-
1 Message Encryption Key
Security: MEKУниверсальный русско-английский словарь > Message Encryption Key
-
2 Short Message Encryption Key
Security: SMEKУниверсальный русско-английский словарь > Short Message Encryption Key
-
3 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
4 key
1) ключ (1. инструмент, приспособление или устройство для запирания или отпирания (напр. замка) или для блокирования и деблокирования доступа к чему-либо 2. инструмент, приспособление или устройство для открывания, закрывания или приведения в действие чего-либо 3. телеграфный ключ; манипулятор 4. вчт. идентификатор записи в базе данных 5. вчт. средство подтверждения права доступа (напр. к базе данных) 6. ключ к шифру, криптографический ключ, шифровальный ключ 7. подсказка; ключ к разгадке; ответ 8. направляющий ключ (напр. цоколя лампы) 9. ключевой знак тональности (в музыке) 10. гаечный ключ) || использовать ключ (1. запирать или отпирать (напр. замок); блокировать или деблокировать доступ к чему-либо; поворачивать ключ 2. открывать, закрывать или приводить в действие что-либо 3. работать телеграфным ключом; манипулировать 4. вчт. вводить идентификатор записи в базе данных 5. вчт. использовать средство подтверждения права доступа (напр. к базе данных) 6. применять ключ к шифру, применять криптографический ключ, применять шифровальный ключ 7. подсказывать; давать ключ к разгадке; приводить ответ 8. снабжать направляющим ключом (напр. цоколь лампы) 9. использовать ключевой знак тональности (в музыке) 10. работать гаечным ключом)2) ключевой объект, процесс или субъект || ключевой; определяющий; основной; главный3) клавишный (напр. музыкальный инструмент); кнопочный (напр. переключатель)4) клавишный или кнопочный переключатель (с самовозвратом); клавиша; кнопка || замыкать или размыкать цепь клавишным или кнопочным переключателем (с самовозвратом); нажимать клавишу; нажимать кнопку5) манипулировать; производить манипуляцию, осуществлять скачкообразную модуляцию амплитуды, частоты или фазы квазигармонического сигнала6) вчт. вводить данные с клавиатуры; набирать текст на клавиатуре7) микр. реперные знаки, знаки совмещения (напр. на фотошаблоне) || совмещать реперные знаки (напр. на фотошаблоне и подложке)8) список сокращений, условных обозначений или помет || использовать список сокращений, условных обозначений или помет10) тональность; лад || задавать тональность или лад ( в музыке)12) тон; тона; гамма тонов ( изображения) || придавать (определённые) тона; использовать (определённую) гамму тонов13) фон; задний план ( в видеотехнике) || создавать фон; создавать задний план14) тлв. электронная рир-проекция; вчт. замена или редактирование фона изображения программными и аппаратными средствами || тлв. использовать электронную рир-проекция; вчт. производить замену или редактирование фона изображения программными или аппаратными средствами16) шпонка; шпилька; клин || соединять с помощью шпонки, шпильки или клина17) координировать; гармонизировать; приводить в соответствие18) согласовывать; настраивать19) рлк. переключать положение главного лепестка диаграммы направленности антенны•to key in — вводить данные с клавиатуры; набирать текст на клавиатуре
- ↑ key- ← key
- → key
- access key
- alias key
- aligning key
- alphameric key
- alphanumeric key
- Alt key
- alternate key
- Alternation key
- answering key
- Apple key
- application shortcut key
- Applications key
- arrow key
- assignment key
- authenticating key
- auxiliary key
- Backspace key
- beanie key
- black key
- Break key
- break key
- busy key
- calling key
- cancel key
- canceling key
- candidate key
- Capitals Lock key
- Caps Lock key
- Carriage Return key
- character key
- check key
- chroma key
- clover key
- command key
- compound key
- concatenated key
- Control key
- corporate author search key
- CR key
- cryptographic key
- CTRL key
- Ctrl key
- cursor control key
- cursor key
- cursor-movements keys
- dark key
- data encryption key
- data key
- database key
- dead key
- DEL key
- Del key
- Delete key
- direction key
- Down key
- duplicate key
- Edit key
- editing key
- electronic key
- encryption key
- End key
- Enter key
- erase key
- Erase-Ease key
- Esc key
- Escape key
- external key
- F1, F2,... key
- feature key
- flover key
- Fn key
- foreign key
- function key
- hand-delivered key
- hardware key
- Help key
- high key
- Home key
- hot key
- individual key
