-
1 encryption-key management
Универсальный англо-русский словарь > encryption-key management
-
2 encryption-key management
управление криптографическими ключами, ведение ключевой системы; операции с ключами, ключевые процедурыАнгло-русский словарь по компьютерной безопасности > encryption-key management
-
3 encryption is easy, but key management is hard (old saying in the cryptography business)
- шифровать легко, трудно ключами управлять
шифровать легко, трудно ключами управлять
(старинная поговорка у криптографов)
—
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
- encryption is easy, but key management is hard (old saying in the cryptography business)
Англо-русский словарь нормативно-технической терминологии > encryption is easy, but key management is hard (old saying in the cryptography business)
-
4 management
(административное) управление; руководствоАнгло-русский словарь по компьютерной безопасности > management
-
5 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
6 device
прибор; аппарат; устройство; (техническое) средство- wireless bugging device -
7 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
8 unit
1) устройство: (функциональный) блок2) единица -
9 scheme
Syn: scheme -
10 module
модуль; блок -
11 program
Англо-русский словарь по компьютерной безопасности > program
-
12 standard
1) стандарт2) стандартныйАнгло-русский словарь по компьютерной безопасности > standard
-
13 mechanism
механизм, устройствоАнгло-русский словарь по компьютерной безопасности > mechanism
-
14 service
служба; сервис, обслуживание; услугиАнгло-русский словарь по компьютерной безопасности > service
-
15 protocol
Англо-русский словарь по компьютерной безопасности > protocol
-
16 procedure
процедура; образ действияАнгло-русский словарь по компьютерной безопасности > procedure
-
17 channel
канал (связи, передачи информации)Англо-русский словарь по компьютерной безопасности > channel
См. также в других словарях:
AACS encryption key controversy — A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing demand letters[1] to websites… … Wikipedia
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia
Internet Security Association and Key Management Protocol — ISAKMP (Internet Security Association and Key Management Protocol) is a protocol for establishing Security Associations (SA) and cryptographic keys in an Internet environment. The protocol is defined by RFC 2408. Overview ISAKMP defines the… … Wikipedia
Simple Key-Management for Internet Protocol — or SKIP is a protocol developed by the IETF Security Working Group for the sharing of encryption keys.Skip is hybrid Key distribution protocol Simple Key Management for Internet Protocols (SKIP) is similar to SSL, except that it requires no prior … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Encryption — Encrypt redirects here. For the film, see Encrypt (film). This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography. In cryptography, encryption is the process of… … Wikipedia
Key selection vector — The Key Selection Vector means the numerical associated with a Device Key Set and distributed by Licensor or its designee to Adopters and used to support authentication of Licensed Products and Revocation. It is considered a confidential set of… … Wikipedia
NSA encryption systems — The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA approved systems are still classified, but much more about its early systems has become … Wikipedia
Derived unique key per transaction — In cryptography, Derived Unique Key Per Transaction (DUKPT) is a key management scheme in which for every transaction, a unique key is used which is derived from a fixed key. Therefore, if a derived key is compromised, future and past transaction … Wikipedia
Cryptographic key types — One of the most important aspects of any cryptographic system is key management; it is also the aspect which is most often neglected.[citation needed] A very common mistake is mixing different key types and reusing the same key for different… … Wikipedia