-
1 encrypted key
Англо-русский словарь по компьютерной безопасности > encrypted key
-
2 encrypted key exchange
обмен зашифрованными ключами
—
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > encrypted key exchange
-
3 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
4 message
Англо-русский словарь по компьютерной безопасности > message
-
5 information
информация, сведенияАнгло-русский словарь по компьютерной безопасности > information
-
6 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
7 channel
канал (связи, передачи информации)Англо-русский словарь по компьютерной безопасности > channel
-
8 stream
-
9 signal
1) подавать сигнал, сигнализировать2) сигнал -
10 encryption
шифрование, зашифровываниепроцесс применения шифра к защищаемой информации, т. е. преобразование защищаемой информации (сообщения, файла, записи в БД и т. д.) в шифрованное сообщение с помощью определённых правил, содержащихся в шифре, чтобы её не смог прочесть или применить пользователь, не имеющий ключа к данному шифру. Термины "шифрование" и "кодирование" по современным представлениям не являются синонимами."The messages were super-encrypted with a 256-bit system specially made at the NSA" (Tom Clancy). — Сообщения были сверхнадёжно зашифрованы системой с 256-битовым ключом, специально разработанной АНБ. см. тж. ciphertext, cryptography, decryption, DES, DSA, encryption algorithm, encryption key, encryption policy, encryption protection, encryption software, encryption technology, encryptor, plaintext, public key encryption, scrambler
Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > encryption
-
11 input
1) ввод (информации) -
12 password
пароль; персональная информация аутентификацииАнгло-русский словарь по компьютерной безопасности > password
-
13 data
pl. от datumданные; информация; сведения- absolute data
- actual data
- adjusted data
- aggregated data
- alphanumeric data
- alphameric data
- alphabetic data
- analog data
- anomalous data
- applied data
- arrayed data
- asynchronous data
- attribute data
- autocorrelated data
- available data
- background data
- bad data
- biased data
- binary data
- binary raster data
- bipolar-valued data
- bipolar data
- bit strring data
- blocked data
- Boolean data
- built-in data
- business data
- byte-width data
- cache data
- cached data
- canned data
- carry-over data
- chain data
- character string data
- classified data
- clean data
- clear data
- coded data
- common data
- compacted data
- compatible data
- comprehensive data
- computer usage data
- computer-generated data
- concatenated data
- confidential data
- constitutional data
- constructed test data
- constructed data
- contiguous data
- continuous data
- continuous tone raster data
- control data
- coordinate data
- correction data
- critical data
- cumulative data
- current data
- data received into the keyboard
- database data
- debugging data
- decimal data
- derived data
- descriptive data
- destination data
- digital data
- digital-voice data
- digitized data
- dirty data
- discrete data
- disembodied data
- dispersed data
- documentary data
- downloaded data
- duplicate data
- dynamic data
- encoded data
- encrypted data
- engineering data
- error data
- evaluation data
- event-level data
- event data
- expect data
- expedited data
- false data
- field data
- field-performance data
- file data
- filed data
- fixed-point data
- flagged data
- floating-point data
- formatted data
- go-no-go data
- GPS data
- graphic data
- hierarchical data
- historical data
- Hollerith data
- host data
- housekeeping data
- image data
- immediate data
- imperfect data
- improper data
- incoming data
- incomplete data
- incremental data
- indexed data
- indicative data
- information data
- initial data
- input data
- integer data
- integrated data
- interactive data
- intermediate control data
- intermediate data
- intersection data
- invisible data
- job data
- key-punched data
- label data
- language data
- latched data
- line data
- list-structured data
- live data - logged data
- long constrained data
- lost data
- low delay data
- low-activity data
- machine-readable data
- major control data
- management data
- mask data
- masked data
- mass data
- master data
- meaningful data
- meaning data
- meaningless data
- mechanized data
- minor control data
- misleading data
- missing data
- model-made data
- multidimensional data
- multiple data
- multiplexed data
- multiuser accessible data
- N-bit data
- nonformatted data
- non-numeric data
- normal data
- null data
- numerical character data
- numeric character data
- numerical data
- numeric data
- observed data
- off-chip data
- on-line data
- operational data
- outgoing data
- outlying data
- output data
- packed data
- parallel data
- pattern data
- photo frame data
- pixel data
- pointer data
- pooled data
- poor data
- preformatted data
- primary data
- private data
- problem data
- public data
- punched data
- random test data
- ranked data
- rating data
- raw data
- real-time data
- recovery data
- reduced data
- referenced data
- refined data
- rejected data
- relative data
- relevant data
- reliability data
- reliable data
- remote data
- replicated data
- representative data
- run data
- sampled data
- schematic data
- scratch data
- secondary data
- sensitive data
- sensory data
- serial data
- shared data
- simulation data
- software problem data
- source data
- specified data
- speech data
- stale data
- stand-alone data
- starting data
- statement label data
- static data
- status data
- stored data
- string data
- structured data
- suspect data
- symptom data
- synthetic data
- system control data
- system output data
- tabular data
- tagged data
- task data
- telecommunications data
- test data
- time-referenced data
- timing data
- token data
- tooling data
- transaction data
- transcriptive data
- transient data
- transparent data
- trouble-shooting data
- true data
- tuple-structured data
- uncompatible data
- unconstrained delay data
- under voice data
- unformatted data
- ungrouped data
- unpacked data
- untagged data
- updatable data
- user data
- valid data
- variable data
- vectorized data
- video data data
- virtual data
- visible data
- warranty data
- wavefront data
- zero dataEnglish-Russian dictionary of computer science and programming > data
См. также в других словарях:
Encrypted key exchange — (also known as EKE) is a family of password authenticated key agreement methods described by Steven M. Bellovin and Michael Merritt. [cite conference|author=S. M. Bellovin|coauthors=M. Merritt|title=Encrypted Key Exchange: Password Based… … Wikipedia
Encrypted Key Transport — Saltar a navegación, búsqueda Encrypted Key Transport o EKT es una extensión a SRTP que cumple el framework de SRTP y reduce la cantidad de señalización de control necesaria en una sesión SRTP. Distribuye de manera segura la clave SRTP maestra y… … Wikipedia Español
Encrypted Key Transport — or EKT is an extension to SRTP that fits within the SRTP framework and reduces the amount of signaling control that is needed in an SRTP session. EKT securely distributes the SRTP master key and other information for each SRTP source, using SRTCP … Wikipedia
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
Key generation — is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Modern cryptographic systems include symmetric key algorithms (such as DES and AES) and public key algorithms… … Wikipedia
Key escrow — (also known as a fair cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third parties may… … Wikipedia
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia
encrypted — a. converted into a coded form that cannot be interpreted without knowing the secret method for interpretation, called the key; of messages or other forms of information. Syn: encoded, coded, enciphered, ciphered, cyphered, written in code.… … The Collaborative International Dictionary of English
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia