-
1 secret-key cipher
Англо-русский словарь нормативно-технической терминологии > secret-key cipher
-
2 secret key cipher
шифр с секретным ключом, симметричный шифр - см. symmetric cipherАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > secret key cipher
-
3 secret key cipher
Безопасность: шифр с секретным ключом зашифрования и расшифрования -
4 secret key cipher
Англо-русский словарь по компьютерной безопасности > secret key cipher
-
5 secret key cipher
шифр с секретным ключом, симметричный шифр -
6 secret key cipher
шифр с секретным ключом, симметричный шифрThe New English-Russian Dictionary of Radio-electronics > secret key cipher
-
7 cipher
1) шифр || шифровать2) ключ к шифру3) (арабская) цифра || представлять в цифровом виде; проф. оцифровывать4) вычислять5) комбинация букв (напр. инициалы)6) нуль•- asymmetric cipher
- authenticating block cipher
- back-door cipher
- block cipher
- breakable cipher
- broken cipher
- Caesar cipher
- codebook cipher
- codebook-style cipher
- conceptually different ciphers
- conventional cipher
- cylinder cipher
- Diffie-Hellman cipher
- dynamic cipher
- dynamically-keyed block cipher
- dynamic-transposition block cipher
- exclusive OR stream cipher
- Feistel cipher
- full-size cipher
- gamming cipher
- general stream cipher
- homomorphic block cipher
- homophonic cipher
- iterative cipher
- meta-cipher
- mixing cipher
- monoalphabetic cipher
- monographic cipher
- permutation cipher
- Playfair cipher
- polyalphabetic cipher
- polygraphic cipher
- polyphonic cipher
- product cipher
- public-key cipher
- running-key -cipher
- scalable cipher
- secret cipher
- secret key cipher
- self-synchronizing cipher
- S-P cipher
- stream cipher
- stream-generator cipher
- stream meta-cipher
- strong cipher
- substitution cipher
- substitution-permutation cipher
- symmetric cipher
- transposition cipher
- two-key cipher
- unbreakable cipher
- variable size block cipher -
8 cipher
1) шифр || шифровать2) ключ к шифру3) (арабская) цифра || представлять в цифровом виде; проф. оцифровывать4) вычислять5) комбинация букв (напр. инициалы)6) нуль•- asymmetric cipher
- authenticating block cipher
- back-door cipher
- block cipher
- breakable cipher
- broken cipher
- Caesar cipher
- codebook cipher
- codebook-style cipher
- conceptually different ciphers
- conventional cipher
- cylinder cipher
- Diffie-Hellman cipher
- dynamic cipher
- dynamically-keyed block cipher
- dynamic-transposition block cipher
- exclusive OR stream cipher
- Feistel cipher
- full-size cipher
- gamming cipher
- general stream cipher
- homomorphic block cipher
- homophonic cipher
- iterative cipher - monoalphabetic cipher
- monographic cipher
- permutation cipher
- Playfair cipher
- polyalphabetic cipher
- polygraphic cipher
- polyphonic cipher
- product cipher
- public-key cipher
- running-key-cipher
- scalable cipher
- secret cipher
- secret key cipher
- self-synchronizing cipher
- S-P cipher
- stream cipher - strong cipher
- substitution cipher
- substitution-permutation cipher
- symmetric cipher
- transposition cipher
- two-key cipher
- unbreakable cipher
- variable size block cipherThe New English-Russian Dictionary of Radio-electronics > cipher
-
9 cipher
-
10 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
11 cipher
I ['saɪfə(r)]1) (code) cifra f., codice m.2) mat. inform. zero m.3) (monogram) monogramma m., cifra f.II ['saɪfə(r)]verbo transitivo cifrare [ message]* * *(secret writing; a code: The message was written in cipher.) scrittura cifrata* * *cipher /ˈsaɪfə(r)/n.2 (mat., antiq.) zero; (fig.) persona di nessun conto; nullità3 cifrario4 monogramma; (lettere) iniziali intrecciate● cipher code, cifrario □ cipher key, chiave di cifra; cifrario □ cipher language, linguaggio cifrato □ cipher machine, congegno usato per decifrare testi in cifra; decifratore ( macchina) □ (comput.) cipher text, ► ciphertext.(to) cipher /ˈsaɪfə(r)/A v. i.B v. t.* * *I ['saɪfə(r)]1) (code) cifra f., codice m.2) mat. inform. zero m.3) (monogram) monogramma m., cifra f.II ['saɪfə(r)]verbo transitivo cifrare [ message] -
12 cipher
(secret writing; a code: The message was written in cipher.) kode, chifferskriftingenting--------null--------sifferIsubst. \/ˈsaɪfə\/ eller cypher1) siffer, talltegn2) chiffer, kodet skrift3) ( også cipher key) chiffernøkkel4) monogram5) ( overført) null, betydningsløs person6) (gammeldags, matematikk) nullbreak a cipher knekke en chifferkodein cipher chifrert, kodetIIverb \/ˈsaɪfə\/1) chifrere, kode2) regne ut -
13 symmetric cipher
шифр, построенный на симметричном алгоритме (symmetric algorithm) для шифрования и дешифрования.Syn:Ant:Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > symmetric cipher
-
14 flexible cipher
шифр, описываемый как набор криптоалгоритмов, выбираемых в зависимости от секретного ключа.Syn:Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > flexible cipher
-
15 public key algorithm
"An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message." -
16 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
17 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
18 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
19 system
1) система || системный3) вчт операционная система; программа-супервизор5) вчт большая программа6) метод; способ; алгоритм•system halted — "система остановлена" ( экранное сообщение об остановке компьютера при наличии серьёзной ошибки)
- CPsystem- H-system- h-system- hydrogen-air/lead battery hybrid system- Ksystem- Lsystem- L*a*b* system- master/slave computer system- p-system- y-system- Δ-system -
20 encryption
a) прибор шифрования (обозначение в схеме)b) (encryption)1) шифрование; зашифрование; операция (за) шифрования2) криптография; криптографическая защита; криптографическое сокрытие информации3) шифротекст- hardware encryption- hardware assisted encryptionАнгло-русский словарь по компьютерной безопасности > encryption
- 1
- 2
См. также в других словарях:
Running key cipher — In classical cryptography, the running key cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream. Usually, the book to be used would be agreed ahead of time, while… … Wikipedia
Secret-Key-Kryptosystem — Verschlüsselung Entschlüsselung Ein symmetrisches Kryptosystem ist ein Kryptosystem, welches im Gegensatz zu einem asymmetrischen Kryptos … Deutsch Wikipedia
RSA Secret-Key Challenge — The RSA Secret Key Challenge was a series of cryptographic contests that were started by RSA Laboratories on January 28, 1997 with the intent of helping to demonstrate the relative security of different encryption algorithms. The RSA Secret Key… … Wikipedia
cipher — cipherable, adj. cipherer, n. /suy feuhr/, n. 1. zero. 2. any of the Arabic numerals or figures. 3. Arabic numerical notation collectively. 4. something of no value or importance. 5. a person of no influence; nonentity. 6. a secret method of… … Universalium
cipher key — noun A key to a cipher or piece of secret writing • • • Main Entry: ↑cipher … Useful english dictionary
cipher — [sī′fər] n. [ME cifre < OFr cyfre < ML cifra < Ar ṣifr, ṣefr, a cipher, nothing < ṣafara, to be empty] 1. the symbol 0, indicating a value of zero 2. a person or thing of no importance or value 3. a) a system of secret writing based… … English World dictionary
secret — [adj1] hidden, unrevealed abstruse, ambiguous, arcane, backdoor, camouflaged, classified, cloak and dagger*, close, closet, clouded, conspiratorial, covered, covert, cryptic, dark, deep, disguised, enigmatical, esoteric, furtive, hush hush*,… … New thesaurus
Cipher — For other uses, see Cipher (disambiguation). Edward Larsson s rune cipher resembling that found on the Kensington Runestone. Also includes runically unrelated blackletter writing style and pigpen cipher. In cryptography, a cipher (or cypher) is… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Cipher suite — A cipher suite is a named combination of authentication, encryption, and message authentication code (MAC) algorithms used to negotiate the security settings for a network connection using the Transport Layer Security (TLS) or Secure Sockets… … Wikipedia