-
1 randomly-chosen key
Англо-русский словарь нормативно-технической терминологии > randomly-chosen key
-
2 randomly chosen key
Англо-русский словарь по компьютерной безопасности > randomly chosen key
-
3 randomly-chosen key
случайно выбранный ключEnglish-Russian cryptological dictionary > randomly-chosen key
-
4 randomly selected key
Англо-русский словарь по компьютерной безопасности > randomly selected key
-
5 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
6 случайно выбранный ключ
Русско-английский словарь нормативно-технической терминологии > случайно выбранный ключ
-
7 password
пароль; персональная информация аутентификацииАнгло-русский словарь по компьютерной безопасности > password
-
8 bit
1) бит, двоичная единица информации2) двоичный разряд (числа)- data bit- idle bit- key bit- null bit- parity bit- parity check bit
См. также в других словарях:
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Surrogate key — A surrogate key in a database is a unique identifier for either an entity in the modeled world or an object in the database. The surrogate key is not derived from application data. Definition Two definitions of a surrogate appear in the… … Wikipedia
Weak key — In cryptography, a weak key is a key which when used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually represent a very small fraction of the overall keyspace, which usually means that if one generates a… … Wikipedia
Session key — A session key is a single use symmetric key used for encrypting all messages in one communication session. A closely related term is traffic encryption key or TEK, which refers to any key used to encrypt messages as opposed to different uses,… … Wikipedia
International Data Encryption Algorithm — IDEA An encryption round of IDEA General Designers Xuejia Lai and James Massey … Wikipedia
случайно выбранный ключ — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN randomly chosen key … Справочник технического переводчика
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Ciphertext indistinguishability — is a property of many encryption schemes. Intuitively, if a cryptosystem possesses the property of indistinguishability, then an adversary will be unable to distinguish pairs of ciphertexts based on the message they encrypt. The property of… … Wikipedia
NTRUEncrypt — The NTRUEncrypt public key cryptosystem, also known as the NTRU encryption algorithm, is a lattice based alternative to RSA and ECC and is based on the shortest vector problem in a lattice (i.e. is not breakable using quantum computers).… … Wikipedia
Lancet surveys of Iraq War casualties — The Lancet , one of the oldest scientific medical journals in the world, published two peer reviewed studies on the effect of the 2003 invasion of Iraq and subsequent occupation on Iraqi mortality. The first was published in 2004; the second (by… … Wikipedia
One-way compression function — In cryptography, a one way compression function is a function that transforms two fixed length inputs to an output of the same size as one of the inputs. The transformation is one way , meaning that it is difficult given a particular output to… … Wikipedia