-
1 correct decryption
Англо-русский словарь нормативно-технической терминологии > correct decryption
-
2 correct decryption
Англо-русский словарь по компьютерной безопасности > correct decryption
-
3 decryption
1) расшифрование (законным получателем информации)2) дешифрование (перехватчиком информации без знания ключа); криптоанализАнгло-русский словарь по компьютерной безопасности > decryption
-
4 decrypting
1) расшифрование (законным получателем информации)2) дешифрование (перехватчиком информации без знания ключа); криптоанализSyn: decryptionАнгло-русский словарь по компьютерной безопасности > decrypting
-
5 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key
См. также в других словарях:
Cipher — For other uses, see Cipher (disambiguation). Edward Larsson s rune cipher resembling that found on the Kensington Runestone. Also includes runically unrelated blackletter writing style and pigpen cipher. In cryptography, a cipher (or cypher) is… … Wikipedia
Ciphertext — The Zimmermann Telegram (as it was sent from Washington to Mexico) encrypted as ciphertext. This article is about encrypted information. For an overview of cryptographic technology in general, see Cryptography. In cryptography, ciphertext (or… … Wikipedia
Stream cipher — The operation of the keystream generator in A5/1, a LFSR based stream cipher used to encrypt mobile phone conversations. In cryptography, a stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher… … Wikipedia
правильное дешифрование — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации EN correct decryption … Справочник технического переводчика
Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
McEliece cryptosystem — In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece.[1] It was the first such scheme to use randomization in the encryption process. The algorithm has never gained much acceptance… … Wikipedia
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… … Wikipedia
Biuro Szyfrów — The Biuro Szyfrów ([ˈbʲurɔ ˈʂɨfruf] ( listen), Polish for Cipher Bureau ) was the interwar Polish General Staff s agency charged with both cryptography (the use of ciphers and codes) and cryptology (the study of ciphers and codes,… … Wikipedia
Global Positioning System — GPS redirects here. For other uses, see GPS (disambiguation). Geodesy Fundamentals … Wikipedia