-
1 public key cipher
-
2 public key cipher
шифр (криптосистемы) с открытым ключом (двухключевой криптосистемы)Англо-русский словарь по компьютерной безопасности > public key cipher
-
3 public-key cipher
шифр с открытым ключом, асимметричный шифр, двухключевой шифр -
4 public-key cipher
шифр с открытым ключом, асимметричный шифр, двухключевой шифрThe New English-Russian Dictionary of Radio-electronics > public-key cipher
-
5 public-key cryptography
= PKCразработана Уайтфильдом Диффи (Whitfield Diffi) и Мартином Хеллманом в 1976 г. Использует асимметричное шифрование, т. е. раздельные ключи для шифрования и дешифрования - пару ключей, причём каждая пара обладает следующими свойствами: что-либо зашифрованное одним из них (ключ для шифрования называется открытым и доступен всем) может быть расшифровано с помощью другого (этот ключ называется закрытым, или секретным, ключом); имея только открытый ключ, невозможно получить другой, секретный.Syn:Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > public-key cryptography
-
6 public key block cipher
pблочный шифр (криптосистемы) с открытым ключом (двухключевой криптосистемы)Англо-русский словарь по компьютерной безопасности > public key block cipher
-
7 cipher
-
8 cipher
1) шифр || шифровать2) ключ к шифру3) (арабская) цифра || представлять в цифровом виде; проф. оцифровывать4) вычислять5) комбинация букв (напр. инициалы)6) нуль•- asymmetric cipher
- authenticating block cipher
- back-door cipher
- block cipher
- breakable cipher
- broken cipher
- Caesar cipher
- codebook cipher
- codebook-style cipher
- conceptually different ciphers
- conventional cipher
- cylinder cipher
- Diffie-Hellman cipher
- dynamic cipher
- dynamically-keyed block cipher
- dynamic-transposition block cipher
- exclusive OR stream cipher
- Feistel cipher
- full-size cipher
- gamming cipher
- general stream cipher
- homomorphic block cipher
- homophonic cipher
- iterative cipher
- meta-cipher
- mixing cipher
- monoalphabetic cipher
- monographic cipher
- permutation cipher
- Playfair cipher
- polyalphabetic cipher
- polygraphic cipher
- polyphonic cipher
- product cipher
- public-key cipher
- running-key -cipher
- scalable cipher
- secret cipher
- secret key cipher
- self-synchronizing cipher
- S-P cipher
- stream cipher
- stream-generator cipher
- stream meta-cipher
- strong cipher
- substitution cipher
- substitution-permutation cipher
- symmetric cipher
- transposition cipher
- two-key cipher
- unbreakable cipher
- variable size block cipher -
9 cipher
1) шифр || шифровать2) ключ к шифру3) (арабская) цифра || представлять в цифровом виде; проф. оцифровывать4) вычислять5) комбинация букв (напр. инициалы)6) нуль•- asymmetric cipher
- authenticating block cipher
- back-door cipher
- block cipher
- breakable cipher
- broken cipher
- Caesar cipher
- codebook cipher
- codebook-style cipher
- conceptually different ciphers
- conventional cipher
- cylinder cipher
- Diffie-Hellman cipher
- dynamic cipher
- dynamically-keyed block cipher
- dynamic-transposition block cipher
- exclusive OR stream cipher
- Feistel cipher
- full-size cipher
- gamming cipher
- general stream cipher
- homomorphic block cipher
- homophonic cipher
- iterative cipher - monoalphabetic cipher
- monographic cipher
- permutation cipher
- Playfair cipher
- polyalphabetic cipher
- polygraphic cipher
- polyphonic cipher
- product cipher
- public-key cipher
- running-key-cipher
- scalable cipher
- secret cipher
- secret key cipher
- self-synchronizing cipher
- S-P cipher
- stream cipher - strong cipher
- substitution cipher
- substitution-permutation cipher
- symmetric cipher
- transposition cipher
- two-key cipher
- unbreakable cipher
- variable size block cipherThe New English-Russian Dictionary of Radio-electronics > cipher
-
10 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
11 key
1) ключ2) гаечный ключ3) замок; замковый камень ( арки или свода)4) шпонка; пластинчатый нагель || крепить шпонкой; сажать на шпонку5) клин; шплинт || крепить клином или шплинтом6) расшивка ( инструмент)7) насекать поверхность под штукатурку8) перевязывать швы ( в кладке)9) ключ; кнопка; кнопочный переключатель; клавиша || нажимать кнопку; нажимать клавишу11) направляющий ключ (напр. цоколя лампы)12) вчт. ключ; шифр13) полигр. изображение-основа14) пояснение в подрисуночной подписи; экспликация•to drift out a key — выбивать ( выколачивать) шпонку;to seat a key — ставить шпонку;to key to surface — сцепляться с поверхностью-
accent key
-
access key
-
activate key
-
actual key
-
adjusting key
-
aligning key
-
alignment key
-
Allen key
-
alphanumeric keys
-
alphameric keys
-
angle cock key
-
announcer's key
-
answering key
-
anticlash key
-
arch key
-
armature head lock key
-
armature keys
-
assignment key
-
attention key
-
automatic cancel key
-
auxiliary key
-
averaging key
-
axle-lining key
-
backspace key
-
backup key
-
brake hanger key
-
brake shoe key
-
break key
-
breakout key
-
bridge key
-
buffered key
-
busy key
-
calling key
-
call key
-
cancel transmission key
-
canceling key
-
cancel key
-
candidate key
-
cap key
-
carriage release key
-
carriage restore key
-
censor key
-
center key
-
chamfered key
-
character key
-
check key
-
cipher key
-
clearing key
-
clear key
-
code key
-
column layout key
-
command key
-
concatenated key
-
concrete key
-
control key
-
correction key
-
coupler shank pin retaining key
-
crypto key
-
current-reversing key
-
cursor key
-
cutoff key
-
dazzle-free key
-
decimal tabulator key
-
deck support key
-
de-jammer key
-
delete key
-
dive key
-
dog damping key
-
double-dovetail key
-
double-function key
-
draft key
-
draw key
-
ductor key
-
editing key
-
edit key
-
encryption key
-
end-of-page key
-
enter key
-
erase key
-
escape key
-
exclusion key
-
exit key
-
extra key
-
feather key
-
figure key
-
flat key
-
foreign key
-
format recall key
-
fox key
-
fully concatenated key
-
functional key
-
function key
-
generic key
-
gib-headed key
-
gib-head key
-
half-space key
-
halt key
-
hammerhead key
-
hardware storage key
-
hold-down tabulator key
-
home key
-
index key
-
ink key
-
interference-fit key
-
interruption key
-
interrupt key
-
justification key
-
keying-fit key
-
lie key
-
line recall key
-
line spacing key
-
load key
-
locator key
-
locking key
-
loose key
-
lower rail key
-
major key
-
margin key
-
margin-release key
-
memory key
-
memory total key
-
microadjustable key
-
monitoring key
-
Morse key
-
multifunction key
-
nonlocking key
-
numbered key
-
number key
-
numeric shift key
-
numerical key
-
numeric key
-
occupation key
-
operating key
-
order-wire key
-
paper ejection key
-
paper injection key
-
paper positioning key
-
paragraph indentation key
-
party line ringing key
-
pass key
-
pattern key
-
phrase recall key
-
pin key
-
plug key
-
point key
-
primary key
-
privacy key
-
private key
-
programmable key
-
prong key
-
protection key
-
public key
-
pulsing key
-
radial key
-
reading key
-
read key
-
recall key
-
release key
-
relocate typing point key
-
removable key
-
repeat key
-
resetting key
-
reset key
-
return and vertical spacing key
-
return key
-
reverse key
-
rhythm-compensation key
-
ring-back key
-
ringing key
-
round key
-
route canceling key
-
route key
-
rubout key
-
screw key
-
search key
-
secondary key
-
selector key
-
semicircular key
-
sending key
-
sequencing key
-
shear key
-
shift key
-
shift-lock key
-
signaling key
-
sliding key
-
sloped key
-
socket key
-
soft key
-
sorting key
-
sort key
-
space key
-
spacing key
-
speaking key
-
split key
-
spring buckle key
-
start key
-
stop key
-
storage key
-
straight key
-
switching key
-
switch key
-
switch-lock key
-
tabulating key
-
tab key
-
tabulator clearing key
-
tab clearing key
-
tabulator-set key
-
talking key
-
tangential key
-
tangent key
-
tapered key
-
taper key
-
telegraph key
-
test key
-
tightening key
-
title centering key
-
total tabulator clearing key
-
touch-sensitive key
-
touch key
-
track key
-
track link key
-
track shoe key
-
transfer key
-
turn key
-
typamatic key
-
upper rail key
-
user-defined key
-
voice key
-
wedge key
-
Woodruff key
-
write key -
12 key
-
13 asymmetric cipher
криптографический алгоритм, в котором ключ шифрования не совпадает с ключом дешифрования. Ключ для шифрования называется открытым ключом (public key), а другой, для расшифровки, известный только получателю сообщения, - секретным ключом (private key). Асимметричные шифры значительно слабее симметричных и потому не применяются для шифрования длинных сообщенийAnt:Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > asymmetric cipher
-
14 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
15 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
16 system
1) система || системный3) вчт операционная система; программа-супервизор5) вчт большая программа6) метод; способ; алгоритм•system halted — "система остановлена" ( экранное сообщение об остановке компьютера при наличии серьёзной ошибки)
- CPsystem- H-system- h-system- hydrogen-air/lead battery hybrid system- Ksystem- Lsystem- L*a*b* system- master/slave computer system- p-system- y-system- Δ-system -
17 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
18 device
прибор; аппарат; устройство; (техническое) средство- wireless bugging device -
19 encryption
a) прибор шифрования (обозначение в схеме)b) (encryption)1) шифрование; зашифрование; операция (за) шифрования2) криптография; криптографическая защита; криптографическое сокрытие информации3) шифротекст- hardware encryption- hardware assisted encryptionАнгло-русский словарь по компьютерной безопасности > encryption
-
20 cryptosystem
= CSкриптографическая система, криптосистемаразличают два класса криптосистем: симметричные одноключевые системы (с секретным ключом) и асимметричные двухключевые системы (с открытым ключом)Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > cryptosystem
- 1
- 2
См. также в других словарях:
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
public key system — (PKS) An asymmetrical, two key encryption algorithm that transforms data from plain text to cipher text with one key that is made public, and converts cipher text back to plain text with a different key that remains secret … IT glossary of terms, acronyms and abbreviations
Efficient Probabilistic Public-Key Encryption Scheme — EPOC (Efficient Probabilistic Public Key Encryption) is a probabilistic public key encryption scheme.EPOC was developed in 1999 by T. Okamoto, S. Uchiyama and E. Fujisaki of NTT Labs in Japan. It is based on the random oracle model, in which a… … Wikipedia
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Key management — is a term used to describe two different fields; (1) cryptography, and (2) physical key management (or electronic key management) within building or campus access control.In cryptography, key management includes all of the provisions made in a… … Wikipedia
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia
Cipher — For other uses, see Cipher (disambiguation). Edward Larsson s rune cipher resembling that found on the Kensington Runestone. Also includes runically unrelated blackletter writing style and pigpen cipher. In cryptography, a cipher (or cypher) is… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Cipher security summary — This article summarizes publicly known attacks against ciphers. Note that not all entries may be up to date. Table color key No known successful attacks Theoretical break Attack demonstrated in practice The Best attack column lists the complexity … Wikipedia
Cipher disk — The Union Cipher Disk from the American Civil War was 3.75 inches (95 mm) in diameter and made of light yellow heavy card stock. It consisted of two concentric disks of unequal size revolving on a central pivot. The disks were divided along their … Wikipedia