modified selectively by probability, whereby words or phrases are tried in sequence

    蠻力攻擊的一種形式,可能根據概率有選擇地修正,按順序對字或短語進行嘗試。
  10. The analysis results show that the cryptosystem can resist brute attack and differential attack, and it is also of high security and strong practicability

    分析結果表明該演算法可以抵抗蠻力攻擊和差分分析,具有較高的安全性和很強的實用性。
  11. The first useful property of an xml signature is that it can be applied to any sort of digital content sometimes called a data object, including xml

    已知密文的一個常見方式是蠻力攻擊,該方法使用每一個可能的密鑰來解密密文(回憶前面的汽車示例) 。
  12. A particular form of brute - force attack named for the fact that in a group of 23 people, the probability of two or more sharing the same birthday is greater than 1 2

    以23個人為一組的人中有兩個或兩個以上的人在同一天生日的概率大於1 / 2這一事實命名的一種特殊形式的蠻力攻擊
  13. When trying to attach over the internet to the site, the attacker uses a password generator tool, such as l0phtcrack, which launches a brute force attack against the server

    當試圖通過因特網連接到該站點時,者使用一個密碼發生器工具(如l0phtcrack ) ,它啟動對服務器的蠻力攻擊
  14. Another crude technique is known as " dumpster diving, " which basically involves an attacker going through your garbage to find discarded documentation that may contain passwords

    另一種技術稱為「垃圾搜尋( dumpster diving ) 」 ,它基本上就是一個者把垃圾搜尋一遍以找出可能含有密碼的廢棄文檔。
分享友人