TERMIUM Plus®

The Government of Canada’s terminology and linguistic data bank.

TRADE-OFF METHOD [1 record]

Record 1 1997-11-27

English

Subject field(s)
  • IT Security
CONT

The obvious method of attack is brute-force exhaustive search of the key space [which is time consuming] Later it was suggested that a rich and powerful enemy could build a special-purpose computer capable of breaking DES [Data Encryption Standards] by exhaustive search in a reasonable amount of time. Later, Hellman showed a time-memory trade-off that allows improvement over exhaustive search if memory space is plentiful, after an exhaustive precomputation. These ideas fostered doubts about the security of DES.

French

Domaine(s)
  • Sécurité des TI

Spanish

Save record 1

Copyright notice for the TERMIUM Plus® data bank

© Public Services and Procurement Canada, 2024
TERMIUM Plus®, the Government of Canada's terminology and linguistic data bank
A product of the Translation Bureau

Features

Language Portal of Canada

Access a collection of Canadian resources on all aspects of English and French, including quizzes.

Writing tools

The Language Portal’s writing tools have a new look! Easy to consult, they give you access to a wealth of information that will help you write better in English and French.

Glossaries and vocabularies

Access Translation Bureau glossaries and vocabularies.

Date Modified: