-
41 stream encryption
English-Russian dictionary of Information technology > stream encryption
-
42 блочное шифрование
Большой англо-русский и русско-английский словарь > блочное шифрование
-
43 блочное шифрование
Англо-русский словарь технических терминов > блочное шифрование
-
44 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
45 mode
-
46 regime
-
47 device
прибор; аппарат; устройство; (техническое) средство- wireless bugging device -
48 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
49 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
50 DESCBC
1) Вычислительная техника: Data Encryption Standard/Cipher Block Chaining (DES)2) Безопасность: Data Encryption Standard/Cipher Block Chaining -
51 coding
-
52 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
53 protection
1) защита; охрана; обеспечение безопасности2) крепление; ограждение3) гарантия•-
acoustic protection
-
aircraft hijack protection
-
anodic protection
-
arc protection
-
automatic overload protection
-
average quality protection
-
backup protection
-
balance protection
-
bank protection
-
bilge protection
-
boundary protection
-
built-in power-supply protection
-
built-in thermal protection
-
busbar protection
-
bus protection
-
cabin glare protection
-
carbon build-up protection
-
carrier-current protection
-
cathodic protection
-
circuit breaker protection
-
circulating-current pilot-wire differential protection
-
coating protection
-
collision protection
-
computer protection
-
contact protection
-
copyright protection
-
corrosion protection
-
crossing protection
-
cryptographic protection
-
current protection
-
damage protection
-
data protection
-
database protection
-
definite-time graded relay protection
-
definite-time graded protection
-
differential protection
-
digital distance protection
-
digital overvoltage protection
-
diode protection
-
directional ground protection
-
directional protection
-
discrimination protection
-
distance protection
-
dual protection
-
electrochemical protection
-
encryption protection
-
engine overspeed protection
-
environmental protection
-
error protection
-
excess-voltage protection
-
explosion protection
-
external field protection
-
falling voltage protection
-
fault protection
-
fetch protection
-
field-failure protection
-
field-winding protection
-
file protection
-
fire protection
-
flag protection
-
flood protection
-
foam fire protection
-
foam protection
-
frost-heave protection
-
galvanic protection
-
gas protection
-
ground fault protection
-
ground overcurrent protection
-
ground overvoltage protection
-
hail protection
-
head-on protection
-
highlight overload protection
-
high-speed protection
-
high-voltage protection
-
impedance protection
-
implosion protection
-
indoor protection
-
interference protection
-
interturn short-circuit protection
-
intrusion protection
-
inverse-definite-time current protection
-
jamming protection
-
lading protection
-
leakage protection
-
lightning protection
-
lightning surge protection
-
local backup protection
-
longitudinal differential protection
-
loss-of-field protection
-
loss-of-synchronism protection
-
lot quality protection
-
low-voltage protection
-
magnetic protection
-
memory protection
-
missiles protection
-
negative phase-sequence protection
-
negative sequence protection
-
no-voltage protection
-
no-volt protection
-
open-phase protection
-
opposing block protection
-
outdoor protection
-
out-of-step protection
-
overall protection
-
overcurrent protection
-
overload protection
-
overpower protection
-
overspeed protection
-
overvoltage protection
-
oxide protection
-
password protection
-
percentage biased differential protection
-
percentage differential protection
-
phase overcurrent fault protection
-
phase-comparison protection
-
phase-failure protection
-
phase-reversal protection
-
physical protection
-
pilot-wire protection
-
points protection
-
pole slipping protection
-
positive phase-sequence protection
-
positive sequence protection
-
power protection
-
power system relay protection
-
power system protection
-
power-down protection
-
program protection
-
protection of labor
-
radiation protection
-
radiological protection
-
reactance protection
-
reactor protection
-
rear protection
-
relay protection
-
remote backup protection
-
riprap protection
-
roll-over protection
-
rotor ground-fault protection
-
rust protection
-
sacrificial protection
-
sandblasting protection
-
scour protection
-
sectionalizing protection
-
selective protection
-
shore protection
-
short-circuit protection
-
skid protection
-
slip protection
-
slope protection
-
smoke protection
-
spark protection
-
static discharge protection
-
stator short-circuit protection
-
stepped current protection
-
storage protection
-
surge voltage protection
-
surge protection
-
switching error protection
-
text security protection
-
thermal overload protection
-
thermal protection
-
trailing protection
-
transverse differential protection
-
traveling-wave protection
-
tripping protection
-
unbalance protection
-
undercurrent protection
-
underfrequency protection
-
undervoltage protection
-
unequal error protection
-
visibility protection
-
water protection
-
weather protection
-
wheel slide protection
-
work-site protection
-
zerophase-sequence protection
-
zerosequence protection -
54 DES-CBC
Вычислительная техника: Data Encryption Standard, Cipher Block Chaining -
55 DES/CBC
Вычислительная техника: Data Encryption Standard/Cipher Block Chaining (DES) -
56 error
ошибка; погрешность -
57 rate
-
58 protection
- block protection
- boot sector virus protection
- cell protection
- code protection
- copy protection
- cryptographic protection
- data protection
- digital transmission content protection
- electronic shock protection
- encryption protection
- error protection
- file protection
- ground protection
- ground fault protection
- hardware key protection
- hardware key copy protection
- intellectual property protection
- IP protection
- labeled security protection
- low-voltage protection
- memory protection
- offset protection
- overcurrent protection
- overload protection
- overvoltage protection
- oxide protection
- passive copy protection
- password protection
- program protection
- software protection
- storage protection
- store protection
- surge protection
- undervoltage protection
- virus protection
- write protection -
59 protection
- block protection
- boot sector virus protection
- cell protection
- code protection
- copy protection
- cryptographic protection
- data protection
- digital transmission content protection
- electronic shock protection
- encryption protection
- error protection
- file protection
- ground fault protection
- ground protection
- hardware key copy protection
- hardware key protection
- intellectual property protection
- IP protection
- labeled security protection
- low-voltage protection
- memory protection
- offset protection
- overcurrent protection
- overload protection
- overvoltage protection
- oxide protection
- passive copy protection
- password protection
- program protection
- software protection
- storage protection
- store protection
- surge protection
- undervoltage protection
- virus protection
- write protectionThe New English-Russian Dictionary of Radio-electronics > protection
-
60 cipher
= cypher1) шифр (от франц. chiffre)метод, алгоритм или система преобразования данных, текстов и сообщений с целью их защиты от несанкционированного доступа при передаче по незащищённым (открытым) каналам. Наиболее широко распространены шифры замены и шифры перестановки. Шифр алфавитной замены в простейшем случае представляет собой замещение одной буквы на другую в соответствии со списком замены, именуемым ключом. Из шифров перестановки наиболее ранний, так называемый шифр Цезаря, заключался в циклическом смещении всех букв сообщения на 13 позиций алфавита. Изучением шифров занимается криптографиясм. тж. AES, asymmetric cipher, block cipher, ciphertext, cryptanalyst, cryptography, cryptology, DES, encryption, IDEA, keyspace, plaintext, product cipher, RC4, rot-13, stream cipher2) глаг. шифровать, зашифровывать; обозначать условным знакомАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > cipher
См. также в других словарях:
Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… … Wikipedia
Encryption software — is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Contents 1 Security 2… … Wikipedia
Block cipher — In cryptography, a block cipher is a symmetric key cipher operating on fixed length groups of bits, called blocks, with an unvarying transformation. A block cipher encryption algorithm might take (for example) a 128 bit block of plaintext as… … Wikipedia
Encryption layer in storage stack — There is a plurality of terms that are used to describe implementations of disk encryption: on the fly encryption (OTFE); full disk encryption (FDE), whole disk encryption; filesystem level encryption, encrypted filesystem, cryptographic… … Wikipedia
Encryption — Encrypt redirects here. For the film, see Encrypt (film). This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography. In cryptography, encryption is the process of… … Wikipedia
Block size (cryptography) — In modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers. Block ciphers operate on a fixed length string of bits. The length of this bit string is the block size. Both the input (plaintext) and… … Wikipedia
Disk encryption theory — Disk encryption is a special case of data at rest protection when the storage media is a sector addressable device (e.g., a hard disk). This article presents cryptographic aspects of the problem. For discussion of different software packages and… … Wikipedia
International Data Encryption Algorithm — IDEA An encryption round of IDEA General Designers Xuejia Lai and James Massey … Wikipedia
International Data Encryption Algorithm — IDEA Eine Verschlüsselungsrunde des IDEA Algorithmus Entwickler James L. Massey, Xueija Lai Veröffentlicht 1991 … Deutsch Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Format-preserving encryption — In cryptography, format preserving encryption (FPE) refers to encrypting in such a way that the output (the ciphertext) is in the same format as the input (the plaintext). The meaning of format varies. Typically only finite domains are discussed … Wikipedia