-
1 data enciphering key
ключ шифрования данных
КШД
—
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
Синонимы
EN
Англо-русский словарь нормативно-технической терминологии > data enciphering key
-
2 data-enciphering key
Безопасность: ключ шифрования данных -
3 data enciphering key
Англо-русский словарь по компьютерной безопасности > data enciphering key
-
4 data enciphering key
ключ шифрования данныхEnglish-Russian cryptological dictionary > data enciphering key
-
5 data encrypting key
English-Russian cryptological dictionary > data encrypting key
-
6 data encryption key
English-Russian cryptological dictionary > data encryption key
-
7 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
8 key
1) ключ; переключатель2) кнопка; клавиша3) телеграфный ключ, манипулятор; работать телеграфным ключом, манипулировать4) вчт. код, шифр•- adaptive current-controlled key
- All Messages key
- alphameric key
- alphanumeric key
- analog key
- answering key
- Answering Unit Lock key
- Answering Unit On key
- Ant key
- arrow keys
- assignment key
- Asterisk key
- Audio Mixing key
- authentication key
- Auto Store key
- Band key
- break key
- bridge key
- busy key
- calibration test key
- call key
- calling key
- cam key
- Cancel key
- Caps Lock key
- caption key
- Carriage return key
- check key
- chroma key
- ciphering key
- Clear key
- clearing key
- closed key
- code key
- collector key
- Confidential Mailbox key
- contactless key
- contactor key
- Contrast key
- Contrast selector key
- Control key
- Copy key
- Cut-in key
- Cut-out key
- Darker key
- Dedicated-Message key
- Delayed-Polling key
- Delayed-Transmission key
- Delete key
- dial key
- Dial Tone key
- digital keys
- Directory key
- disk key
- Display/Clock key
- diver-telephone key
- DT key
- DUB key
- electronic key
- enciphering key
- encryption key
- End key
- Energy Saver key
- Enter key
- Erase key
- Esc key
- Escape key
- Extra key
- F1 key
- F2 key
- F3 key
- Fade-in key
- Fade-out key
- feed key
- Fine key
- Flash key
- function key
- functional key
- Game/Digital Preset keys
- Greeting Rec key
- Greeting Recording key
- Greeting Select key
- Halftone key
- Halftone selector key
- Handsfree key
- hanged key
- Headset key
- Help key
- HI-LITE key
- Hold key
- Home key
- identification key
- Insert key
- integral key
- intelligent key
- interruption key
- lighted key
- line disconnection key
- Line Spacing key
- linear feedback key
- listening and speaking key
- load key
- Local Mode On key
- locking key
- Lower key
- magnetic key
- mail box key
- measure key
- menu key
- M-key
- Mode key
- monitoring key
- mono/tuner key
- Mute key
- Navi key
- new message key
- Num Lock key
- numbered key
- n-wire key
- open key
- open/close key
- operating key
- optron key
- P+/P-keys
- Page Down key
- Page Up key
- Party Line Ringing key
- Pause Break key
- Pause key
- Phase key
- plug key
- Polarity key
- power key
- previous program key
- Print Screen key
- Priority key
- private key
- programmable key
- protection key
- public key
- pulsing key
- Recall key
- RECEIVE MODE key
- receiving key
- Reception key
- Reception mode key
- Reception/Transmission key
- Reception/Transmission mode key
- redial key
- Redial/Pause key
- reed key
- Relay Broadcast key
- releasing key
- Repeat key
- Reperforator ON/OFF key
- Report key
- Reset key
- Resolution key
- Resolution selector key
- reverse key
- ring-back key
- ringing key
- running key
- Scroll key
- Scroll Lock key
- Search key
- selector key
- semiconductor key
- sending key
- session key
- SET key
- Shift key
- signaling key
- Skipping key
- slave key
- soft key
- SOUND MODE key
- sounder key
- Space key
- speaking key
- specific key
- splitting key
- Stamp key
- STANDBY key
- Start key
- Stop key
- stopless key
- Store key
- Super key
- switch key
- Switch Teletext ON/OFF key
- switching key
- Tab key
- Tabulation key
- Talk key
- talk ringing key
- talking key
- tape eject key
- telegraph key
- Telephone Registration key
- thyristor key
- Tone key
- transfer key
- transistor key
- Transmission Speed Selector key
- TTI key
- Tuner/Band key
- Turbo-dial key
- turn key
- unique key
- User Data key
- User Sw. key
- V-key
- Volume key
- Yes/No keysEnglish-Russian dictionary of telecommunications and their abbreviations > key
-
9 ключ шифрования данных
ключ шифрования данных
КШД
—
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
Синонимы
EN
Русско-английский словарь нормативно-технической терминологии > ключ шифрования данных
-
10 ключ шифрования данных
Security: data key, data-enciphering key, data-encryption keyУниверсальный русско-английский словарь > ключ шифрования данных
-
11 DEK
-
12 DEK
ключ шифрования данных
КШД
—
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
Синонимы
EN
Англо-русский словарь нормативно-технической терминологии > DEK
-
13 DEK
сокр. от data enciphering key -
14 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
15 operation
Англо-русский словарь по компьютерной безопасности > operation
-
16 bit
1) бит, двоичная единица информации2) двоичный разряд (числа)- data bit- idle bit- key bit- null bit- parity bit- parity check bit
См. также в других словарях:
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
public-key encryption — encryption encryption n. the process of converting messages in ordinary language, or other information into a secret coded form that cannot be interpreted without knowing the secret method for interpretation, called the key. Note: Encryption is… … The Collaborative International Dictionary of English
ключ шифрования данных — КШД — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации Синонимы КШД EN data enciphering keyDEK … Справочник технического переводчика
Counter B — (CTB) An ISO term. A counter associated with a key enciphering key pair used to encipher either a notarised key enciphering key (pair) or notarised data enciphering keys sent in a cryptographic service message. 14h … International financial encyclopaedia
Cipher — For other uses, see Cipher (disambiguation). Edward Larsson s rune cipher resembling that found on the Kensington Runestone. Also includes runically unrelated blackletter writing style and pigpen cipher. In cryptography, a cipher (or cypher) is… … Wikipedia
Counter A — (CTA) An ISO term. A counter associated with a key enciphering key pair used to encipher either a key enciphering key (pair) or data keys sent in a cryptographic service message. 14h … International financial encyclopaedia
Keying relationship — An ISO term. The state existing between a communicating pair during which time at least one data key or key enciphering key is shared … International financial encyclopaedia
Counter P — (CTP) An ISO term. A counter associated with a key enciphering key (pair) or data keys sent in a cryptographic service message between a communicating pair. 14h … International financial encyclopaedia
Notarisation indicator — (NOS) An ISO term. An indication in a cryptographic service message of whether a key enciphering key (pair) or data keys sent in the message have been subject to notarisation. 3a … International financial encyclopaedia
Disk encryption theory — Disk encryption is a special case of data at rest protection when the storage media is a sector addressable device (e.g., a hard disk). This article presents cryptographic aspects of the problem. For discussion of different software packages and… … Wikipedia
Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… … Wikipedia