- Ins key
- Insert key
- intelligent key
- interruption key
- Left key
- left Windows key
- light key
- listening-and-speaking key
- locking key
- low key
- magnetic card key
- major key
- major sort key
- memory key
- message key
- middle key
- minor key
- minor sort key
- modifier key
- monitoring key
- multi-part key
- multiple messages key
- multiple-word key
- N-bit key
- nonlocking key
- Num Lock key
- numbered key
- Numeric Lock key
- numerical key
- operating key
- operator talk key
- Option key
- Page Down key
- Page Up key
- partial key
- party line ringing key
- pass key
- Pause key
- personal unblocking key
- PgDn key
- PGP key
- PgUp key
- physical electronic key
- pretty good privacy key
- primary key
- Print Screen key
- Print Scrn key
- private key
- program function keys
- programmable function key
- programmed key
- protected disk key
- protection key
- PrtSc key
- public key
- pulsing key
- record key
- release key
- repeat key
- Reset key
- reset key
- Return key
- reverse key
- Right key
- right Windows key
- ring-back key
- ringing key
- Rivest-Shamir-Adleman key
- round key
- RSA key
- running key
- Scroll Lock key
- search key
- secondary key
- secret key
- selector key
- sending key
- sequencing key
- session key
- Shift key
- Shift Lock key
- shortcut key
- signaling key
- signed key
- soft key
- software key
- sort key
- sorting key
- sounder key
- spacebar key
- speaking key
- special function key
- specific key
- splitting key
- storage key
- storage protection key
- strap key
- stuck key
- surrogate key
- switching key
- Sys Req key
- System Reqest key
- Tab key
- Tabulation key
- talking key
- talk-ringing key
- telegraph key
- transfer key
- typematic key
- Up key
- user key
- user-defined key
- ↓ key
- variable-size key
- virtual key
- white key
- WIN key
- Windows key
- write keyThe New English-Russian Dictionary of Radio-electronics > key
-
5 key
1) ключ; переключатель2) кнопка; клавиша3) телеграфный ключ, манипулятор; работать телеграфным ключом, манипулировать4) вчт. код, шифр•- adaptive current-controlled key
- All Messages key
- alphameric key
- alphanumeric key
- analog key
- answering key
- Answering Unit Lock key
- Answering Unit On key
- Ant key
- arrow keys
- assignment key
- Asterisk key
- Audio Mixing key
- authentication key
- Auto Store key
- Band key
- break key
- bridge key
- busy key
- calibration test key
- call key
- calling key
- cam key
- Cancel key
- Caps Lock key
- caption key
- Carriage return key
- check key
- chroma key
- ciphering key
- Clear key
- clearing key
- closed key
- code key
- collector key
- Confidential Mailbox key
- contactless key
- contactor key
- Contrast key
- Contrast selector key
- Control key
- Copy key
- Cut-in key
- Cut-out key
- Darker key
- Dedicated-Message key
- Delayed-Polling key
- Delayed-Transmission key
- Delete key
- dial key
- Dial Tone key
- digital keys
- Directory key
- disk key
- Display/Clock key
- diver-telephone key
- DT key
- DUB key
- electronic key
- enciphering key
- encryption key
- End key
- Energy Saver key
- Enter key
- Erase key
- Esc key
- Escape key
- Extra key
- F1 key
- F2 key
- F3 key
- Fade-in key
- Fade-out key
- feed key
- Fine key
- Flash key
- function key
- functional key
- Game/Digital Preset keys
- Greeting Rec key
- Greeting Recording key
- Greeting Select key
- Halftone key
- Halftone selector key
- Handsfree key
- hanged key
- Headset key
- Help key
- HI-LITE key
- Hold key
- Home key
- identification key
- Insert key
- integral key
- intelligent key
- interruption key
- lighted key
- line disconnection key
- Line Spacing key
- linear feedback key
- listening and speaking key
- load key
- Local Mode On key
- locking key
- Lower key
- magnetic key
- mail box key
- measure key
- menu key
- M-key
- Mode key
- monitoring key
- mono/tuner key
- Mute key
- Navi key
- new message key
- Num Lock key
- numbered key
- n-wire key
- open key
- open/close key
- operating key
- optron key
- P+/P-keys
- Page Down key
- Page Up key
- Party Line Ringing key
- Pause Break key
- Pause key
- Phase key
- plug key
- Polarity key
- power key
- previous program key
- Print Screen key
- Priority key
- private key
- programmable key
- protection key
- public key
- pulsing key
- Recall key
- RECEIVE MODE key
- receiving key
- Reception key
- Reception mode key
- Reception/Transmission key
- Reception/Transmission mode key
- redial key
- Redial/Pause key
- reed key
- Relay Broadcast key
- releasing key
- Repeat key
- Reperforator ON/OFF key
- Report key
- Reset key
- Resolution key
- Resolution selector key
- reverse key
- ring-back key
- ringing key
- running key
- Scroll key
- Scroll Lock key
- Search key
- selector key
- semiconductor key
- sending key
- session key
- SET key
- Shift key
- signaling key
- Skipping key
- slave key
- soft key
- SOUND MODE key
- sounder key
- Space key
- speaking key
- specific key
- splitting key
- Stamp key
- STANDBY key
- Start key
- Stop key
- stopless key
- Store key
- Super key
- switch key
- Switch Teletext ON/OFF key
- switching key
- Tab key
- Tabulation key
- Talk key
- talk ringing key
- talking key
- tape eject key
- telegraph key
- Telephone Registration key
- thyristor key
- Tone key
- transfer key
- transistor key
- Transmission Speed Selector key
- TTI key
- Tuner/Band key
- Turbo-dial key
- turn key
- unique key
- User Data key
- User Sw. key
- V-key
- Volume key
- Yes/No keysEnglish-Russian dictionary of telecommunications and their abbreviations > key
-
6 secret key encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
7 Public Key Cryptography Standards
"A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc."English-Arabic terms dictionary > Public Key Cryptography Standards
-
8 symmetric encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
9 public key algorithm
"An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message." -
10 MEK
1) Глоссарий компании Сахалин Энерджи: methylethylketone2) Полимеры: methyl ethyl ketone3) Безопасность: Message Encryption Key4) Космический летательный аппарат: МЭК, межпланетный экспедиционный комплекс -
11 SMEK
Безопасность: Short Message Encryption Key -
12 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
13 device
прибор; аппарат; устройство; (техническое) средство- wireless bugging device -
14 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
15 unit
1) устройство: (функциональный) блок2) единица -
16 protocol
Англо-русский словарь по компьютерной безопасности > protocol
-
17 protection
защита; средства защитыАнгло-русский словарь по компьютерной безопасности > protection
-
18 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
-
19 function
- function D- function EАнгло-русский словарь по компьютерной безопасности > function
-
20 service
служба; сервис, обслуживание; услугиАнгло-русский словарь по компьютерной безопасности > service
- 1
- 2
См. также в других словарях:
Cellular Message Encryption Algorithm — Infobox block cipher name = CMEA caption = designers = James A. Reeds III publish date = 1991 derived from = derived to = key size = 64 bits block size = 16 64 bits structure = rounds = 3 cryptanalysis = 338 chosen plaintexts break all block… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Message authentication code — In cryptography, a message authentication code (often MAC) is a short piece of information used to authenticate a message. A MAC algorithm, sometimes called a keyed (cryptographic) hash function, accepts as input a secret key and an arbitrary… … Wikipedia
encryption — The process of encoding information in an attempt to make it secure from unauthorized access, particularly during transmission. There verse of this process is known as decryption. Two main encryption schemes are in common use: • Private… … Dictionary of networking
Glossary of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see… … Wikipedia
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
encryption — n. the process of converting messages in ordinary language, or other information into a secret coded form that cannot be interpreted without knowing the secret method for interpretation, called the key. Note: Encryption is used commonly to allow… … The Collaborative International Dictionary of English
Key generation — is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Modern cryptographic systems include symmetric key algorithms (such as DES and AES) and public key algorithms… … Wikipedia
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Encryption — Encrypt redirects here. For the film, see Encrypt (film). This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography. In cryptography, encryption is the process of… … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia