-
1 weak cipher
Безопасность: легко раскрываемый шифр, некриптостойкий шифр -
2 weak cipher
Англо-русский словарь по компьютерной безопасности > weak cipher
-
3 cipher
-
4 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
5 feedback
обратная связь, ОС- acoustic feedback
- capacitive feedback
- cipher feedback
- combined feedback
- data feedback
- delayless feedback
- digital feedback
- external feedback
- frequency-independent feedback
- inductive feedback
- internal feedback
- local feedback
- main feedback
- negative feedback
- n-stage feedback
- on-off feedback
- optoelectronic feedback
- parallel feedback
- parasitic feedback
- positive feedback
- series feedback
- solving feedback
- spurious feedback
- total feedback
- weak feedbackEnglish-Russian dictionary of telecommunications and their abbreviations > feedback
-
6 code
1) код, шифр || кодировать3) кодекс; свод4) вчт программа || программировать, писать программу5) нормы и правила; правила эксплуатации•to translate the code — преобразовывать код; транслировать программу
- sum code
См. также в других словарях:
Weak key — In cryptography, a weak key is a key which when used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually represent a very small fraction of the overall keyspace, which usually means that if one generates a… … Wikipedia
Cipher security summary — This article summarizes publicly known attacks against ciphers. Note that not all entries may be up to date. Table color key No known successful attacks Theoretical break Attack demonstrated in practice The Best attack column lists the complexity … Wikipedia
Purple (cipher machine) — This article is about the Japanese cipher Purple, also known as AN 1 (citation for AN 1 nomenclature for Purple?). For other Japanese ciphers, such as JN 25 which played a part in the Battle of Midway, see Japanese naval codes. In the history of… … Wikipedia
Blowfish (cipher) — Infobox block cipher name = Blowfish caption = The round function (Feistel function) of Blowfish designers = Bruce Schneier publish date = 1993 derived from = derived to = Twofish key size = 32 448 bits in steps of 8 bits; default 128 bits block… … Wikipedia
Stream cipher — The operation of the keystream generator in A5/1, a LFSR based stream cipher used to encrypt mobile phone conversations. In cryptography, a stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher… … Wikipedia
DFC (cipher) — This article is about the block cipher. For other uses, see DFC (disambiguation). DFC General Designers Jacques Stern, Serge Vaudenay, et al. First published 1998 Related to COCONUT98 Cipher detail … Wikipedia
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… … Wikipedia
Akelarre (cipher) — Infobox block cipher name = Akelarre designers = G. Álvarez, D. de la Guía, F. Montoya, A. Peinado publish date = 1996 derived from = IDEA, RC5 derived to = related to = key size = 128 bits block size = 128 bits structure = Substitution… … Wikipedia
Block cipher — In cryptography, a block cipher is a symmetric key cipher operating on fixed length groups of bits, called blocks, with an unvarying transformation. A block cipher encryption algorithm might take (for example) a 128 bit block of plaintext as… … Wikipedia
Hasty Pudding cipher — Infobox block cipher name = Hasty Pudding Cipher caption = designers = Richard Schroeppel publish date = 1998 ndash;06 derived from = derived to = related to = certification = key size = Variable block size = Variable structure = rounds =… … Wikipedia