Matches in DBpedia 2016-04 for { <http://dbpedia.org/resource/Custom_hardware_attack> ?p ?o }
Showing triples 1 to 59 of
59
with 100 triples per page.
- Custom_hardware_attack abstract "In cryptography, a custom hardware attack uses specifically designed application-specific integrated circuits (ASIC) to decipher encrypted messages.Mounting a cryptographic brute force attack requires a large number of similar computations: typically trying one key, checking if the resulting decryption gives a meaningful answer and trying the next key if it does not. Computers can perform these calculations at a rate of millions per second, and thousands of computers can be harnessed together in a distributed computing network. But the number of computations required on average grows exponentially with the size of the key and for many problems standard computers are not fast enough. On the other hand, many cryptographic algorithms lend themselves to fast implementation in hardware, i.e. networks of logic circuits or \"gates.\" Integrated circuits (ICs) are constructed of these gates and often can execute cryptographic algorithms hundreds of times faster than a general purpose computer. Each IC can contain large numbers of gates (hundreds of millions in 2005) and the number continues to grow according to Moore's law. Thus the same decryption circuit, or cell, can be replicated thousands of times on one IC. The communications requirements for these ICs are very simple. Each must be initially loaded with a starting point in the key space and, in some situations, with a comparison test value (see known plaintext attack). Output consists of a signal that the IC has found an answer and the successful key.Since ICs lend themselves to mass production, thousands or even millions of ICs can be applied to a single problem. The ICs themselves can be mounted in printed circuit boards. A standard board design can be used for different problems since the communication requirements for the chips are the same. Wafer-scale integration is another possibility. The primary limitations on this method are the cost of chip design, IC fabrication, floor space, electric power and thermal dissipation.An alternative approach is to use FPGAs (field-programmable gate arrays); these are slower and more expensive per gate, but can be reprogrammed for different problems. COPACOBANA (Cost-Optimized Parallel COde Breaker) is one such machine, consisting of 120 FPGAs of type Xilinx Spartan3-1000 which run in parallel.".
- Custom_hardware_attack thumbnail Board300.jpg?width=300.
- Custom_hardware_attack wikiPageExternalLink index.html.
- Custom_hardware_attack wikiPageExternalLink ops_FPGA.html.
- Custom_hardware_attack wikiPageID "2174032".
- Custom_hardware_attack wikiPageLength "5157".
- Custom_hardware_attack wikiPageOutDegree "33".
- Custom_hardware_attack wikiPageRevisionID "602963026".
- Custom_hardware_attack wikiPageWikiLink Application-specific_integrated_circuit.
- Custom_hardware_attack wikiPageWikiLink Bombe.
- Custom_hardware_attack wikiPageWikiLink Brute-force_attack.
- Custom_hardware_attack wikiPageWikiLink Category:Cryptographic_attacks.
- Custom_hardware_attack wikiPageWikiLink Classified_information.
- Custom_hardware_attack wikiPageWikiLink Cryptography.
- Custom_hardware_attack wikiPageWikiLink DES_Challenges.
- Custom_hardware_attack wikiPageWikiLink Data_Encryption_Standard.
- Custom_hardware_attack wikiPageWikiLink Digital_electronics.
- Custom_hardware_attack wikiPageWikiLink Distributed_computing.
- Custom_hardware_attack wikiPageWikiLink EFF_DES_cracker.
- Custom_hardware_attack wikiPageWikiLink Electronic_Frontier_Foundation.
- Custom_hardware_attack wikiPageWikiLink Encryption.
- Custom_hardware_attack wikiPageWikiLink Enigma_machine.
- Custom_hardware_attack wikiPageWikiLink Exponential_growth.
- Custom_hardware_attack wikiPageWikiLink Field-programmable_gate_array.
- Custom_hardware_attack wikiPageWikiLink Integrated_circuit.
- Custom_hardware_attack wikiPageWikiLink Integrated_circuit_layout.
- Custom_hardware_attack wikiPageWikiLink Key_(cryptography).
- Custom_hardware_attack wikiPageWikiLink Known-plaintext_attack.
- Custom_hardware_attack wikiPageWikiLink Logic_gate.
- Custom_hardware_attack wikiPageWikiLink Moores_law.
- Custom_hardware_attack wikiPageWikiLink National_Security_Agency.
- Custom_hardware_attack wikiPageWikiLink Printed_circuit_board.
- Custom_hardware_attack wikiPageWikiLink SciEngines_GmbH.
- Custom_hardware_attack wikiPageWikiLink Semiconductor_device_fabrication.
- Custom_hardware_attack wikiPageWikiLink TWINKLE.
- Custom_hardware_attack wikiPageWikiLink TWIRL.
- Custom_hardware_attack wikiPageWikiLink World_War_II.
- Custom_hardware_attack wikiPageWikiLink Xilinx.
- Custom_hardware_attack wikiPageWikiLink File:Board300.jpg.
- Custom_hardware_attack wikiPageWikiLinkText "COPACOBANA".
- Custom_hardware_attack wikiPageWikiLinkText "Custom hardware attack".
- Custom_hardware_attack wikiPageWikiLinkText "custom hardware attack".
- Custom_hardware_attack wikiPageWikiLinkText "custom hardware".
- Custom_hardware_attack wikiPageWikiLinkText "hardware implementations".
- Custom_hardware_attack wikiPageUsesTemplate Template:As_of.
- Custom_hardware_attack wikiPageUsesTemplate Template:Citation_needed.
- Custom_hardware_attack wikiPageUsesTemplate Template:Refimprove.
- Custom_hardware_attack subject Category:Cryptographic_attacks.
- Custom_hardware_attack type Exploit.
- Custom_hardware_attack comment "In cryptography, a custom hardware attack uses specifically designed application-specific integrated circuits (ASIC) to decipher encrypted messages.Mounting a cryptographic brute force attack requires a large number of similar computations: typically trying one key, checking if the resulting decryption gives a meaningful answer and trying the next key if it does not.".
- Custom_hardware_attack label "Custom hardware attack".
- Custom_hardware_attack sameAs Q3648857.
- Custom_hardware_attack sameAs Atac_per_maquinari_a_mida.
- Custom_hardware_attack sameAs COPACOBANA.
- Custom_hardware_attack sameAs m.06sctd.
- Custom_hardware_attack sameAs Q3648857.
- Custom_hardware_attack wasDerivedFrom Custom_hardware_attack?oldid=602963026.
- Custom_hardware_attack depiction Board300.jpg.
- Custom_hardware_attack isPrimaryTopicOf Custom_hardware_attack.