"rubber-hose cryptanalysis" meaning in English

See rubber-hose cryptanalysis in All languages combined, or Wiktionary

Noun

Etymology: Referring to the use of a rubber hose as a weapon with which to beat an individual. Head templates: {{en-noun|-|head=rubber-hose cryptanalysis}} rubber-hose cryptanalysis (uncountable)
  1. (cryptography, euphemistic) The extraction of cryptographic secrets by coercion or torture. Wikipedia link: rubber-hose cryptanalysis Tags: euphemistic, uncountable Categories (topical): Cryptography, Torture

Download JSON data for rubber-hose cryptanalysis meaning in English (3.5kB)

{
  "etymology_text": "Referring to the use of a rubber hose as a weapon with which to beat an individual.",
  "head_templates": [
    {
      "args": {
        "1": "-",
        "head": "rubber-hose cryptanalysis"
      },
      "expansion": "rubber-hose cryptanalysis (uncountable)",
      "name": "en-noun"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "noun",
  "senses": [
    {
      "categories": [
        {
          "kind": "other",
          "name": "English entries with incorrect language header",
          "parents": [
            "Entries with incorrect language header",
            "Entry maintenance"
          ],
          "source": "w"
        },
        {
          "kind": "other",
          "name": "English entries with topic categories using raw markup",
          "parents": [
            "Entries with topic categories using raw markup",
            "Entry maintenance"
          ],
          "source": "w"
        },
        {
          "kind": "other",
          "name": "English euphemisms",
          "parents": [],
          "source": "w"
        },
        {
          "kind": "other",
          "name": "English terms with non-redundant non-automated sortkeys",
          "parents": [
            "Terms with non-redundant non-automated sortkeys",
            "Entry maintenance"
          ],
          "source": "w"
        },
        {
          "kind": "topical",
          "langcode": "en",
          "name": "Cryptography",
          "orig": "en:Cryptography",
          "parents": [
            "Computer science",
            "Formal sciences",
            "Mathematics",
            "Computing",
            "Sciences",
            "Technology",
            "All topics",
            "Fundamental"
          ],
          "source": "w"
        },
        {
          "kind": "topical",
          "langcode": "en",
          "name": "Torture",
          "orig": "en:Torture",
          "parents": [
            "Violence",
            "Human behaviour",
            "Human",
            "All topics",
            "Fundamental"
          ],
          "source": "w"
        }
      ],
      "examples": [
        {
          "ref": "2003, Dennis Kügler, “An Analysis of GNUnet”, in Privacy Enhancing Technologies: Third International Workshop, edited by Roger Dingledine, Springer Science & Business Media, page 175",
          "text": "We have shown that GNUnet is vulnerable to rubber-hose cryptanalysis, but we additionally have presented an efficient content filter for GNUnet. If content filtering is legally enforced, censoring GNUnet is possible at a very large scale.",
          "type": "quotation"
        },
        {
          "ref": "2005, Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch, Stealing the Network: How to Own an Identity: How to Own an Identity, Syngress, page 279",
          "text": "Catherine scooted out of the way, giving Terry access to the keyboard. With a labored sigh, Terry began searching the encrypted text. “I could try a ciphertext-only attack,” he mumbled to no one in particular. “Then again,” he glared at the attacker and continued, “I could always try rubber-hose cryptanalysis.” He thought for a moment. “I don't need a total break; I'm only interested in information deduction. Let me check the swap file.”",
          "type": "quotation"
        },
        {
          "ref": "2010, Hazarathaiah Malepati, Digital Media Processing: DSP Algorithms Using C, Newnes, page 18",
          "text": "Other types of cryptanalytic attacks include chosen cipher text, chosen key, rubber hose cryptanalysis, and purchase key. Algorithms differ by degrees of security; this depends on how hard they are to break.",
          "type": "quotation"
        }
      ],
      "glosses": [
        "The extraction of cryptographic secrets by coercion or torture."
      ],
      "id": "en-rubber-hose_cryptanalysis-en-noun-w91vLDUc",
      "links": [
        [
          "cryptography",
          "cryptography"
        ],
        [
          "extraction",
          "extraction"
        ],
        [
          "cryptographic",
          "cryptographic"
        ],
        [
          "secret",
          "secret"
        ],
        [
          "coercion",
          "coercion"
        ],
        [
          "torture",
          "torture"
        ]
      ],
      "raw_glosses": [
        "(cryptography, euphemistic) The extraction of cryptographic secrets by coercion or torture."
      ],
      "tags": [
        "euphemistic",
        "uncountable"
      ],
      "topics": [
        "computing",
        "cryptography",
        "engineering",
        "mathematics",
        "natural-sciences",
        "physical-sciences",
        "sciences"
      ],
      "wikipedia": [
        "rubber-hose cryptanalysis"
      ]
    }
  ],
  "word": "rubber-hose cryptanalysis"
}
{
  "etymology_text": "Referring to the use of a rubber hose as a weapon with which to beat an individual.",
  "head_templates": [
    {
      "args": {
        "1": "-",
        "head": "rubber-hose cryptanalysis"
      },
      "expansion": "rubber-hose cryptanalysis (uncountable)",
      "name": "en-noun"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "noun",
  "senses": [
    {
      "categories": [
        "English entries with incorrect language header",
        "English entries with topic categories using raw markup",
        "English euphemisms",
        "English lemmas",
        "English multiword terms",
        "English nouns",
        "English terms with non-redundant non-automated sortkeys",
        "English terms with quotations",
        "English uncountable nouns",
        "en:Cryptography",
        "en:Torture"
      ],
      "examples": [
        {
          "ref": "2003, Dennis Kügler, “An Analysis of GNUnet”, in Privacy Enhancing Technologies: Third International Workshop, edited by Roger Dingledine, Springer Science & Business Media, page 175",
          "text": "We have shown that GNUnet is vulnerable to rubber-hose cryptanalysis, but we additionally have presented an efficient content filter for GNUnet. If content filtering is legally enforced, censoring GNUnet is possible at a very large scale.",
          "type": "quotation"
        },
        {
          "ref": "2005, Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch, Stealing the Network: How to Own an Identity: How to Own an Identity, Syngress, page 279",
          "text": "Catherine scooted out of the way, giving Terry access to the keyboard. With a labored sigh, Terry began searching the encrypted text. “I could try a ciphertext-only attack,” he mumbled to no one in particular. “Then again,” he glared at the attacker and continued, “I could always try rubber-hose cryptanalysis.” He thought for a moment. “I don't need a total break; I'm only interested in information deduction. Let me check the swap file.”",
          "type": "quotation"
        },
        {
          "ref": "2010, Hazarathaiah Malepati, Digital Media Processing: DSP Algorithms Using C, Newnes, page 18",
          "text": "Other types of cryptanalytic attacks include chosen cipher text, chosen key, rubber hose cryptanalysis, and purchase key. Algorithms differ by degrees of security; this depends on how hard they are to break.",
          "type": "quotation"
        }
      ],
      "glosses": [
        "The extraction of cryptographic secrets by coercion or torture."
      ],
      "links": [
        [
          "cryptography",
          "cryptography"
        ],
        [
          "extraction",
          "extraction"
        ],
        [
          "cryptographic",
          "cryptographic"
        ],
        [
          "secret",
          "secret"
        ],
        [
          "coercion",
          "coercion"
        ],
        [
          "torture",
          "torture"
        ]
      ],
      "raw_glosses": [
        "(cryptography, euphemistic) The extraction of cryptographic secrets by coercion or torture."
      ],
      "tags": [
        "euphemistic",
        "uncountable"
      ],
      "topics": [
        "computing",
        "cryptography",
        "engineering",
        "mathematics",
        "natural-sciences",
        "physical-sciences",
        "sciences"
      ],
      "wikipedia": [
        "rubber-hose cryptanalysis"
      ]
    }
  ],
  "word": "rubber-hose cryptanalysis"
}

This page is a part of the kaikki.org machine-readable English dictionary. This dictionary is based on structured data extracted on 2024-04-26 from the enwiktionary dump dated 2024-04-21 using wiktextract (93a6c53 and 21a9316). The data shown on this site has been post-processed and various details (e.g., extra categories) removed, some information disambiguated, and additional data merged from other sources. See the raw data download page for the unprocessed wiktextract data.

If you use this data in academic research, please cite Tatu Ylonen: Wiktextract: Wiktionary as Machine-Readable Structured Data, Proceedings of the 13th Conference on Language Resources and Evaluation (LREC), pp. 1317-1325, Marseille, 20-25 June 2022. Linking to the relevant page(s) under https://kaikki.org would also be greatly appreciated.