-
1 двухключевое шифрование
Security: two-key encryptionУниверсальный русско-английский словарь > двухключевое шифрование
-
2 шифрование на двух ключах
Security: two-key encryptionУниверсальный русско-английский словарь > шифрование на двух ключах
-
3 криптография с открытым ключом
1) Engineering: public-key cryptography2) Information technology: asymmetric encryption3) Network technologies: public key cryptography4) Security: two key cryptographyУниверсальный русско-английский словарь > криптография с открытым ключом
-
4 ключ шифра
ключ шифра
Уникальная последовательность символов, которая является частью процесса шифрования и расшифровывания данных. См. authentication -, common ~, derived ~, encryption ~, latch-down ~, privacy ~, programmed ~, public ~, SCK, session -, shortcut ~, soft ~, static ~, toggle ~, two-part ~, user authentication ~, user defined ~.
[Л.М. Невдяев. Телекоммуникационные технологии. Англо-русский толковый словарь-справочник. Под редакцией Ю.М. Горностаева. Москва, 2002]Тематики
- электросвязь, основные понятия
EN
Русско-английский словарь нормативно-технической терминологии > ключ шифра
См. также в других словарях:
public-key encryption — encryption encryption n. the process of converting messages in ordinary language, or other information into a secret coded form that cannot be interpreted without knowing the secret method for interpretation, called the key. Note: Encryption is… … The Collaborative International Dictionary of English
Efficient Probabilistic Public-Key Encryption Scheme — EPOC (Efficient Probabilistic Public Key Encryption) is a probabilistic public key encryption scheme.EPOC was developed in 1999 by T. Okamoto, S. Uchiyama and E. Fujisaki of NTT Labs in Japan. It is based on the random oracle model, in which a… … Wikipedia
public key encryption — An encryption scheme that uses two keys. In an e mail transaction, the public key encrypts the data, and a corresponding private key decrypts the data. Because the private key is never transmitted or publicized, the encryption scheme is… … Dictionary of networking
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
encryption — n. the process of converting messages in ordinary language, or other information into a secret coded form that cannot be interpreted without knowing the secret method for interpretation, called the key. Note: Encryption is used commonly to allow… … The Collaborative International Dictionary of English
encryption — The process of encoding information in an attempt to make it secure from unauthorized access, particularly during transmission. There verse of this process is known as decryption. Two main encryption schemes are in common use: • Private… … Dictionary of networking
Key server (cryptographic) — In computer security, a key server is a computer mdash; typically running special software mdash; which provides cryptographic keys to users or other programs. The users programs can be working on the same network as the key server or on another… … Wikipedia
Encryption software — is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Contents 1 Security 2… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… … Wikipedia