-
1 hash authentication
English-Russian electronics dictionary > hash authentication
-
2 hash authentication
The New English-Russian Dictionary of Radio-electronics > hash authentication
-
3 authentication
2) имитостойкость (лишение противника возможности ввести ложную информацию в канал связи или изменить смысл передаваемого сообщения)•- biometric authentication
- challenge-handshake authentication
- challenge-response authentication
- hash authentication
- ID card authentication
- identification card authentication
- key authentication
- message authentication
- net authentication
- odor authentication
- password authentication
- station authentication -
4 authentication
2) имитостойкость (лишение противника возможности ввести ложную информацию в канал связи или изменить смысл передаваемого сообщения)•- biometric authentication
- challenge-handshake authentication
- challenge-response authentication
- hash authentication
- ID card authentication
- identification card authentication
- key authentication
- message authentication
- net authentication
- odor authentication
- password authentication
- station authenticationThe New English-Russian Dictionary of Radio-electronics > authentication
-
5 keyed-hash message authentication code
- код аутентификации сообщения, использующий хеш-функцию
код аутентификации сообщения, использующий хеш-функцию
(МСЭ-Т Н.235.8).
[ http://www.iks-media.ru/glossary/index.html?glossid=2400324]Тематики
- электросвязь, основные понятия
EN
Англо-русский словарь нормативно-технической терминологии > keyed-hash message authentication code
-
6 function
- function D- function EАнгло-русский словарь по компьютерной безопасности > function
-
7 code
-
8 HMAC
- код аутентификации сообщения, использующий хэш-функцию
- код аутентификации сообщения, использующий хеш-функцию
- ключевое хэширование для идентификации сообщения
ключевое хэширование для идентификации сообщения
(МСЭ-Т J.125).
[ http://www.iks-media.ru/glossary/index.html?glossid=2400324]Тематики
- электросвязь, основные понятия
EN
код аутентификации сообщения, использующий хеш-функцию
(МСЭ-Т Н.235.8).
[ http://www.iks-media.ru/glossary/index.html?glossid=2400324]Тематики
- электросвязь, основные понятия
EN
код аутентификации сообщения, использующий хэш-функцию
(МСЭ-Т Н.235.3, МСЭ-Т Н.235.1).
[ http://www.iks-media.ru/glossary/index.html?glossid=2400324]Тематики
- электросвязь, основные понятия
EN
Англо-русский словарь нормативно-технической терминологии > HMAC
-
9 algorithm
1) алгоритм2) правило; процедура; метод•- adaptive algorithm
- Agarval-Cooley algorithm
- aim algorithm
- annealing algorithm
- asymmetric encryption algorithm
- autoregressive algorithm
- backoff algorithm
- back propagation of error algorithm
- batch algorithm
- Bellman-Ford algorithm
- best cost path algorithm
- bisection algorithm
- branch and bound algorithm - CART algorithm
- channel algorithm
- channel routing algorithm
- Cholesky algorithm
- classification and regression tree algorithm
- clustering algorithm
- Cochran-Orcutt algorithm
- compression algorithm
- conjugate directions algorithm
- conjugate gradients algorithm
- constructive algorithm
- contour following algorithm
- control algorithm
- convolution algorithm
- Cooley-Tuckey algorithm
- cryptographic algorithm
- deflation compression algorithm
- differential synthesis algorithm
- Diffie-Hellman algorithm
- digital signal processing algorithm
- digital signature algorithm
- Dijkstra algorithm
- distance vector algorithm
- DSP algorithm
- dynamic programming algorithm
- edge-tracking algorithm
- evolutionary algorithm
- exact embedding algorithm
- expansion algorithm
- fast algorithm
- fast convolution Agarval-Cooley algorithm
- fixed-weight algorithm
- Ford-Fulkerson algorithm
- fundamental algorithm
- fuzzy algorithm
- general algorithm - greedy algorithm
- Gummel's algorithm
- hashing algorithm
- heuristic algorithm
- ID3 algorithm
- identification algorithm
- initialization algorithm
- integer algorithm - iterative dichotomizer 3 algorithm
- k-means algorithm
- learning algorithm
- least frequently used algorithm
- least recently used algorithm
- Lee-Moore algorithm
- Lee algorithm
- Lee-type algorithm
