the nature of the algorithm plus perhaps some knowledge of the general terjemahan - the nature of the algorithm plus perhaps some knowledge of the general Bahasa Indonesia Bagaimana mengatakan

the nature of the algorithm plus pe

the nature of the algorithm plus perhaps some knowledge of the general characteristics
of the plaintext or even some sample plaintext-ciphertext pairs. This type of
attack exploits the characteristics of the algorithm to attempt to deduce a specific
plaintext or to deduce the key being used. If the attack succeeds in deducing the
key, the effect is catastrophic: All future and past messages encrypted with that key
are compromised.
The second method, known as the brute-force attack , is to try every possible
key on a piece of ciphertext until an intelligible translation into plaintext is obtained.
On average, half of all possible keys must be tried to achieve success. Table 2.1 shows
how much time is involved for various key sizes. The table shows results for each key
size, assuming that it takes 1 μs to perform a single decryption, a reasonable order of
magnitude for today’s computers. With the use of massively parallel organizations
of microprocessors, it may be possible to achieve processing rates many orders of
magnitude greater. The final column of the table considers the results for a system
that can process 1 million keys per microsecond. As one can see, at this performance
level, a 56-bit key can no longer be considered computationally secure
1284/5000
Dari: Inggris
Ke: Bahasa Indonesia
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
the nature of the algorithm plus perhaps some knowledge of the general characteristicsof the plaintext or even some sample plaintext-ciphertext pairs. This type ofattack exploits the characteristics of the algorithm to attempt to deduce a specificplaintext or to deduce the key being used. If the attack succeeds in deducing thekey, the effect is catastrophic: All future and past messages encrypted with that keyare compromised.The second method, known as the brute-force attack , is to try every possiblekey on a piece of ciphertext until an intelligible translation into plaintext is obtained.On average, half of all possible keys must be tried to achieve success. Table 2.1 showshow much time is involved for various key sizes. The table shows results for each keysize, assuming that it takes 1 μs to perform a single decryption, a reasonable order ofmagnitude for today’s computers. With the use of massively parallel organizationsof microprocessors, it may be possible to achieve processing rates many orders ofmagnitude greater. The final column of the table considers the results for a systemthat can process 1 million keys per microsecond. As one can see, at this performancelevel, a 56-bit key can no longer be considered computationally secure
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
sifat algoritma ditambah mungkin beberapa pengetahuan tentang karakteristik umum
dari plaintext atau bahkan beberapa contoh pasangan plaintext-ciphertext. Jenis
serangan memanfaatkan karakteristik algoritma untuk mencoba untuk menyimpulkan tertentu
plaintext atau untuk menyimpulkan kunci yang digunakan. Jika serangan itu berhasil dalam deduksi
kunci, efeknya bencana: Semua pesan masa depan dan masa lalu dienkripsi dengan kunci yang
. dikompromikan
Metode kedua, yang dikenal sebagai serangan brute-force, adalah mencoba setiap kemungkinan
kunci pada sepotong ciphertext sampai terjemahan dimengerti menjadi plaintext diperoleh.
Rata-rata, setengah dari semua kunci yang mungkin harus mencoba untuk mencapai keberhasilan. Tabel 2.1 menunjukkan
berapa banyak waktu yang terlibat untuk berbagai ukuran kunci. Tabel tersebut menunjukkan hasil untuk setiap tombol
ukuran, dengan asumsi bahwa dibutuhkan 1 mikrodetik untuk melakukan dekripsi tunggal, urutan wajar
besarnya untuk komputer saat ini. Dengan menggunakan organisasi massal paralel
dari mikroprosesor, dimungkinkan untuk mencapai tingkat pengolahan banyak pesanan dari
besarnya lebih besar. Kolom terakhir dari tabel menganggap hasil untuk sistem
yang dapat memproses 1 juta kunci per mikrodetik. Seperti yang dapat dilihat, pada kinerja ini
tingkat, kunci 56-bit tidak bisa lagi dianggap komputasi aman
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2025 I Love Translation. All reserved.

E-mail: ilovetranslation@live.com