-
1 plaintext-ciphertext check
Безопасность: проверка сравнением открытого и зашифрованного текстовУниверсальный англо-русский словарь > plaintext-ciphertext check
-
2 plaintext-ciphertext check
Англо-русский словарь по компьютерной безопасности > plaintext-ciphertext check
-
3 check
контроль; проверка- access check- integrity check- parity check -
4 проверка сравнением открытого и зашифрованного текстов
Security: plaintext-ciphertext checkУниверсальный русско-английский словарь > проверка сравнением открытого и зашифрованного текстов
-
5 symbol
символ; знак (character) символ, знак -
6 character
символ, знакАнгло-русский словарь по компьютерной безопасности > character
См. также в других словарях:
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Slide attack — The slide attack is a form of cryptanalysis designed to deal with the prevailing idea that even weak ciphers can become very strong by increasing the number of rounds, which can ward off a differential attack. The slide attack works in such a way … Wikipedia
One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit … Wikipedia
Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… … Wikipedia
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Caesar cipher — The action of a Caesar cipher is to replace each plaintext letter with one fixed number of places down the alphabet. This example is with a shift of three, so that a B in the p … Wikipedia
Brute force attack — In cryptanalysis, a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example, possible keys in order to decrypt a message. In most schemes, the theoretical possibility of a brute… … Wikipedia
M-209 — can also refer to a highway in the U.S. state of Michigan; see M 209 (Michigan highway) In cryptography, the M 209, designated CSP 1500 by the Navy (C 38 by the manufacturer) is a portable, mechanical cipher machine used by the US military… … Wikipedia
Mental poker — is the common name for a set of cryptographic problems that concerns playing a fair game over distance without the need for a trusted third party. The term is also applied to the theories surrounding these problems and their possible solutions.… … Wikipedia
Information theory — Not to be confused with Information science. Information theory is a branch of applied mathematics and electrical engineering involving the quantification of information. Information theory was developed by Claude E. Shannon to find fundamental… … Wikipedia