- Lempel-Ziv algorithm
- Lempel-Ziv-Welch algorithm
- Levenberg-Marquardt algorithm
- LFU algorithm
- line-probe algorithm
- link state algorithm
- LU decomposition algorithm
- LZ algorithm
- LZW algorithm
- MacQueen's k-means algorithm
- McCulloch-Pitts algorithm
- memetic algorithm - min-cut algorithm - nested algorithm
- numerical algorithm
- Oja iterative algorithm
- on-line algorithm
- optimization algorithm
- ordering algorithm
- painter's algorithm
- parallel algorithm
- pattern classification algorithm
- pattern recognition algorithm
- pel-recursive estimation algorithm
- placement algorithm
- planning algorithm
- polynomial algorithm
- predictive algorithm
- preemptive algorithm
- Prim algorithm
- production rule based algorithm
- pruning algorithm
- pseudo least recently used algorithm
- quantum search algorithm
- quick-union algorithm
- quick-union algorithm with path compression
- Q-R-algorithm
- radix sorting algorithm
- randomized algorithm
- rank algorithm
- Read-Solomon cyclic redundancy compression algorithm
- recognition algorithm
- recurrent algorithm
- recursive algorithm
- resilient propagation algorithm - routing algorithm
- Rprop algorithm
- RSA algorithm
- scheduling algorithm
- search algorithm
- search network algorithm - self-organizing algorithm
- semi-numerical algorithm
- sequential algorithm - shortest path algorithm
- sieving algorithm
- simulated annealing training algorithm
- simulation algorithm
- smoothing algorithm
- software algorithm
- spanning tree algorithm
- spline algorithm
- splitting algorithm
- stack algorithm
- statistical algorithm
- stochastic algorithm
- supervised training algorithm
- symmetric encryption algorithm
- time-wheel algorithm
- training algorithm
- universal algorithm
- unsupervised training algorithm
- van der Waerden algorithm
- variational algorithm
- vector distance algorithm
- Viterbi algorithm
- VLSI algorithm
- weighted quick-union algorithm
- working algorithm -
10 attack
1) (агрессивное) (воз)действие среды || оказывать (агрессивное) действие ( о среде)2) коррозия || вызывать коррозию3) бомбардировка (напр. ионная) бомбардировать (напр. ионами)4) вчт атака (1. внезапные согласованные действия группы лиц с целью несанкционированного проникновения в защищённую систему или сеть 2. попытка злоумышленника нарушить нормальный ход информационного процесса 3. начало музыкальной фразы 4. манера исполнения начала музыкальной фразы) || атаковать•- adaptive chosen plaintext attack
- algebraic attack
- birthday attack
- brute force attack
- chemical attack
- chosen key attack
- chosen plaintext attack
- chosen text attack
- ciphertext only attack
- codebook attack
- correlation attack
- cryptoanalytic attack
- defined ciphertext attack
- deposit attack
- dictionary attack
- differential cryptoanalysis attack
- divide-and-conquer attack
- Einstein-Podolsky-Rosen attack
- electrolytic attack
- electronic attack
- EPR attack
- exhaustive key search attack
- fault analysis attack
- formal coding attack
- hacker attack
- hash attack
- key authentication attack
- key schedule attack
- known plaintext attack
- linear cryptoanalysis attack
- man-in-the-middle attack
- meet-in-the-middle attack
- MITM attack
- replay attack
- timing attack -
11 algorithm
1) алгоритм2) правило; процедура; метод•- Agarval-Cooley algorithm
- aim algorithm
- algorithm of doubtful convergence
- annealing algorithm
- asymmetric encryption algorithm
- autoregressive algorithm
- back propagation of error algorithm
- backoff algorithm
- batch algorithm
- Bellman-Ford algorithm
- best cost path algorithm
- bisection algorithm
- branch and bound algorithm
- British Telecom Lempel-Ziv algorithm
- BTLZ algorithm
- CART algorithm
- channel algorithm
- channel routing algorithm
- Cholesky algorithm
- classification and regression tree algorithm
- clustering algorithm
- Cochran-Orcutt algorithm
- compression algorithm
- conjugate directions algorithm
- conjugate gradients algorithm
- constructive algorithm
- contour following algorithm
- control algorithm
- convolution algorithm
- Cooley-Tuckey algorithm
- cryptographic algorithm
- deflation compression algorithm
- differential synthesis algorithm
- Diffie-Hellman algorithm
- digital signal processing algorithm
- digital signature algorithm
- Dijkstra algorithm
- distance vector algorithm
- DSP algorithm
- dynamic programming algorithm
- edge-tracking algorithm
- evolutionary algorithm
- exact embedding algorithm
- expansion algorithm
- fast algorithm
- fast convolution Agarval-Cooley algorithm
- fixed-weight algorithm
- Ford-Fulkerson algorithm
- fundamental algorithm
- fuzzy algorithm
- general algorithm
- genetic algorithm
- graph search algorithm
- greedy algorithm
- Gummel's algorithm
- hashing algorithm
- heuristic algorithm
- ID3 algorithm
- identification algorithm
- initialization algorithm
- integer algorithm
- international data encryption algorithm
- iterative algorithm
- iterative dichotomizer 3 algorithm
- k-means algorithm
- learning algorithm
- least frequently used algorithm
- least recently used algorithm
- Lee-algorithm
- Lee-Moore algorithm
- Lee-type algorithm
- Lempel-Ziv algorithm
- Lempel-Ziv-Welch algorithm
- Levenberg-Marquardt algorithm
- LFU algorithm
- line-probe algorithm
- link state algorithm
- LU decomposition algorithm
- LZ algorithm
- LZW algorithm
- MacQueen's k-means algorithm
- McCulloch-Pitts algorithm
- memetic algorithm
- message authentication algorithm
- metaheuristic algorithm
- min-cut algorithm
- modified Gram-Schmidt algorithm
- Nelder-Mead simplex algorithm
- nested algorithm
- numerical algorithm
- Oja iterative algorithm
- on-line algorithm
- optimization algorithm
- ordering algorithm
- painter's algorithm
- parallel algorithm
- pattern classification algorithm
- pattern recognition algorithm
- pel-recursive estimation algorithm
- placement algorithm
- planning algorithm
- polynomial algorithm
- predictive algorithm
- preemptive algorithm
- Prim algorithm
- production rule based algorithm
- pruning algorithm
- pseudo least recently used algorithm
- Q-R-algorithm
- quantum search algorithm
- quick-union algorithm with path compression
- quick-union algorithm
- radix sorting algorithm
- randomized algorithm
- rank algorithm
- Read-Solomon cyclic redundancy compression algorithm
- recognition algorithm
- recurrent algorithm
- recursive algorithm
- resilient propagation algorithm
- Rivest-Shamir-Adleman algorithm
- robust algorithm
- routing algorithm
- RProp algorithm
- RSA algorithm
- scheduling algorithm
- search algorithm
- search network algorithm
- secure hash algorithm
- selective-trace algorithm
- self-organizing algorithm
- semi-numerical algorithm
- sequential algorithm
- sequential leader clustering algorithm
- serial algorithm
- shortest path algorithm
- sieving algorithm
- simulated annealing training algorithm
- simulation algorithm
- smoothing algorithm
- software algorithm
- spanning tree algorithm
- spline algorithm
- splitting algorithm
- stack algorithm
- statistical algorithm
- stochastic algorithm
- supervised training algorithm
- symmetric encryption algorithm
- time-wheel algorithm
- training algorithm
- universal algorithm
- unsupervised training algorithm
- van der Waerden algorithm
- variational algorithm
- vector distance algorithm
- Viterbi algorithm
- VLSI algorithm
- weighted quick-union algorithm
- working algorithmThe New English-Russian Dictionary of Radio-electronics > algorithm
-
12 attack
1) (агрессивное) (воз)действие среды || оказывать (агрессивное) действие ( о среде)2) коррозия || вызывать коррозию3) бомбардировка (напр. ионная) бомбардировать (напр. ионами)4) вчт. атака (1. внезапные согласованные действия группы лиц с целью несанкционированного проникновения в защищённую систему или сеть 2. попытка злоумышленника нарушить нормальный ход информационного процесса 3. начало музыкальной фразы 4. манера исполнения начала музыкальной фразы) || атаковать•- adaptive chosen plaintext attack
- algebraic attack
- birthday attack
- brute force attack
- chemical attack
- chosen key attack
- chosen plaintext attack
- chosen text attack
- ciphertext only attack
- codebook attack
- correlation attack
- cryptoanalytic attack
- defined ciphertext attack
- deposit attack
- dictionary attack
- differential cryptoanalysis attack
- divide-and-conquer attack
- Einstein-Podolsky-Rosen attack
- electrolytic attack
- electronic attack
- EPR attack
- exhaustive key search attack
- fault analysis attack
- formal coding attack
- hacker attack
- hash attack
- key authentication attack
- key schedule attack
- known plaintext attack
- linear cryptoanalysis attack
- man-in-the-middle attack
- meet-in-the-middle attack
- MITM attack
- replay attack
- timing attackThe New English-Russian Dictionary of Radio-electronics > attack
-
13 code
1) код || кодировать3) (машинная) программа || программировать4) код, (машинное) слово (напр., команда)•- absolute code
- abstract code
- access code - address code
- alphanumeric code
- alphameric code
- alphabetical code
- alphabetic code
- amplitude code
- ASA code
- attribute-control code
- augmented operation code - balanced code
- bar code
- baseline code
- basic code
- basic order code
- Baudot code
- binary code
- binary decimal code
- binary-coded decimal code
- biquinary code
- block code
- block structured code
- Bose-Chaudhuri code
- brevity code
- bug-arresting code
- burst error correcting code
- cable code
- call directing code
- call direction code- cap code- character code
- check code
- checkable code
- Chinese binary code
- color code
- column binary code
- comma-free code
- command code
- compiler-produced code
- completion code
- computer code
- conditional code
- condition code
- constant ratio code
- continuous progressive code - convolution code
- convolutional code
- correcting code- CP code- cyclic code
- cyclic permuted code
- data code
- data conversion code
- data link code - dense binary code
- deposited source code
- destination code
- device code
- digital code
- direct code
- directing character code
- dot-and-dash code
- double-error correcting code
- eight channel code
- entry code - error-checking code
- error-control code
- error-correcting code
- error-detecting code
- error-detection code
- error-limited code
- escape code - executable code
- exit code
- exponent code
- extended mneminic code
- external readable code
- factorable code
- false code
- fault code
- feature code
- Fire code
- five bit code
- five channel code
- forbidden-character code
- forbidden code
- format code
- four-adress code
- fragile code
- frequency code
- function code
- Gray code
- group code
- Hamming code
- hash code - Huffman code
- identification code
- identifying code
- illegal code
- improper code
- in-line code
- inner code
- instantaneously decodable code
- instruction code
- internal code
- interpretive code
- inverted code - line code
- linear code
- line-feed code
- lock code
- machine code
- machine-instruction code
- machine-language code
- machine-operation code
- machine-readable code
- machine-treatable code
- magnetic bar code
- magnetic tape code
- Manchester code
- message-format code
- micro code
- minimum-access code
- minimum-delay code
- minimum-distance code
- minimum-latency code
- minimum-redundance code
- mnemonic code
- modified binary code
- modular code
- modulation code - Muller code
- multiple-address code
- multiple-error correcting code
- N-adjacent code
- name code
- N-ary code
- native code
- natural binary code
- N-bit code
- N-error correcting code
- N-level code
- noise combating code
- nonconsistently based code
- nonexistent code
- nonprint code
- nonreproducing code
- non-return-to-zero code
- nonsystematic code
- nonweighted code
- N-place code
- number address code
- number code
- numerical code
- numeric code
- N-unit code
- object code
- one-address code
- one-dimensional code
- one-level code
- one-out-of-ten code
- op code
- operand code
- operation code
- optimum code
- order code
- outer code
- own code
- paired-disparity code
- paper tape code
- parallel code
- parity-checking code
- parity-check code
- perforated tape code
- permutation code
- permuted code
- personal-identification code
- phonetic code
- physical-hardware-dependent code- positional code- position code
- position-independent code
- precedence code
- print restore code - pseudocyclic code
- pseudorandom code
- pulse code
- punched card code
- punched tape code
- pure code
- quibinary code
- ready-to-run code
- recurrent code
- redundant code
- Reed-Muller code
- Reed-Solomon code
- reenterable code
- reentrant code
- reflected binary code
- reflected code
- relative code
- relocatable code
- repertory code
- reproducing code
- residual class code
- residue code
- restricted-magnitude-error correcting code
- retrieval code
- return code
- return-to-zero code
- routing code
- row-binary code
- safety code - self-checking code
- self-complementaring code
- self-complementing code
- self-correcting code
- self-demarcating code
- separable code
- serial code - severity code
- Shannon code
- short computer code
- short code
- sign code
- signal code
- significant-digit subset code - single-address code
- single-error correcting and double-error detecting code
- single-error correcting code
- single-error detecting code
- single-parity code - skip code
- source code
- space code
- space-efficient code
- specific code - status code
- Stone's code
- stop code
- straight binary code
- straight-line code
- strip code
- syllable code
- symbol code
- symbolic code
- systematic error checking code
- tape code
- task code
- telecommunication code
- telegraph code
- teleprinter code
- teletype code
- ternary code
- threaded code
- three-adress code
- throw-away code
- time code
- timing code
- trace back code
- transmission code
- transmitter-start code
- triple-error correcting code
- two-address code
- two-out-of-five code
- two-rail code
- uniquely decipherable code
- uniquely decodable code
- unitary code
- unit-distance code
- unused code
- variable-length code
- viral code - weighted code
- weighted-checksum code - zero-address code
- zone codeEnglish-Russian dictionary of computer science and programming > code
-
14 HMAC
Криптография Hash Message Authentication Code Алгоритм проверки подлинности при помощи криптографических хеш-функций, объединенных с шифрованием с закрытым ключом.English-Russian dictionary of computer abbreviations and terms > HMAC
См. также в других словарях:
Hash chain — In computer security, a hash chain is a method to produce many one time keys from a single key or password. Definition A hash chain is a successive application of a cryptographic hash function h(x) to a string.For example,h(h(h(h(x))))gives a… … Wikipedia
Authentication Header — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
Hash tree — A binary hash tree In cryptography and computer science Hash trees or Merkle trees are a type of data structure[citation needed] which contains a tree of summary information about a larger piece of da … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
Digest access authentication — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia
Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… … Wikipedia
LM hash — Lanman redirects here. For other uses, see Lanman (disambiguation). LM hash, LanMan, or LAN Manager hash was the primary hash that Microsoft LAN Manager and Microsoft Windows versions prior to Windows NT used to store user passwords. Support for… … Wikipedia
Message authentication code — In cryptography, a message authentication code (often MAC) is a short piece of information used to authenticate a message. A MAC algorithm, sometimes called a keyed (cryptographic) hash function, accepts as input a secret key and an arbitrary… … Wikipedia
Data Authentication Algorithm — The Data Authentication Algorithm (DAA) is a former U.S. government standard for producing cryptographic message authentication codes. According to the standard, a code produced by the DAA is called a Data Authentication Code (DAC). The algorithm … Wikipedia
Keyed-Hash Message Authentication Code — Ein Keyed Hash Message Authentication Code (HMAC) ist eine Art Message Authentication Code (MAC), dessen Konstruktion auf einer kryptografischen Hash Funktion basiert. HMACs werden beispielsweise in den Protokollen TLS oder IPsec verwendet. Der… … Deutsch Wikipedia
Kryptologische Hash-Funktion — Eine kryptologische Hashfunktion ist eine spezielle Hashfunktion mit weiteren Eigenschaften. Eine kryptologische Hashfunktion sollte zumindest eine Einwegfunktion sein. Eine Hashfunktion ist eine Funktion, die eine Zeichenfolge beliebiger Länge… … Deutsch Wikipedia