-
1 still-sensitive ciphertext
недостаточно стойкий шифртекст
Требует повторного шифрования.
[ http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=4560]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > still-sensitive ciphertext
-
2 still-sensitive ciphertext
Универсальный англо-русский словарь > still-sensitive ciphertext
-
3 still sensitive ciphertext
недостаточно криптoстойкий шифротекст (требующий повторного шифрования)Англо-русский словарь по компьютерной безопасности > still sensitive ciphertext
-
4 ciphertext
зашифрованный текст, шифротекст, криптограммаАнгло-русский словарь по компьютерной безопасности > ciphertext
-
5 cryptogram
криптограмма, шифротекст (ciphertext) зашифрованный текст, шифротекст, криптограммаАнгло-русский словарь по компьютерной безопасности > cryptogram
См. также в других словарях:
недостаточно стойкий шифртекст — Требует повторного шифрования. [http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=4560] Тематики защита информации EN still sensitive ciphertext … Справочник технического переводчика
One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit … Wikipedia
RSA — In cryptography, RSA is an algorithm for public key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic… … Wikipedia
Transposition cipher — In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext… … Wikipedia
Madryga — In cryptography, Madryga is a block cipher created in 1984 by W. E. Madryga. It was designed to be easy and efficient for implementation in software. Serious weaknesses have since been found in the algorithm, but it was one of the first… … Wikipedia
Keystroke logging — (often called keylogging) is a method of capturing and recording user keystrokes. The technique and name came from before the era of the graphical user interface; loggers nowadays would expect to capture mouse operations too. Keylogging can be… … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Steganography — is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. By contrast, cryptography obscures the meaning of a message, but it does not conceal … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Malware — Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access… … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia