-
1 one-time key encryption
шифрование на ключе одноразового использования
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > one-time key encryption
-
2 one-time key encryption
Безопасность: шифрование на ключе одноразового использованияУниверсальный англо-русский словарь > one-time key encryption
-
3 one-time key encryption
Англо-русский словарь по компьютерной безопасности > one-time key encryption
-
4 one-time encryption key
• kertakäyttöinen salausavain -
5 encryption
a) прибор шифрования (обозначение в схеме)b) (encryption)1) шифрование; зашифрование; операция (за) шифрования2) криптография; криптографическая защита; криптографическое сокрытие информации3) шифротекст- hardware encryption- hardware assisted encryptionАнгло-русский словарь по компьютерной безопасности > encryption
-
6 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
7 key
1) ключ; кнопка, клавиша; переключатель2) ключ, шифр, код; указание к решению3) переключать, работать ключом, коммутировать6) ключ (в управлении базами данных - идентификатор записи или группы записей в файле данных)7) снабжать ключом (для правильной пространственной ориентации, напр., микросхемы)8) ключ (папка в левой части окна редактора реестра (registry); может содержать подключи и значимые элементы)•- key in- key off
- key on
- key out
- accelerator key
- activate key
- actual key
- alphanumeric keys
- alphameric keys
- arrow key
- ascending key - authorization key
- autorepeating key
- backarrow key
- backspace key
- break key
- bucky bit key
- calculation key
- cancel key
- canceling key
- candidate key
- carriage restore key
- carriage reverse key
- carriage space key
- chained key
- change mode key
- character key
- check reset key
- chroma key
- clear key
- clear/entry key
- clearing key
- concatenated key
- confirmation key
- control key
- conversion key
- data encryption key
- dead key
- decimal key
- descending key
- diode key
- direction key
- duplicate key
- encryption key
- entity key
- entry and summation key
- erase key
- erase-all key
- escape key
- execute console instruction key
- extra key
- fast key
- foreign key
- front key
- function key
- generic control key
- generic key
- half-space key
- halt key
- home key
- hot key
- infinite random key
- initiate key
- interrupt key
- labeled key
- latch-down key
- lighted key
- load key
- major key
- membrane key
- menu-driven key
- minor key - one-shot key
- option key
- page-up key
- pass key
- primary key
- printscreen key
- privacy key
- private key
- product key
- programmable function key
- protection key
- public key
- qualified compound key
- release key
- request enter key
- reset key
- respond typeout key
- return key
- rubout key
- running key
- run-time key
- search key
- secondary key
- self-certified public key - session key
- shift key
- shifted function key
- shortcut key
- signaling key
- single cycle key
- single step key
- size key
- soft key
- sort key
- start key
- stop key
- storage key
- storage protection key
- switch key
- system key
- system utility key
- top key
- transaction key
- unlabeled function key
- unmatched key
- up arrow key
- user-definable key
- voice keyEnglish-Russian dictionary of computer science and programming > key
-
8 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
9 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
10 digital signature
= electronic digital signature; = DSGэлектронная цифровая подпись, ЭЦП, цифровая подпись, ЦПД, электронная подпись1) аналог личной подписи сотрудника, служащий для заверения электронных документов. Представляет собой числовое значение, вычисляемое по тексту сообщения (см. message digest) и зашифрованное с помощью секретного ключа отправителя, а проверяемое открытым ключом, соответствующим секретному ключу отправителя. Удостоверяет, что документ исходит от того лица, чья цифровая подпись приложена, а также отсутствие с момента подписания изменений в документе, пересылаемом в цифровом виде. Гарантией невозможности подделки такой подписи является стойкость алгоритма шифрования, применяемого для вычисления ЭЦП, и надёжность процедуры подтверждения подлинности подписи.Syn:см. тж. code signing, digital certificate, DSA, encryption, group signature, one-time signature, private key, public key2) ASCII-файл, который может автоматически присоединяться к электронному письму для идентификации отправителяАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > digital signature
-
11 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
12 function
- function D- function EАнгло-русский словарь по компьютерной безопасности > function
-
13 channel
канал (связи, передачи информации)Англо-русский словарь по компьютерной безопасности > channel
См. также в других словарях:
One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit … Wikipedia
One-time password — A one time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. The most important shortcoming that is addressed by OTPs … Wikipedia
Efficient Probabilistic Public-Key Encryption Scheme — EPOC (Efficient Probabilistic Public Key Encryption) is a probabilistic public key encryption scheme.EPOC was developed in 1999 by T. Okamoto, S. Uchiyama and E. Fujisaki of NTT Labs in Japan. It is based on the random oracle model, in which a… … Wikipedia
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Key strengthening — In cryptography, key strengthening or key stretching refer to techniques used to make a possibly weak key, typically a password or passphrase, more secure against a brute force attack by increasing the time it takes to test each possible key.… … Wikipedia
Encryption — Encrypt redirects here. For the film, see Encrypt (film). This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography. In cryptography, encryption is the process of… … Wikipedia
One-way function — Unsolved problems in computer science Do one way functions exist? In computer science, a one way function is a function that is easy to compute on every input, but hard to invert given the image of a random input. Here easy and hard are to be… … Wikipedia
Key server (cryptographic) — In computer security, a key server is a computer mdash; typically running special software mdash; which provides cryptographic keys to users or other programs. The users programs can be working on the same network as the key server or on another… … Wikipedia
Encryption software — is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Contents 1 Security 2… … Wikipedia