-
1 signature authentication key
Англо-русский словарь нормативно-технической терминологии > signature authentication key
-
2 signature authentication key
ключ аутентификации (цифровой) подписиАнгло-русский словарь по компьютерной безопасности > signature authentication key
-
3 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
4 scheme
Syn: scheme -
5 protocol
Англо-русский словарь по компьютерной безопасности > protocol
-
6 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
7 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
8 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
9 device
прибор; аппарат; устройство; (техническое) средство- wireless bugging device -
10 code
1) кода) совокупность символов или сигналов и система правил для представления информации в виде последовательности элементов такой совокупностиб) вчт программа; текст программы2) кодироватьа) представлять информацию в виде последовательности элементов некоторой совокупности символов или сигналов по определённой системе правилб) вчт программировать3) pl вчт скрытые коды (напр. в текстовых редакторах)4) бион генетический код5) модулировать (напр. в системе с дельта-модуляцией)7) кодекс•- absolute code
- access code
- adaptive code
- additional code
- address code
- air-to-ground liaison code
- A-law code
- Alfa code
- alphanumeric code
- alternate mark inversion code
- AMI code
- answerback code
- area code
- assembly code
- authentication code
- authorization code
- automatic code
- auxiliary code
- balanced code
- bank code
- bar code
- Barker code
- base station identity code
- Baudot code
- BCD code
- BCH code
- binary code
- binary-coded decimal code
- biorthogonal code
- bipolar code
- bipolar with N-zero substitution code
- biquinary code
- block code
- BNZS code
- boot code
- bootstrap code
- Bose-Chaudhuri-Hocquenghem code
- break code
- brevity code
- BT code
- burst-correcting code
- burst-detecting code
- burst-trapping code- C/A code- cable code
- cable Morse code
- call directing code
- call-station code
- capacitor color code
- card code
- carrier identification code
- chain code
- channel code
- character code
- circulant code
- close-packed code
- coarse acquisition code
- color code
- color bar code
- command code
- complementary code
- complementary Golay code
- completion code
- computer code
- computer numerical code
- concatenated code
- condensation code
- condition code
- constant-weight code
- Continental code
- control code
- convolution code
- convolutional code
- country code- cue code- cyclic code
- cyclic binary code
- decimal code
- decomposable Golay code
- dense binary code
- destination code
- device code
- diffuse code
- digital code
- direct code
- directing code
- dot-and-dash code
- double-adjacent error-correcting code
- drawing code
- DVD regional code
- EFM code
- EIA color code
- eight-level code
- eight-to-fourteen modulation code
- elaborated code
- electrical code
- electrical safety code
- entropy code
- equal-length code
- equidistant code
- equipment manufacturer code
- error code
- error-control code - escape code
- excess-three code
- executable machine code
- extended binary-coded decimal interchange-code
- extremal code
- feedback balanced code
- fieldata code
- firewall code
- five-level code
- fixed-length code
- fixed-weight code
- format code
- four-of-eight code
- four-out-of-eight code
- fractal code
- framing code
- full frame time code
- function code
- GBT code
- generalized burst-trapping code
- genetic code - group code
- Hamming code
- hidden codes - HSF code
- Huffman-Shannon-Fano code
- ID code
- identification code
- identity code
- inheritance code
- in-line code
- instruction code
- interchange code
- interlace code
- interleaved code
- International cable code
- international Morse code - interrupt code
- inverted code
- iterative code
- jargon code
- Java code
- key code
- lead color code
- legacy code
- line code
- linear code
- lock code
- longitudinal time code
- loop code
- machine code
- macro code
- magnetic tape code
- majority-decodable code
- make code
- Manchester code
- Manchester II code
- manipulation detection code
- manufacturer code
- maximally compressed pattern recognition code
- message authentication code
- Miller code
- minimum redundance code
- mnemonic code
- mobile country code
- mobile network code
- modular code
- Moore code
- Morse code
- Morse cable code
- multiple-address code
- multiple-burst code
- mutual code
- N-address code
- N-ary code
- native code
- nonprint code
- nonreturn-to-zero code
- nonreturn-to-zero inverted code
- NRZ code
- NRZI code
- object code
- offset binary code
- on-drop frame time code
- one-level code
- open source code - P-code
- p-code
- parity code
- parity-checking code
- partial-response code
- path-invariant code
- perfect code
- permutation code
- permutation-modulation code
- pilot code
- PN code
- polynomial code
- position code
- postal code
- precision code
- predictive code
- prefix code
- primary address code
- printer-telegraph code
- printing-telegraph code
- PRN code
- progressive code
- progressive/sequential code
- pseudonoise code
- pseudorandom noise code
- pseudo-ternary code
- public code
- pulse code
- punched-card code
- punched-tape code
- punctured code
- quasi-cyclic code
- quasi-perfect code
- quaternary code
- quinbinary code
- radar code
- radar-type code
- radio paging code N 1
- randomized code
- Read-Solomon code - redundancy-reducing code
- redundant code
- Reed-Muller code
- reenterable code
- reentrant code
- reflected binary code
- reflective code
- regional code
- relocatable code
- reserved code
- residue code
- resistor color code
- restricted code
- RETMA color code
- return code
- return-to-zero code
- RL code
- RMA color code
- robust code
- routing code
- run-length code
- RZ code
- salami code
- scan code
- search code
- secret code
- self-checking code
- self-complementing code
- self-correcting code
- self-documenting code
- self-dual code
- self-modifying code
- self-validating code
- sequential code
- servo code
- servo Gray code
- seven-unit teleprinter code
- SF code
- Shannon-Fano code
- shift codes
- short code
- signature code
- simplex code
- single-burst code
- SMPTE control code
- SMPTE time code
- source code
- spaghetti code
- specific code
- station-identification code
- stochastic code
- stop code
- straight-line code
- substitution error-correcting code
- synchronization error-correcting code
- systematic code
- systematic error-checking code
- tape code
- telegraph code
- teletype code
- teletypewriter code
- threaded code
- time code
- time address code
- time-invariant code
- transaction code - transparent code
- tree code
- trellis code
- twinned-binary code
- two-of-five code
- two-out-of-five code
- two-part code
- unbreakable code
- unipolar code
- unit disparity code
- unit-memory code - variable-length code
- variable-rate code
- Walsh code
- weighted code
- word code
- Wyner-Ash code
- zero-disparity code
- ZIP code
- zip code -
11 code
1) кода) совокупность символов или сигналов и система правил для представления информации в виде последовательности элементов такой совокупностиб) вчт. программа; текст программы2) кодироватьа) представлять информацию в виде последовательности элементов некоторой совокупности символов или сигналов по определённой системе правилб) вчт. программировать3) pl.; вчт. скрытые коды (напр. в текстовых редакторах)4) бион. генетический код5) модулировать (напр. в системе с дельта-модуляцией)7) кодекс•- absolute code
- access code
- adaptive code
- additional code
- address code
- air-to-ground liaison code
- A-law code
- Alfa code
- alphanumeric code
- alternate mark inversion code
- AMI code
- answerback code
- area code
- assembly code
- authentication code
- authorization code
- automatic code
- auxiliary code
- balanced code
- bank code
- bar code
- Barker code
- base station identity code
- Baudot code
- BCD code
- BCH code
- binary code
- binary-coded decimal code
- biorthogonal code
- bipolar code
- bipolar with N zero substitution code
- biquinary code
- block code
- BNZS code
- boot code
- bootstrap code
- Bose-Chaudhuri-Hocquenghem code
- break code
- brevity code
- BT code
- burst-correcting code
- burst-detecting code
- burst-trapping code
- C/A code
- cable code
- cable Morse code
- call directing code
- call-station code
- capacitor color code
- card code
- carrier identification code
- chain code
- channel code
- character code
- circulant code
- close-packed code
- coarse acquisition code
- color bar code
- color code
- command code
- complementary code
- complementary Golay code
- completion code
- computer code
- computer numerical code
- concatenated code
- condensation code
- condition code
- constant-weight code
- Continental code
- control code
- convolution code
- convolutional code
- country code
- cross-interleaved Read-Solomon code
- cue code
- cyclic binary code
- cyclic code
- decimal code
- decomposable Golay code
- dense binary code
- destination code
- device code
- diffuse code
- digital code
- direct code
- directing code
- dot-and-dash code
- double-adjacent error-correcting code
- drawing code
- DVD regional code
- EFM code
- EIA color code
- eight-level code
- eight-to-fourteen modulation code
- elaborated code
- electrical code
- electrical safety code
- entropy code
- equal-length code
- equidistant code
- equipment manufacturer code
- error code
- error detection and correction code
- error-control code
- error-correcting code
- error-detecting code
- error-locating code
- escape code
- excess-three code
- executable machine code
- extended binary-coded decimal interchange code
- extremal code
- feedback balanced code
- fieldata code
- firewall code
- five-level code
- fixed-length code
- fixed-weight code
- format code
- four-of-eight code
- four-out-of-eight code
- fractal code
- framing code
- full frame time code
- function code
- GBT code
- generalized burst-trapping code
- genetic code
- Golay sequential code
- Gray code
- group code
- Hamming code
- hidden codes
- high density bipolar code
- Hollerith code
- HSF code
- Huffman-Shannon-Fano code
- ID code
- identification code
- identity code
- inheritance code
- in-line code
- instruction code
- interchange code
- interlace code
- interleaved code
- International cable code
- international Morse code
- international standard recording code
- interrogation-code
- interrupt code
- inverted code
- iterative code
- jargon code
- Java code
- key code
- lead color code
- legacy code
- line code
- linear code
