"rubber-hose cryptanalysis" meaning in All languages combined

See rubber-hose cryptanalysis on Wiktionary

Noun [English]

Etymology: Referring to the use of a rubber hose as a weapon to beat somebody with. Head templates: {{en-noun|-|head=rubber-hose cryptanalysis}} rubber-hose cryptanalysis (uncountable)
  1. (cryptography, euphemistic) The extraction of cryptographic secrets by coercion or torture. Wikipedia link: rubber-hose cryptanalysis Tags: euphemistic, uncountable Categories (topical): Cryptography, Torture
{
  "etymology_text": "Referring to the use of a rubber hose as a weapon to beat somebody with.",
  "head_templates": [
    {
      "args": {
        "1": "-",
        "head": "rubber-hose cryptanalysis"
      },
      "expansion": "rubber-hose cryptanalysis (uncountable)",
      "name": "en-noun"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "noun",
  "senses": [
    {
      "categories": [
        {
          "kind": "other",
          "name": "English entries with incorrect language header",
          "parents": [
            "Entries with incorrect language header",
            "Entry maintenance"
          ],
          "source": "w"
        },
        {
          "kind": "other",
          "name": "English euphemisms",
          "parents": [],
          "source": "w"
        },
        {
          "kind": "other",
          "name": "Entries with translation boxes",
          "parents": [],
          "source": "w"
        },
        {
          "kind": "other",
          "name": "Pages with 1 entry",
          "parents": [],
          "source": "w"
        },
        {
          "kind": "other",
          "name": "Pages with entries",
          "parents": [],
          "source": "w"
        },
        {
          "kind": "topical",
          "langcode": "en",
          "name": "Cryptography",
          "orig": "en:Cryptography",
          "parents": [
            "Computer science",
            "Formal sciences",
            "Mathematics",
            "Computing",
            "Sciences",
            "Technology",
            "All topics",
            "Fundamental"
          ],
          "source": "w"
        },
        {
          "kind": "topical",
          "langcode": "en",
          "name": "Torture",
          "orig": "en:Torture",
          "parents": [
            "Violence",
            "Human behaviour",
            "Human",
            "All topics",
            "Fundamental"
          ],
          "source": "w"
        }
      ],
      "examples": [
        {
          "ref": "2003, Dennis Kügler, “An Analysis of GNUnet”, in Privacy Enhancing Technologies: Third International Workshop, edited by Roger Dingledine, Springer Science & Business Media, →ISBN, page 175:",
          "text": "We have shown that GNUnet is vulnerable to rubber-hose cryptanalysis, but we additionally have presented an efficient content filter for GNUnet. If content filtering is legally enforced, censoring GNUnet is possible at a very large scale.",
          "type": "quote"
        },
        {
          "ref": "2005, Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch, Stealing the Network: How to Own an Identity: How to Own an Identity, Syngress, →ISBN, page 279:",
          "text": "Catherine scooted out of the way, giving Terry access to the keyboard. With a labored sigh, Terry began searching the encrypted text. “I could try a ciphertext-only attack,” he mumbled to no one in particular. “Then again,” he glared at the attacker and continued, “I could always try rubber-hose cryptanalysis.” He thought for a moment. “I don't need a total break; I'm only interested in information deduction. Let me check the swap file.”",
          "type": "quote"
        },
        {
          "ref": "2010, Hazarathaiah Malepati, Digital Media Processing: DSP Algorithms Using C, Newnes, →ISBN, page 18:",
          "text": "Other types of cryptanalytic attacks include chosen cipher text, chosen key, rubber hose cryptanalysis, and purchase key. Algorithms differ by degrees of security; this depends on how hard they are to break.",
          "type": "quote"
        }
      ],
      "glosses": [
        "The extraction of cryptographic secrets by coercion or torture."
      ],
      "id": "en-rubber-hose_cryptanalysis-en-noun-w91vLDUc",
      "links": [
        [
          "cryptography",
          "cryptography"
        ],
        [
          "extraction",
          "extraction"
        ],
        [
          "cryptographic",
          "cryptographic"
        ],
        [
          "secret",
          "secret"
        ],
        [
          "coercion",
          "coercion"
        ],
        [
          "torture",
          "torture"
        ]
      ],
      "raw_glosses": [
        "(cryptography, euphemistic) The extraction of cryptographic secrets by coercion or torture."
      ],
      "tags": [
        "euphemistic",
        "uncountable"
      ],
      "topics": [
        "computing",
        "cryptography",
        "engineering",
        "mathematics",
        "natural-sciences",
        "physical-sciences",
        "sciences"
      ],
      "wikipedia": [
        "rubber-hose cryptanalysis"
      ]
    }
  ],
  "word": "rubber-hose cryptanalysis"
}
{
  "etymology_text": "Referring to the use of a rubber hose as a weapon to beat somebody with.",
  "head_templates": [
    {
      "args": {
        "1": "-",
        "head": "rubber-hose cryptanalysis"
      },
      "expansion": "rubber-hose cryptanalysis (uncountable)",
      "name": "en-noun"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "noun",
  "senses": [
    {
      "categories": [
        "English entries with incorrect language header",
        "English euphemisms",
        "English lemmas",
        "English multiword terms",
        "English nouns",
        "English terms with quotations",
        "English uncountable nouns",
        "Entries with translation boxes",
        "Pages with 1 entry",
        "Pages with entries",
        "en:Cryptography",
        "en:Torture"
      ],
      "examples": [
        {
          "ref": "2003, Dennis Kügler, “An Analysis of GNUnet”, in Privacy Enhancing Technologies: Third International Workshop, edited by Roger Dingledine, Springer Science & Business Media, →ISBN, page 175:",
          "text": "We have shown that GNUnet is vulnerable to rubber-hose cryptanalysis, but we additionally have presented an efficient content filter for GNUnet. If content filtering is legally enforced, censoring GNUnet is possible at a very large scale.",
          "type": "quote"
        },
        {
          "ref": "2005, Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch, Stealing the Network: How to Own an Identity: How to Own an Identity, Syngress, →ISBN, page 279:",
          "text": "Catherine scooted out of the way, giving Terry access to the keyboard. With a labored sigh, Terry began searching the encrypted text. “I could try a ciphertext-only attack,” he mumbled to no one in particular. “Then again,” he glared at the attacker and continued, “I could always try rubber-hose cryptanalysis.” He thought for a moment. “I don't need a total break; I'm only interested in information deduction. Let me check the swap file.”",
          "type": "quote"
        },
        {
          "ref": "2010, Hazarathaiah Malepati, Digital Media Processing: DSP Algorithms Using C, Newnes, →ISBN, page 18:",
          "text": "Other types of cryptanalytic attacks include chosen cipher text, chosen key, rubber hose cryptanalysis, and purchase key. Algorithms differ by degrees of security; this depends on how hard they are to break.",
          "type": "quote"
        }
      ],
      "glosses": [
        "The extraction of cryptographic secrets by coercion or torture."
      ],
      "links": [
        [
          "cryptography",
          "cryptography"
        ],
        [
          "extraction",
          "extraction"
        ],
        [
          "cryptographic",
          "cryptographic"
        ],
        [
          "secret",
          "secret"
        ],
        [
          "coercion",
          "coercion"
        ],
        [
          "torture",
          "torture"
        ]
      ],
      "raw_glosses": [
        "(cryptography, euphemistic) The extraction of cryptographic secrets by coercion or torture."
      ],
      "tags": [
        "euphemistic",
        "uncountable"
      ],
      "topics": [
        "computing",
        "cryptography",
        "engineering",
        "mathematics",
        "natural-sciences",
        "physical-sciences",
        "sciences"
      ],
      "wikipedia": [
        "rubber-hose cryptanalysis"
      ]
    }
  ],
  "word": "rubber-hose cryptanalysis"
}

Download raw JSONL data for rubber-hose cryptanalysis meaning in All languages combined (2.7kB)


This page is a part of the kaikki.org machine-readable All languages combined dictionary. This dictionary is based on structured data extracted on 2024-12-21 from the enwiktionary dump dated 2024-12-04 using wiktextract (d8cb2f3 and 4e554ae). The data shown on this site has been post-processed and various details (e.g., extra categories) removed, some information disambiguated, and additional data merged from other sources. See the raw data download page for the unprocessed wiktextract data.

If you use this data in academic research, please cite Tatu Ylonen: Wiktextract: Wiktionary as Machine-Readable Structured Data, Proceedings of the 13th Conference on Language Resources and Evaluation (LREC), pp. 1317-1325, Marseille, 20-25 June 2022. Linking to the relevant page(s) under https://kaikki.org would also be greatly appreciated.