-
1 cryptographic protocol
криптографический протоколEnglish-Russian cryptological dictionary > cryptographic protocol
-
2 break a cryptographic protocol
вскрывать криптографический протоколEnglish-Russian cryptological dictionary > break a cryptographic protocol
-
3 криптографический протокол
Русско-английский словарь по электронике > криптографический протокол
-
4 криптографический протокол
Русско-английский словарь по радиоэлектронике > криптографический протокол
-
5 криптографический протокол
Русско-английский словарь нормативно-технической терминологии > криптографический протокол
-
6 взламывание криптографического протокола
Универсальный русско-английский словарь > взламывание криптографического протокола
-
7 вскрытие криптографического протокола
Универсальный русско-английский словарь > вскрытие криптографического протокола
-
8 раскрытие криптографического протокола
Универсальный русско-английский словарь > раскрытие криптографического протокола
-
9 вскрывать криптографический протокол
вскрывать криптографический протокол
—
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > вскрывать криптографический протокол
-
10 криптографический протокол
Security: cryptographic protocolУниверсальный русско-английский словарь > криптографический протокол
-
11 протокол криптографического обмена
Универсальный русско-английский словарь > протокол криптографического обмена
См. также в других словарях:
Cryptographic protocol — A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security related function and applies cryptographic methods. A protocol describes how the algorithms should be used. A… … Wikipedia
Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… … Wikipedia
Protocol — may also refer to:Standards in information automation: * Communications protocol * Protocol (computing) * Protocol (object oriented programming) * Cryptographic protocolProcedures for human behavior: * Protocol (diplomacy) * Protocol, a.k.a.… … Wikipedia
Cryptographic primitive — Cryptographic primitives are well established, low level cryptographic algorithms that are frequently used to build computer security systems. These routines include, but are not limited to, one way hash functions and encryption functions.… … Wikipedia
Cryptographic Modernization Program — The Cryptographic Modernization Program is a Department of Defense directed, NSA Information Assurance Directorate led effort to transform and modernize Information Assurance capabilities for the 21st century. It has three phases: Replacement All … Wikipedia
Cryptographic Message Syntax — The Cryptographic Message Syntax (CMS) is the IETF s standard for cryptographically protected messages. It can be used to digitally sign, digest, authenticate or encrypt any form of digital data. CMS is based on the syntax of PKCS#7, which in… … Wikipedia
Cryptographic nonce — For other uses of the word, see Nonce. Typical client server communication during a nonce based authentication process including both a server nonce and a client nonce. In security engineering, nonce is an arbitrary number used only once to sign… … Wikipedia
Offline private key protocol — The offline private key protocol (OPKP) is a cryptographic protocol to prevent unauthorized access to back up or archive data. The protocol results in a public key that can be used to encrypt data and an offline private key that can later be used … Wikipedia
Interlock protocol — The interlock protocol, as described by Ron Rivest and Adi Shamir, was designed to frustrate eavesdropper attack against two parties that use an anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an … Wikipedia
Authentication protocol — An authentication protocol is a type of cryptographic protocol with the purpose of authenticating entities wishing to communicate securely.Authentication protocol may refer to: * Challenge handshake authentication protocol (CHAP) * Extensible… … Wikipedia
Time stamp protocol — The Time Stamp Protocol, or TSP is a cryptographic protocol for certifying timestamps using X.509 certificates and public key infrastructure. The timestamp is a the signer s assertion that a piece of electronic data existed at or before a… … Wikipedia