-
1 enciphered message
шифрованное сообщение.English-Russian cryptological dictionary > enciphered message
-
2 шифрованное сообщение
Русско-английский научно-технический словарь Масловского > шифрованное сообщение
-
3 зашифрованное сообщение
1) Military: cipher message, scrambled message2) Linguistics: cryptogram, cryptography3) Telecommunications: ciphertext4) Business: ciphered message, coded message5) Security: cipher, cipher communication, ciphertext message, cryptic message, cryptocommunication, cryptographed message, enciphered message, encrypted message, (на определённом ключе) key-dependent message, secure messageУниверсальный русско-английский словарь > зашифрованное сообщение
-
4 шифрованное сообщение
1) General subject: cipher message (письмо, телеграмма и т. п.), crypt, cryptogram2) Engineering: cipher message, ciphered message, cypher message3) Information technology: coded message4) Business: code messageУниверсальный русско-английский словарь > шифрованное сообщение
-
5 криптограмма
1) General subject: crypt, cryptograph2) Biology: parsley-fern3) Botanical term: parsley-fern (Cryptogramma), rock brake (Cryptogramma)4) Mathematics: cryptogram5) Linguistics: cryptography -
6 шифртекст сообщения
Security: ciphered message, ciphertext message, enciphered messageУниверсальный русско-английский словарь > шифртекст сообщения
См. также в других словарях:
Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… … Wikipedia
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
Colossus computer — Colossus MkI/MkII A Colossus Mark 2 computer. The operator on the left is Dorothy Duboisson. The slanted control panel on the left was used to set the pin patterns on the Lorenz. The bedstead paper tape transport is on the right. Developer Tommy… … Wikipedia
Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent … Wikipedia
Biuro Szyfrów — The Biuro Szyfrów ([ˈbʲurɔ ˈʂɨfruf] ( listen), Polish for Cipher Bureau ) was the interwar Polish General Staff s agency charged with both cryptography (the use of ciphers and codes) and cryptology (the study of ciphers and codes,… … Wikipedia
Tableau de Concordance — The Tableau de Concordance was the main French diplomatic code used during World War I; the term also refers to any message sent using the code. It was a superenciphered four digit code that was changed three times between 1 August 1914 and 15… … Wikipedia
Georges Painvin — Infobox Person name = Georges Painvin image size = 200px caption = Georges Painvin in 1914 birth date = 1886 birth place = Nantes death date = 1980 death place = Paris occupation = Cryptographer spouse = parents = children =Georges Jean Painvin… … Wikipedia
Nikola Tesla in popular culture — Nikola Tesla, inventor and engineer, has appeared in popular culture as a character in books, films, comics and video games. The lack of recognition received by Tesla during his own lifetime has made him a tragic and inspirational character well… … Wikipedia
The National Museum of Computing — Coordinates: 51°59′55″N 0°44′37″W / 51.9985°N 0.7435°W / 51.9985; 0.7435 … Wikipedia
Banburismus — was a process invented by Alan Turing at Bletchley Park in England during the Second World War. It was used by Hut 8 at Bletchley Park to break German Kriegsmarine (i.e., Naval) Enigma. It was a codebreaking procedure which used an early form of… … Wikipedia
Japanese cryptology from the 1500s to Meiji — The cipher system that Uesugi used is basically a simple substitution usually known as a Polybius square or “checkerboard.” The i ro ha alphabet contains forty eight letters, so a seven by seven square is used, with one of the cells left blank.… … Wikipedia