-
1 encrypted key
Англо-русский словарь по компьютерной безопасности > encrypted key
-
2 encrypted key
зашифрованный ключ -
3 encrypted key exchange
обмен зашифрованными ключами
—
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > encrypted key exchange
-
4 encrypted key exchange
обмен зашифрованными ключамиEnglish-Russian cryptological dictionary > encrypted key exchange
-
5 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
6 Key Management Service
"An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures." -
7 private key
"The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key." -
8 crypto escrow key
A secondary encryption key that provides the ability for an authorized IT Helpdesk administrator to open an encrypted document when the password is lost. -
9 обмен зашифрованными ключами
обмен зашифрованными ключами
—
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > обмен зашифрованными ключами
-
10 message
Англо-русский словарь по компьютерной безопасности > message
-
11 information
информация, сведенияАнгло-русский словарь по компьютерной безопасности > information
-
12 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
13 channel
канал (связи, передачи информации)Англо-русский словарь по компьютерной безопасности > channel
-
14 stream
-
15 privé-sleutel
n. <I>(also: <B>privésleutel</B>)</I> private key, key used to decode messages which were encrypted using a suitable public key -
16 authenticator
"A data structure used by one party to prove that another party knows a secret key. In the Kerberos authentication protocol, authenticators include timestamps, to prevent replay attacks, and are encrypted with the session key issued by the Key Distribution Center (KDC)."مصدّق -
17 signal
1) подавать сигнал, сигнализировать2) сигнал -
18 encryption
шифрование, зашифровываниепроцесс применения шифра к защищаемой информации, т. е. преобразование защищаемой информации (сообщения, файла, записи в БД и т. д.) в шифрованное сообщение с помощью определённых правил, содержащихся в шифре, чтобы её не смог прочесть или применить пользователь, не имеющий ключа к данному шифру. Термины "шифрование" и "кодирование" по современным представлениям не являются синонимами."The messages were super-encrypted with a 256-bit system specially made at the NSA" (Tom Clancy). — Сообщения были сверхнадёжно зашифрованы системой с 256-битовым ключом, специально разработанной АНБ. см. тж. ciphertext, cryptography, decryption, DES, DSA, encryption algorithm, encryption key, encryption policy, encryption protection, encryption software, encryption technology, encryptor, plaintext, public key encryption, scrambler
Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > encryption
-
19 packaged Windows Media file
"A Windows Media file encrypted with a key, which consumers cannot play unless they have a key provided by a license. A packaged Windows Media file is produced by and protected through the implementation of digital rights management using the Windows Media Rights Manager Software Development Kit(SDK) or a program based on the Microsoft Windows Media Format SDK."English-Arabic terms dictionary > packaged Windows Media file
-
20 digital envelope
"Private messages encrypted using the recipient's public key. Enveloped messages can only be decrypted by using the recipient's private key, allowing only the recipient to understand the message."
- 1
- 2
См. также в других словарях:
Encrypted key exchange — (also known as EKE) is a family of password authenticated key agreement methods described by Steven M. Bellovin and Michael Merritt. [cite conference|author=S. M. Bellovin|coauthors=M. Merritt|title=Encrypted Key Exchange: Password Based… … Wikipedia
Encrypted Key Transport — Saltar a navegación, búsqueda Encrypted Key Transport o EKT es una extensión a SRTP que cumple el framework de SRTP y reduce la cantidad de señalización de control necesaria en una sesión SRTP. Distribuye de manera segura la clave SRTP maestra y… … Wikipedia Español
Encrypted Key Transport — or EKT is an extension to SRTP that fits within the SRTP framework and reduces the amount of signaling control that is needed in an SRTP session. EKT securely distributes the SRTP master key and other information for each SRTP source, using SRTCP … Wikipedia
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
Key generation — is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Modern cryptographic systems include symmetric key algorithms (such as DES and AES) and public key algorithms… … Wikipedia
Key escrow — (also known as a fair cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third parties may… … Wikipedia
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia
encrypted — a. converted into a coded form that cannot be interpreted without knowing the secret method for interpretation, called the key; of messages or other forms of information. Syn: encoded, coded, enciphered, ciphered, cyphered, written in code.… … The Collaborative International Dictionary of English
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia