Перевод: с английского на арабский

с арабского на английский

cryptographic+security

  • 1 RSA

    "A public-key encryption standard for Internet security. It is the default cryptographic service provider (CSP) for Microsoft Windows. It was patented by RSA Data Security, Inc. in 1977. This acronym derives from the last names of the inventors of the technology: Rivest, Shamir, and Adleman."

    English-Arabic terms dictionary > RSA

  • 2 PKCS #7

    "The Cryptographic Message Syntax Standard. It is a general syntax, developed and maintained by RSA Data Security, Inc., for data to which cryptography may be applied, such as digital signatures and encryption. It also provides a syntax for disseminating certificates or certificate revocation lists."
    PKCS#7

    English-Arabic terms dictionary > PKCS #7

  • 3 Public Key Cryptography Standards

    "A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc."

    English-Arabic terms dictionary > Public Key Cryptography Standards

  • 4 Suite B

    A set of cryptographic algorithms specified by the US National Security Agency to provide an interoperable standard for government and industry.

    English-Arabic terms dictionary > Suite B

См. также в других словарях:

  • Security token — Several types of security tokens with a penny for scale …   Wikipedia

  • Cryptographic Modernization Program — The Cryptographic Modernization Program is a Department of Defense directed, NSA Information Assurance Directorate led effort to transform and modernize Information Assurance capabilities for the 21st century. It has three phases: Replacement All …   Wikipedia

  • Security and Trust Services API for J2ME — The Security and Trust Services API for J2ME (SATSA) is a collection of Java ME based APIs that provides compliant devices with additional cryptographic security features. It permits the communication of a Java ME application with a smartcard… …   Wikipedia

  • Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… …   Wikipedia

  • Cryptographic primitive — Cryptographic primitives are well established, low level cryptographic algorithms that are frequently used to build computer security systems. These routines include, but are not limited to, one way hash functions and encryption functions.… …   Wikipedia

  • Security management — is a broad field of management related to asset management, physical security and human resource safety functions. It entails the identification of an organization s information assets and the development, documentation and implementation of… …   Wikipedia

  • Cryptographic log on — (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user s identification to a workstation and network. It replaces the username and passwords for identifying and… …   Wikipedia

  • Cryptographic Message Syntax — (CMS) ist ein Standard vom IETF für gesicherte kryptographische Mitteilungen. CMS ist die Obermenge des PKCS #7 (Public Key Cryptography Standards #7) welche auf S/MIME aufsetzt. Der Version 2 lag der gleiche Standard zugrunde. Ab Version 3… …   Deutsch Wikipedia

  • Security software — is a generic term referring to any computer program or library whose purpose is to (help) secure a computer system or computer network.* Antivirus software * Cryptographic software * Firewall * Spyware remover * Any Operating system security… …   Wikipedia

  • Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… …   Wikipedia

  • Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»