- lock code
- longitudinal time code
- loop code
- machine code
- macro code
- magnetic tape code
- majority-decodable code
- make code
- Manchester code
- Manchester II code
- manipulation detection code
- manufacturer code
- maximally compressed pattern recognition code
- message authentication code
- Miller code
- minimum redundance code
- mnemonic code
- mobile country code
- mobile network code
- modular code
- Moore code
- Morse cable code
- Morse code
- multiple-address code
- multiple-burst code
- mutual code
- N-address code
- N-ary code - nonreturn-to-zero code
- nonreturn-to-zero inverted code
- NRZ code
- NRZI code
- object code
- offset binary code
- on-drop frame time code
- one-level code
- open source code
- operation code
- order code
- P code
- parity code
- parity-checking code
- partial-response code
- path-invariant code
- p-code
- perfect code
- permutation code
- permutation-modulation code
- pilot code
- PN code
- polynomial code
- position code
- postal code
- precision code
- predictive code
- prefix code
- primary address code
- printer-telegraph code
- printing-telegraph code
- PRN code
- progressive code
- progressive/sequential code
- pseudonoise code
- pseudorandom noise code
- pseudo-ternary code
- public code
- pulse code
- punched-card code
- punched-tape code
- punctured code
- quasi-cyclic code
- quasi-perfect code
- quaternary code
- quinbinary code
- radar code
- radar-type code
- radio paging code N 1
- randomized code
- Read-Solomon code
- Read-Solomon product code
- recurrent code
- redundancy-reducing code
- redundant code
- Reed-Muller code
- reenterable code
- reentrant code
- reflected binary code
- reflective code
- regional code
- relocatable code
- reserved code
- residue code
- resistor color code
- restricted code
- RETMA color code
- return code
- return-to-zero code
- RL code
- RMA color code
- robust code
- routing code
- run-length code
- RZ code
- salami code
- scan code
- search code
- secret code
- self-checking code
- self-complementing code
- self-correcting code
- self-documenting code
- self-dual code
- self-modifying code
- self-validating code
- sequential code
- servo code
- servo Gray code
- seven-unit teleprinter code
- SF code
- Shannon-Fano code
- shift codes
- short code
- signature code
- simplex code
- single-burst code
- SMPTE control code
- SMPTE time code
- source code
- spaghetti code
- specific code
- station-identification code
- stochastic code
- stop code
- straight-line code
- substitution error-correcting code
- synchronization error-correcting code
- systematic code
- systematic error-checking code
- tape code
- telegraph code
- teletype code
- teletypewriter code
- threaded code
- time address code
- time code
- time-invariant code
- transaction code
- transfer authentication code
- transorthogonal code
- transparent code
- tree code
- trellis code
- twinned-binary code
- two-of-five code
- two-out-of-five code
- two-part code
- unbreakable code
- unipolar code
- unit disparity code
- unit-memory code
- Universal code
- universal product code
- variable-length code
- variable-rate code
- Walsh code
- weighted code
- word code
- Wyner-Ash code
- zero-disparity code
- ZIP code
- zip codeThe New English-Russian Dictionary of Radio-electronics > code
-
12 channel
канал (связи, передачи информации)Англо-русский словарь по компьютерной безопасности > channel
-
13 service
служба; сервис, обслуживание; услугиАнгло-русский словарь по компьютерной безопасности > service
-
14 block
-
15 standard
1) стандарт2) стандартныйАнгло-русский словарь по компьютерной безопасности > standard
См. также в других словарях:
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… … Wikipedia
Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… … Wikipedia
Signature — A signature (from Latin signare , sign ) is a handwritten (and sometimes stylized) depiction of someone s name, nickname or even a simple X that a person writes on documents as a proof of identity and intent. The writer of a signature is a… … Wikipedia
signature — Synonyms and related words: ID card, John Hancock, OK, Smyth sewing, X, accent, accent mark, acceptance, accommodation, acknowledgment, acknowledgments, adjustment, affirmance, affirmation, approbation, approval, arrangement, article,… … Moby Thesaurus
Digital signature — This article is about secure cryptographic signatures. For simple signatures in digital form, see Electronic signature. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital… … Wikipedia
Cryptographic key types — One of the most important aspects of any cryptographic system is key management; it is also the aspect which is most often neglected.[citation needed] A very common mistake is mixing different key types and reusing the same key for different… … Wikipedia
CAVE-based Authentication — Articleissues context = September 2008 deadend = September 2008 intromissing = September 2008 jargon = September 2008 unreferenced = September 2008 wikify = September 2008 CAVE based Authentication a.k.a. HLR Authentication, 2G Authentication,… … Wikipedia
List of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA) . For classification of keys according to their usage see… … Wikipedia
Glossary of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see… … Wikipedia