1 minute read
2.2.1 ● Brute-force
K
Kevin Mitnick 24, 216 key-logger 12, 26 KGB 96, 212, 213 known-plaintext 35, 90 Kuschel 124, 146, 148, 218 KZU 83
L
LBA 27, 62, 126 ledger 193 Lee Hart 133, 135, 159, 161 Li-ion 24 linear-congruential generator 82 live drop 117 lock picking 97 locksmithing 98 look-up table 104, 140, 141, 169 lossy 116 LTSpice 180 lumped 45, 51, 200
M
machine code 11, 37, 38, 39, 100, 101, 132, 135, 159, 164, 165 machine-code monitor 135 magnetron 188, 189, 190, 191 malware 31, 38, 54 Manhattan Project 92 Matlab 180, 183, 185, 186, 187 Matthias Wolf 88, 217 memory map 39, 159 metadata 27, 28 Mg-bulb 142, 144, 145 Mg-flash 141 microcassette 127, 131 microcode 146 microfilm 26 micro-probing 68 microstrip 51, 52, 188 microwave 10, 29, 43, 47, 50, 51, 118, 149, 150, 188, 189, 191 millennium bug 190 modding 62, 127 modulation index 189 mono-alphabetic cipher 32, 33, 34, 82, 94, 99, 101, 103 Moore’s law 14
MyNOR 9, 124, 146, 147, 148, 170, 207, 218
N
nichrome 147 NIST test 78, 159
NMI 137, 138, 140 NMOS 59, 76, 140 Non-Aligned Movement 15
NOP 41, 138, 165, 166, 167
O
obfuscated code 41, 61, 101, 121 obfuscation 99, 101, 140, 145, 146 obscurity 145, 146, 207 off-the-shelf 13, 28 OLED 10, 49 one-time pad 33, 36, 91, 94, 101, 118, 121, 147, 187, 205 one-time password 147 one-time programmable 147, 170
opcode 59, 67, 146, 159, 165, 166, 167, 169, 170, 207 open-hardware 13, 28, 87 open-software 13 open-source 22, 28, 32, 87, 145 operating system 37, 38, 108, 133, 218 operational amplifier 182, 185
P
pacemaker 189, 190, 191 payload 39, 140, 164, 165, 166, 167, 168 payphone 16, 17, 20, 108 penetration depth 50, 200 penetration distance 43
PGP 12, 13, 20, 36, 78, 99, 103, 104, 105, 145, 191, 192, 199 phonecard 108 phosphor 47, 48, 49 phosphorous 47 photo-detector 48 photodiode 48 photomultiplier 48 phreaking 44, 52, 99, 188 PI controller 183, 185 plaintext 12, 15, 26, 31, 32, 33, 34, 35, 36, 41, 50, 52, 53, 55, 60, 82, 90, 91, 92, 94,
100, 101, 102, 103, 116, 118, 123, 131, 155, 193, 194, 199 poison 23