-
1 running key cipher
шифр с динамическим ключом
шифр с бегущим ключом
—
[ http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=4159]Тематики
Синонимы
EN
Англо-русский словарь нормативно-технической терминологии > running key cipher
-
2 running key cipher
-
3 running-key cipher
Электроника: шифр с бегущим ключом -
4 running key cipher
Англо-русский словарь по компьютерной безопасности > running key cipher
-
5 running-key -cipher
English-Russian electronics dictionary > running-key -cipher
-
6 running-key-cipher
The New English-Russian Dictionary of Radio-electronics > running-key-cipher
-
7 running key cipher
szyfr z bieżącym kluczemEnglish-Polish dictionary for engineers > running key cipher
-
8 running key cipher
szyfr z bieżącym kluczemEnglish-Polish dictionary of Electronics and Computer Science > running key cipher
-
9 running key cipher
1) шифр с динамическим [бегущим] ключом2) шифр с одинаковой длиной ключа и сообщенияEnglish-Russian cryptological dictionary > running key cipher
-
10 running-key cipher
English-Russian dictionary of electronics > running-key cipher
-
11 running-key cipher
English-Russian dictionary of telecommunications > running-key cipher
-
12 cipher
-
13 cipher
1) шифр || шифровать2) ключ к шифру3) (арабская) цифра || представлять в цифровом виде; проф. оцифровывать4) вычислять5) комбинация букв (напр. инициалы)6) нуль•- asymmetric cipher
- authenticating block cipher
- back-door cipher
- block cipher
- breakable cipher
- broken cipher
- Caesar cipher
- codebook cipher
- codebook-style cipher
- conceptually different ciphers
- conventional cipher
- cylinder cipher
- Diffie-Hellman cipher
- dynamic cipher
- dynamically-keyed block cipher
- dynamic-transposition block cipher
- exclusive OR stream cipher
- Feistel cipher
- full-size cipher
- gamming cipher
- general stream cipher
- homomorphic block cipher
- homophonic cipher
- iterative cipher
- meta-cipher
- mixing cipher
- monoalphabetic cipher
- monographic cipher
- permutation cipher
- Playfair cipher
- polyalphabetic cipher
- polygraphic cipher
- polyphonic cipher
- product cipher
- public-key cipher
- running-key -cipher
- scalable cipher
- secret cipher
- secret key cipher
- self-synchronizing cipher
- S-P cipher
- stream cipher
- stream-generator cipher
- stream meta-cipher
- strong cipher
- substitution cipher
- substitution-permutation cipher
- symmetric cipher
- transposition cipher
- two-key cipher
- unbreakable cipher
- variable size block cipher -
14 cipher
1) шифр || шифровать2) ключ к шифру3) (арабская) цифра || представлять в цифровом виде; проф. оцифровывать4) вычислять5) комбинация букв (напр. инициалы)6) нуль•- asymmetric cipher
- authenticating block cipher
- back-door cipher
- block cipher
- breakable cipher
- broken cipher
- Caesar cipher
- codebook cipher
- codebook-style cipher
- conceptually different ciphers
- conventional cipher
- cylinder cipher
- Diffie-Hellman cipher
- dynamic cipher
- dynamically-keyed block cipher
- dynamic-transposition block cipher
- exclusive OR stream cipher
- Feistel cipher
- full-size cipher
- gamming cipher
- general stream cipher
- homomorphic block cipher
- homophonic cipher
- iterative cipher - monoalphabetic cipher
- monographic cipher
- permutation cipher
- Playfair cipher
- polyalphabetic cipher
- polygraphic cipher
- polyphonic cipher
- product cipher
- public-key cipher
- running-key-cipher
- scalable cipher
- secret cipher
- secret key cipher
- self-synchronizing cipher
- S-P cipher
- stream cipher - strong cipher
- substitution cipher
- substitution-permutation cipher
- symmetric cipher
- transposition cipher
- two-key cipher
- unbreakable cipher
- variable size block cipherThe New English-Russian Dictionary of Radio-electronics > cipher
-
15 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
16 szyfr z bieżącym kluczem
• running key cipherSłownik polsko-angielski z Elektroniki i Informatyki > szyfr z bieżącym kluczem
-
17 szyfr z bieżącym kluczem
• running key cipherSłownik polsko-angielski dla inżynierów > szyfr z bieżącym kluczem
-
18 шифр с динамическим ключом
шифр с динамическим ключом
шифр с бегущим ключом
—
[ http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=4159]Тематики
Синонимы
EN
Русско-английский словарь нормативно-технической терминологии > шифр с динамическим ключом
-
19 шифр с бегущим ключом
Electronics: running-key cipherУниверсальный русско-английский словарь > шифр с бегущим ключом
-
20 шифр с динамическим ключом
Security: running key cipherУниверсальный русско-английский словарь > шифр с динамическим ключом
- 1
- 2
См. также в других словарях:
Running key cipher — In classical cryptography, the running key cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream. Usually, the book to be used would be agreed ahead of time, while… … Wikipedia
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
Book cipher — A book cipher is a cipher in which the key is some aspect of a book or other piece of text; books being common and widely available in modern times, users of book ciphers take the position that the details of the key is sufficiently well hidden… … Wikipedia
Stream cipher attack — Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive or operation (xor), can be very secure if used properly. However they are vulnerable to attack if certain precautions are not followed:*keys must never be… … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Vigenère cipher — The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.The Vigenère (pronEng|ˌviːdʒɪˈnɛəɹ, veedj ih nair )… … Wikipedia
Hill cipher — Hill s cipher machine, from figure 4 of the patent In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. Invented by Lester S. Hill in 1929, it was the first polygraphic cipher in which it was… … Wikipedia
Transposition cipher — In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext… … Wikipedia
Classical cipher — A cipher is a means of concealing a message, where letters of the message are substituted or transposed for other letters, letter pairs, and sometimes for many letters. In cryptography, a classical cipher is a type of cipher that was used… … Wikipedia
Caesar cipher — The action of a Caesar cipher is to replace each plaintext letter with one fixed number of places down the alphabet. This example is with a shift of three, so that a B in the p … Wikipedia
Pigpen cipher — The pigpen cipher uses graphical symbols assigned according to a key similar to the above diagram.[1] The pigpen cipher (sometimes referred to as the masonic cipher, Freemason s cipher, Rosicrucian cipher, or Tic tac toe cipher) … Wikipedia