-
1 secrecy cryptosystem
Безопасность: криптосистема для сохранения секретности -
2 secrecy cryptosystem
Англо-русский словарь по компьютерной безопасности > secrecy cryptosystem
-
3 authentication/secrecy cryptosystem
Универсальный англо-русский словарь > authentication/secrecy cryptosystem
-
4 perfect-secrecy cryptosystem
Универсальный англо-русский словарь > perfect-secrecy cryptosystem
-
5 authentication/secrecy cryptosystem
Англо-русский словарь по компьютерной безопасности > authentication/secrecy cryptosystem
-
6 perfect secrecy cryptosystem
безусловно секретная криптосистема; криптосистема, обеспечивающая полную секретностьбезусловно секретная криптосистема; криптосистема, обеспечивающая полную секретностьАнгло-русский словарь по компьютерной безопасности > perfect secrecy cryptosystem
-
7 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
8 cryptosystem for secrecy
Англо-русский словарь по компьютерной безопасности > cryptosystem for secrecy
-
9 cryptography
= crypto(от греч. cryptos - тайный) искусство, наука и технология обеспечения секретности важной информации, её защиты от изменений и неавторизованного доступа при передаче по каналам связи и/или хранении; широко использует математические методы, связанные с большими объёмами вычислений (computationally intensive). История криптографии делится на два периода - донаучный (prescientific) и период научной криптографии, начавшийся в 1949 г. с выхода статьи К. Шеннона (С. Е. Shannon) "Communication Theory of Secrecy Systems". В криптографии предполагается, что противник может перехватить зашифрованное сообщение, но без знания ключа, даже если сам способ шифрования известен, не может прочитать это сообщение в течение времени, определяемом криптографической стойкостью шифра (cryptographic strength).One of the first steps in building a secure embedded system is to see if cryptography is actually needed. — Один из первых шагов в построении безопасной встроенной системы заключается в том, чтобы решить, действительно ли необходима для неё криптография
Ant:Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > cryptography
См. также в других словарях:
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… … Wikipedia
Pearl Harbor advance-knowledge debate — The Pearl Harbor advance knowledge debate is a dispute over what, if any, advance knowledge American officials had of Japan s December 7, 1941 attack on Pearl Harbor.Ever since the Japanese attack there has been debate as to how and why the… … Wikipedia
Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… … Wikipedia
Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… … Wikipedia
Kerckhoffs' principle — In cryptography, Kerckhoffs principle (also called Kerckhoffs assumption, axiom or law) was stated by Auguste Kerckhoffs in the 19th century: a cryptosystem should be secure even if everything about the system, except the key, is public knowledge … Wikipedia
Outline of cryptography — See also: Index of cryptography articles The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the… … Wikipedia
Intelligence cycle management — This article is at the top level of a series of articles about Intelligence Cycle Management.Within the context of government, military and business affairs, intelligence (the gathering and analysis of accurate, reliable information) is intended… … Wikipedia