-
1 one-key cryptography
(classical cryptography) классическая (традиционная) криптография, одноключевая криптографияАнгло-русский словарь по компьютерной безопасности > one-key cryptography
-
2 one-key cryptography
-
3 cryptography
1) криптография; криптографическая защита, криптографическое закрытие информации- computational cryptography- computational complexity based cryptographyАнгло-русский словарь по компьютерной безопасности > cryptography
-
4 elliptic curve cryptography
"An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases."English-Arabic terms dictionary > elliptic curve cryptography
-
5 private key
1) в асимметричной криптографической схеме RSA - пользовательский ключ для декодирования входящих (получаемых) сообщений, зашифрованных с помощью открытого ключа, и для шифрования (подписи) исходящих сообщенийAnt:2) в криптографии с симметричными шифрами ( symmetric cryptography) так называется секретный ключ, который именуется также secret key или session keyАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > private key
-
6 symmetric cryptosystem
= one-key symmetric cryptosystemсимметричная криптосистема, одноключевая криптографическая система, криптосистема с секретным ключомАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > symmetric cryptosystem
-
7 ar-sa مسؤولية حالية
"An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases."
См. также в других словарях:
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
One-key MAC — OMAC (One key MAC) is a message authentication code constructed from a block cipher much like the PMAC algorithm. Officially there are two OMAC algorithms (OMAC1 and OMAC2) which are both essentially the same except for a small tweak. OMAC1 is… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Transient-key cryptography — is a form of public key cryptography wherein keypairs are generated and assigned to brief intervals of time instead of to individuals or organizations. In a transient key system, private keys are used briefly and then destroyed, which is why it… … Wikipedia
public key cryptography — noun a method of encryption of electronic data sent from one person to another which relies on two authentication keys, one public and one private, the two keys being connected by an algorithm which makes the combination unique, neither key being …
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… … Wikipedia
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia