-
1 published encryption key
открытый ключ зашифрования (двухключевой криптосистемы)Англо-русский словарь по компьютерной безопасности > published encryption key
-
2 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
3 codificación
f.1 encoding, coding, encryption.2 codification.3 encoding.* * *1 (de leyes) codification2 (de mensajes) encoding3 INFORMÁTICA coding, code* * *SF1) (Jur) codification2) [de mensajes, textos] encoding* * *1) ( de leyes) codification2) (Inf) ( de información) coding; (Ling) ( de un mensaje) encoding* * *= codification, coding, encoding, encryption, encypherment, scrambling.Ex. Cutter's Rules for a Dictionary Catalogue were published in 1876, and form one of the earlier codifications of the problems and some solutions concerning the alphabetical subject approach.Ex. This study will attempt to define the level of MARC encoding necessary and to determine how this lower level record could be upgraded to the full MARC encoding.Ex. Apart from serving as 'electronic money', smart cards are already being envisaged as identification and access control passes, bearers of personal records, encryption devices and so on.Ex. It may appear, at first sight, unwise to establish standards for encypherment as any publication of methods is likely to assist the intruder.Ex. Moreover, the use of a computer for privacy transformation leaves open the question of how to protect the code (key) used in the scrambling process.----* clave de codificación = scrambling key.* codificación combinada = combination coding.* codificación de caracteres = character encoding.* codificación de datos = data-coding [data coding].* codificación de doble fila = double row coding.* codificación de textos = text encoding.* codificación digital = digital coding.* codificación directa de fila sencilla = single row direct coding.* codificación mediante colores = colour coding.* codificación por medio de códigos de barras = barcoding [bar-coding].* formato generalizado para la codificación de documentos web = generalised markup format.* lenguaje de codificación = coding language.* libro de codificación = codebook.* sistema de codificación = coding system.* * *1) ( de leyes) codification2) (Inf) ( de información) coding; (Ling) ( de un mensaje) encoding* * *= codification, coding, encoding, encryption, encypherment, scrambling.Ex: Cutter's Rules for a Dictionary Catalogue were published in 1876, and form one of the earlier codifications of the problems and some solutions concerning the alphabetical subject approach.
Ex: This study will attempt to define the level of MARC encoding necessary and to determine how this lower level record could be upgraded to the full MARC encoding.Ex: Apart from serving as 'electronic money', smart cards are already being envisaged as identification and access control passes, bearers of personal records, encryption devices and so on.Ex: It may appear, at first sight, unwise to establish standards for encypherment as any publication of methods is likely to assist the intruder.Ex: Moreover, the use of a computer for privacy transformation leaves open the question of how to protect the code (key) used in the scrambling process.* clave de codificación = scrambling key.* codificación combinada = combination coding.* codificación de caracteres = character encoding.* codificación de datos = data-coding [data coding].* codificación de doble fila = double row coding.* codificación de textos = text encoding.* codificación digital = digital coding.* codificación directa de fila sencilla = single row direct coding.* codificación mediante colores = colour coding.* codificación por medio de códigos de barras = barcoding [bar-coding].* formato generalizado para la codificación de documentos web = generalised markup format.* lenguaje de codificación = coding language.* libro de codificación = codebook.* sistema de codificación = coding system.* * *A (de leyes) codificationB1 (de información) coding2 (de un mensaje) encodingcodificación de barras bar coding* * *codificación nf1. [de norma, ley] codification2. [de mensaje en clave] encoding3. Informát coding* * *f codification, encoding* * *codificación nf, pl - ciones1) : codification2) : coding, encoding -
4 Shannon, Claude Elwood
[br]b. 30 April 1916 Gaylord, Michigan, USA[br]American mathematician, creator of information theory.[br]As a child, Shannon tinkered with radio kits and enjoyed solving puzzles, particularly crypto-graphic ones. He graduated from the University of Michigan in 1936 with a Bachelor of Science in mathematics and electrical engineering, and earned his Master's degree from the Massachusetts Institute of Technology (MIT) in 1937. His thesis on applying Boolean algebra to switching circuits has since been acclaimed as possibly the most significant this century. Shannon earned his PhD in mathematics from MIT in 1940 with a dissertation on the mathematics of genetic transmission.Shannon spent a year at the Institute for Advanced Study in Princeton, then in 1941 joined Bell Telephone Laboratories, where he began studying the relative efficiency of alternative transmission systems. Work on digital encryption systems during the Second World War led him to think that just as ciphers hide information from the enemy, "encoding" information could also protect it from noise. About 1948, he decided that the amount of information was best expressed quantitatively in a two-value number system, using only the digits 0 and 1. John Tukey, a Princeton colleague, named these units "binary digits" (or, for short, "bits"). Almost all digital computers and communications systems use such on-off, or two-state logic as their basis of operation.Also in the 1940s, building on the work of H. Nyquist and R.V.L. Hartley, Shannon proved that there was an upper limit to the amount of information that could be transmitted through a communications channel in a unit of time, which could be approached but never reached because real transmissions are subject to interference (noise). This was the beginning of information theory, which has been used by others in attempts to quantify many sciences and technologies, as well as subjects in the humanities, but with mixed results. Before 1970, when integrated circuits were developed, Shannon's theory was not the preferred circuit-and-transmission design tool it has since become.Shannon was also a pioneer in the field of artificial intelligence, claiming that computing machines could be used to manipulate symbols as well as do calculations. His 1953 paper on computers and automata proposed that digital computers were capable of tasks then thought exclusively the province of living organisms. In 1956 he left Bell Laboratories to join the MIT faculty as Professor of Communications Science.On the lighter side, Shannon has built many devices that play games, and in particular has made a scientific study of juggling.[br]Principal Honours and DistinctionsNational Medal of Science. Institute of Electrical and Electronics Engineers Medal of Honor, Kyoto Prize.BibliographyHis seminal paper (on what has subsequently become known as information theory) was entitled "The mathematical theory of communications", first published in Bell System Technical Journal in 1948; it is also available in a monograph (written with Warren Weaver) published by the University of Illinois Press in 1949, and in Key Papers in the Development of Information Theory, ed. David Slepian, IEEE Press, 1974, 1988. For readers who want all of Shannon's works, see N.J.A.Sloane and A.D.Wyner, 1992, TheCollected Papers of Claude E.Shannon.HO
См. также в других словарях:
AACS encryption key controversy — A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing demand letters[1] to websites… … Wikipedia
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Key distribution — In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it involved face to face meeting, use of a… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
NSA encryption systems — The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA approved systems are still classified, but much more about its early systems has become … Wikipedia
BitLocker Drive Encryption — infobox software caption = developer = Microsoft latest release version = 1.0 latest release date = January 30, 2007 programming language = C, C++, AssemblerFact|date=June 2008 operating system = Windows Vista, Windows Server 2008 language =… … Wikipedia
Glossary of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see… … Wikipedia
List of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA) . For classification of keys according to their usage see… … Wikipedia
Diffie–Hellman key exchange — (D–H)[nb 1] is a specific method of exchanging keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge … Wikipedia
BitTorrent protocol encryption — Protocol encryption (PE), message stream encryption (MSE), or protocol header encrypt (PHE)[1] are related features of some peer to peer file sharing clients, including BitTorrent clients. They attempt to enhance privacy and confidentiality. In… … Wikipedia