翻訳と辞書
Words near each other
・ Adverbial genitive
・ Adverbial phrase
・ Adverbs (novel)
・ Adversane
・ Adversarial collaboration
・ Adversarial Design
・ Adversarial information retrieval
・ Adversarial machine learning
・ Adversarial process
・ Adversarial purchasing
・ Adversarial queueing network
・ Adversarial review
・ Adversarial system
・ Adversary
・ Adversary (comics)
Adversary (cryptography)
・ Adversary evaluation
・ Adversary in the House
・ Adversary model
・ Adversary proceeding in bankruptcy (United States)
・ Adverse
・ Adverse abandonment
・ Adverse authority
・ Adverse Childhood Experiences International Questionnaire (ACE-IQ)
・ Adverse Childhood Experiences Study
・ Adverse drug reaction
・ Adverse Drug Reactions Advisory Committee
・ Adverse effect
・ Adverse Effect Wage Rate
・ Adverse event


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Adversary (cryptography) : ウィキペディア英語版
Adversary (cryptography)
In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving their goal (primarily privacy, integrity, and availability of data). An adversary's efforts might take the form of attempting to discover secret data, corrupting some of the data in the system, spoofing the identity of a message sender or receiver, or forcing system downtime.
Actual adversaries, as opposed to idealized ones, are referred to as ''attackers''. Not surprisingly, the former term predominates in the cryptographic and the latter in the computer security literature. Eve, Mallory, Oscar and Trudy are all adversarial characters widely used in both types of texts.
This notion of an adversary helps both intuitive and formal reasoning about cryptosystems by casting security analysis of cryptosystems as a 'game' between the users and a ''centrally co-ordinated'' enemy. The notion of security of a cryptosystem is meaningful only with respect to particular attacks (usually presumed to be carried out by particular sorts of adversaries).
There are several types of adversaries depending on what capabilities or intentions they are presumed to have. Adversaries may be〔('Adversary Attacks' )〕
*computationally bounded or unbounded (i.e. in terms of time and storage resources),
*eavesdropping or Byzantine (i.e. passively listening on or actively corrupting data in the channel),
*static or adaptive (i.e. having fixed or changing behavior),
*mobile or non-mobile (e.g. in the context of network security)
and so on. In actual security practice, the attacks assigned to such adversaries are often seen, so such notional analysis is not merely theoretical.
How successful an adversary is at breaking a system is measured by its ''advantage''. An adversary's advantage is the difference between the adversary's probability of breaking the system and the probability that the system can be broken by simply guessing. The advantage is specified as a function of the security parameter.
==References==



抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Adversary (cryptography)」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.