-
1 meaningful decryption
- дешифрование, дающее содержательный текст
дешифрование, дающее содержательный текст
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > meaningful decryption
-
2 meaningful decryption
дешифрование, дающее смысловой текстАнгло-русский словарь по компьютерной безопасности > meaningful decryption
-
3 decryption
1) расшифрование (законным получателем информации)2) дешифрование (перехватчиком информации без знания ключа); криптоанализАнгло-русский словарь по компьютерной безопасности > decryption
-
4 decrypting
1) расшифрование (законным получателем информации)2) дешифрование (перехватчиком информации без знания ключа); криптоанализSyn: decryptionАнгло-русский словарь по компьютерной безопасности > decrypting
См. также в других словарях:
Unicity distance — is a term used in cryptography referring to the length of an original ciphertext needed to break the cipher by reducing the number of possible spurious keys to zero in a brute force attack. That is, after trying every possible key, there should… … Wikipedia
дешифрование, дающее содержательный текст — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN meaningful decryption … Справочник технического переводчика
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Voynich manuscript — The Voynich manuscript is a mysterious illustrated book written in an indecipherable text. It is thought to have been written between 1450 and 1520. The author, script and language of the manuscript remain unknown.Over its recorded existence, the … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Paillier cryptosystem — The Paillier cryptosystem, named after and invented by Pascal Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography. The problem of computing n th residue classes is believed to be computationally difficult. This… … Wikipedia
Magic (cryptography) — Magic was an Allied cryptanalysis project during World War II. It involved the United States Army s Signals Intelligence Section (SIS) and the United States Navy s Communication Special Unit. [1] Contents 1 Codebreaking 1.1 RED … Wikipedia
Index of coincidence — In cryptography, coincidence counting is the technique (invented by William F. Friedman[1]) of putting two texts side by side and counting the number of times that identical letters appear in the same position in both texts. This count, either as … Wikipedia
Custom hardware attack — The EFF s Deep Crack machine contained 1,856 custom chips and could brute force a DES key in a matter of days the photo shows a circuit board fitted with 32 custom attack chips In cryptography, a custom hardware attack uses specifically designed… … Wikipedia
Lossless data compression — is a class of data compression algorithms that allows the exact original data to be reconstructed from the compressed data. The term lossless is in contrast to lossy data compression, which only allows an approximation of the original data to be… … Wikipedia