Examples of using Plaintext in English and their translations into Russian
{-}
-
Official
-
Colloquial
which consists in opportunity for hackers to steal the plaintext passwords from the keychain of macOS.
module enclosure from any direction has a very high probability of being detected, resulting in the immediate deletion of all plaintext CSPs.
sending a hash value over the network, rather than a plaintext password.
All configuration options are stored in plaintext files, so the git config command is really just a convenient command-line interface.
For example, in the English language the plaintext frequencies of the letters E, T,(usually most frequent),
He also persuaded the States-General to send the instruction in cipher, under a letter in plaintext in his own hand,
Stream ciphers typically encrypt plaintext a bit
The protocol uses an encryption function E and a decryption function D. The encryption function uses an encryption key e to change a plaintext message m into an encrypted message,
Encryption is the security mechanism that converts plaintext into cyphertext that is unintelligible to those who do not have access to the appropriate key.
More plaintext passwords extraction and decryption from ISA secrets(when loading hashes into the program).
This password is sent as plaintext in the RIP version 2 message for authentication between neighboring RIP version 2 routers.
of strong enclosures and tamper-detection/response circuitry that zeroes all plaintext CSPs when the removable covers/doors of the cryptographic module are opened.
In its simplest version an interpolation attack expresses the ciphertext as a polynomial of the plaintext.
establish the initial state of a keystream generator, and the output of that generator is used to encrypt the plaintext.
TLS 1.0 connections were vulnerable to some chosen plaintext attacks which allowed man-in-the middle attackers to obtain plaintext HTTP headers on an HTTPS session.
This interdependence ensures that a change to any of the plaintext bits will cause the final encrypted block to change in a way that cannot be predicted
If the plaintext is known to the adversary, it is possible to change every second plaintext block to a value chosen by the attacker,
login is not set, in certain versions of Windows 7 secrets can contain the plaintext of the administrator account password, thus compromising the entire target system.
This allowed Tiltman to work out, over ten days, the plaintext of both messages, as a sequence of plaintext characters discovered in Pa, could then be tried against Pb and vice versa.
The best that can be done is to ensure that any alteration of the ciphertext will completely randomize the plaintext, and rely on the application that uses this transform to include sufficient redundancy in its plaintext to detect