-
1 intercepted ciphertext
Безопасность: перехваченный шифртекстУниверсальный англо-русский словарь > intercepted ciphertext
-
2 intercepted ciphertext
Англо-русский словарь по компьютерной безопасности > intercepted ciphertext
-
3 ciphertext
зашифрованный текст, шифротекст, криптограммаАнгло-русский словарь по компьютерной безопасности > ciphertext
-
4 cryptogram
криптограмма, шифротекст (ciphertext) зашифрованный текст, шифротекст, криптограммаАнгло-русский словарь по компьютерной безопасности > cryptogram
-
5 message
Англо-русский словарь по компьютерной безопасности > message
См. также в других словарях:
Japanese cryptology from the 1500s to Meiji — The cipher system that Uesugi used is basically a simple substitution usually known as a Polybius square or “checkerboard.” The i ro ha alphabet contains forty eight letters, so a seven by seven square is used, with one of the cells left blank.… … Wikipedia
McEliece cryptosystem — In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece.[1] It was the first such scheme to use randomization in the encryption process. The algorithm has never gained much acceptance… … Wikipedia
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Zimmermann Telegram — The Zimmermann Telegram (or Zimmermann Note; German: Zimmermann Depesche ; Spanish: Telegrama Zimmermann ) was a coded telegram dispatched by the Foreign Secretary of the German Empire, Arthur Zimmermann, on January 16, 1917, to the German… … Wikipedia
One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit … Wikipedia
Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… … Wikipedia
Frequency analysis — In cryptanalysis, frequency analysis is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers.this is wrong is based on the fact that, in any given stretch of… … Wikipedia
Transposition cipher — In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext… … Wikipedia
Blum-Goldwasser cryptosystem — The Blum Goldwasser (BG) cryptosystem is an asymmetric key encryption algorithm proposed by Manuel Blum and Shafi Goldwasser in 1984. Blum Goldwasser is a probabilistic, semantically secure cryptosystem with a constant size ciphertext expansion.… … Wikipedia
Index of coincidence — In cryptography, coincidence counting is the technique (invented by William F. Friedman[1]) of putting two texts side by side and counting the number of times that identical letters appear in the same position in both texts. This count, either as … Wikipedia
Goldwasser-Micali cryptosystem — The Goldwasser Micali cryptosystem (GM) is an asymmetric key encryption algorithm developed by Shafi Goldwasser and Silvio Micali in 1982. GM has the distinction of being the first probabilistic public key encryption scheme which is provably… … Wikipedia