-
1 unbreakable key
Англо-русский словарь нормативно-технической терминологии > unbreakable key
-
2 unbreakable key
Безопасность: нераскрываемый ключ -
3 unbreakable key
Англо-русский словарь по компьютерной безопасности > unbreakable key
-
4 unbreakable key
невскрываемый ключ. -
5 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
6 невскрываемый ключ
Русско-английский словарь нормативно-технической терминологии > невскрываемый ключ
-
7 нераскрываемый ключ
Security: unbreakable keyУниверсальный русско-английский словарь > нераскрываемый ключ
-
8 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
9 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
10 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
11 cipher
-
12 cryptoalgorithm
криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptoalgorithmАнгло-русский словарь по компьютерной безопасности > cryptoalgorithm
-
13 cryptoalgoritm
криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- conventional cryptoalgoritmАнгло-русский словарь по компьютерной безопасности > cryptoalgoritm
-
14 cipher
1) шифр || шифровать2) ключ к шифру3) (арабская) цифра || представлять в цифровом виде; проф. оцифровывать4) вычислять5) комбинация букв (напр. инициалы)6) нуль•- asymmetric cipher
- authenticating block cipher
- back-door cipher
- block cipher
- breakable cipher
- broken cipher
- Caesar cipher
- codebook cipher
- codebook-style cipher
- conceptually different ciphers
- conventional cipher
- cylinder cipher
- Diffie-Hellman cipher
- dynamic cipher
- dynamically-keyed block cipher
- dynamic-transposition block cipher
- exclusive OR stream cipher
- Feistel cipher
- full-size cipher
- gamming cipher
- general stream cipher
- homomorphic block cipher
- homophonic cipher
- iterative cipher
- meta-cipher
- mixing cipher
- monoalphabetic cipher
- monographic cipher
- permutation cipher
- Playfair cipher
- polyalphabetic cipher
- polygraphic cipher
- polyphonic cipher
- product cipher
- public-key cipher
- running-key -cipher
- scalable cipher
- secret cipher
- secret key cipher
- self-synchronizing cipher
- S-P cipher
- stream cipher
- stream-generator cipher
- stream meta-cipher
- strong cipher
- substitution cipher
- substitution-permutation cipher
- symmetric cipher
- transposition cipher
- two-key cipher
- unbreakable cipher
- variable size block cipher -
15 cipher
1) шифр || шифровать2) ключ к шифру3) (арабская) цифра || представлять в цифровом виде; проф. оцифровывать4) вычислять5) комбинация букв (напр. инициалы)6) нуль•- asymmetric cipher
- authenticating block cipher
- back-door cipher
- block cipher
- breakable cipher
- broken cipher
- Caesar cipher
- codebook cipher
- codebook-style cipher
- conceptually different ciphers
- conventional cipher
- cylinder cipher
- Diffie-Hellman cipher
- dynamic cipher
- dynamically-keyed block cipher
- dynamic-transposition block cipher
- exclusive OR stream cipher
- Feistel cipher
- full-size cipher
- gamming cipher
- general stream cipher
- homomorphic block cipher
- homophonic cipher
- iterative cipher - monoalphabetic cipher
- monographic cipher
- permutation cipher
- Playfair cipher
- polyalphabetic cipher
- polygraphic cipher
- polyphonic cipher
- product cipher
- public-key cipher
- running-key-cipher
- scalable cipher
- secret cipher
- secret key cipher
- self-synchronizing cipher
- S-P cipher
- stream cipher - strong cipher
- substitution cipher
- substitution-permutation cipher
- symmetric cipher
- transposition cipher
- two-key cipher
- unbreakable cipher
- variable size block cipherThe New English-Russian Dictionary of Radio-electronics > cipher
-
16 code
-
17 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
-
18 code
1) кода) совокупность символов или сигналов и система правил для представления информации в виде последовательности элементов такой совокупностиб) вчт программа; текст программы2) кодироватьа) представлять информацию в виде последовательности элементов некоторой совокупности символов или сигналов по определённой системе правилб) вчт программировать3) pl вчт скрытые коды (напр. в текстовых редакторах)4) бион генетический код5) модулировать (напр. в системе с дельта-модуляцией)7) кодекс•- absolute code
- access code
- adaptive code
- additional code
- address code
- air-to-ground liaison code
- A-law code
- Alfa code
- alphanumeric code
- alternate mark inversion code
- AMI code
- answerback code
- area code
- assembly code
- authentication code
- authorization code
- automatic code
- auxiliary code
- balanced code
- bank code
- bar code
- Barker code
- base station identity code
- Baudot code
- BCD code
- BCH code
- binary code
- binary-coded decimal code
- biorthogonal code
- bipolar code
- bipolar with N-zero substitution code
- biquinary code
- block code
- BNZS code
- boot code
- bootstrap code
- Bose-Chaudhuri-Hocquenghem code
- break code
- brevity code
- BT code
- burst-correcting code
- burst-detecting code
- burst-trapping code- C/A code- cable code
- cable Morse code
- call directing code
- call-station code
- capacitor color code
- card code
- carrier identification code
- chain code
- channel code
- character code
- circulant code
- close-packed code
- coarse acquisition code
- color code
- color bar code
- command code
- complementary code
- complementary Golay code
- completion code
- computer code
- computer numerical code
- concatenated code
- condensation code
- condition code
- constant-weight code
- Continental code
- control code
- convolution code
- convolutional code
- country code- cue code- cyclic code
- cyclic binary code
- decimal code
- decomposable Golay code
- dense binary code
- destination code
- device code
- diffuse code
- digital code
- direct code
- directing code
- dot-and-dash code
- double-adjacent error-correcting code
- drawing code
- DVD regional code
- EFM code
- EIA color code
- eight-level code
- eight-to-fourteen modulation code
- elaborated code
- electrical code
- electrical safety code
- entropy code
- equal-length code
- equidistant code
- equipment manufacturer code
- error code
- error-control code - escape code
- excess-three code
- executable machine code
- extended binary-coded decimal interchange-code
- extremal code
- feedback balanced code
- fieldata code
- firewall code
- five-level code
- fixed-length code
- fixed-weight code
- format code
- four-of-eight code
- four-out-of-eight code
- fractal code
- framing code
- full frame time code
- function code
- GBT code
- generalized burst-trapping code
- genetic code - group code
- Hamming code
- hidden codes - HSF code
- Huffman-Shannon-Fano code
- ID code
- identification code
- identity code
- inheritance code
- in-line code
- instruction code
- interchange code
- interlace code
- interleaved code
- International cable code
- international Morse code - interrupt code
- inverted code
- iterative code
- jargon code
- Java code
- key code
- lead color code
- legacy code
- line code
- linear code
- lock code
- longitudinal time code
- loop code
- machine code
- macro code
- magnetic tape code
- majority-decodable code
- make code
- Manchester code
- Manchester II code
- manipulation detection code
- manufacturer code
- maximally compressed pattern recognition code
- message authentication code
- Miller code
- minimum redundance code
- mnemonic code
- mobile country code
- mobile network code
- modular code
- Moore code
- Morse code
- Morse cable code
- multiple-address code
- multiple-burst code
- mutual code
- N-address code
- N-ary code
- native code
- nonprint code
- nonreturn-to-zero code
- nonreturn-to-zero inverted code
- NRZ code
- NRZI code
- object code
- offset binary code
- on-drop frame time code
- one-level code
- open source code - P-code
- p-code
- parity code
- parity-checking code
- partial-response code
- path-invariant code
- perfect code
- permutation code
- permutation-modulation code
- pilot code
- PN code
- polynomial code
- position code
- postal code
- precision code
- predictive code
- prefix code
- primary address code
- printer-telegraph code
- printing-telegraph code
- PRN code
- progressive code
- progressive/sequential code
- pseudonoise code
- pseudorandom noise code
- pseudo-ternary code
- public code
- pulse code
- punched-card code
- punched-tape code
- punctured code
- quasi-cyclic code
- quasi-perfect code
- quaternary code
- quinbinary code
- radar code
- radar-type code
- radio paging code N 1
- randomized code
- Read-Solomon code - redundancy-reducing code
- redundant code
- Reed-Muller code
- reenterable code
- reentrant code
- reflected binary code
- reflective code
- regional code
- relocatable code
- reserved code
- residue code
- resistor color code
- restricted code
- RETMA color code
- return code
- return-to-zero code
- RL code
- RMA color code
- robust code
- routing code
- run-length code
- RZ code
- salami code
- scan code
- search code
- secret code
- self-checking code
- self-complementing code
- self-correcting code
- self-documenting code
- self-dual code
- self-modifying code
- self-validating code
- sequential code
- servo code
- servo Gray code
- seven-unit teleprinter code
- SF code
- Shannon-Fano code
- shift codes
- short code
- signature code
- simplex code
- single-burst code
- SMPTE control code
- SMPTE time code
- source code
- spaghetti code
- specific code
- station-identification code
- stochastic code
- stop code
- straight-line code
- substitution error-correcting code
- synchronization error-correcting code
- systematic code
- systematic error-checking code
- tape code
- telegraph code
- teletype code
- teletypewriter code
- threaded code
- time code
- time address code
- time-invariant code
- transaction code - transparent code
- tree code
- trellis code
- twinned-binary code
- two-of-five code
- two-out-of-five code
- two-part code
- unbreakable code
- unipolar code
- unit disparity code
- unit-memory code - variable-length code
- variable-rate code
- Walsh code
- weighted code
- word code
- Wyner-Ash code
- zero-disparity code
- ZIP code
- zip code -
19 code
1) кода) совокупность символов или сигналов и система правил для представления информации в виде последовательности элементов такой совокупностиб) вчт. программа; текст программы2) кодироватьа) представлять информацию в виде последовательности элементов некоторой совокупности символов или сигналов по определённой системе правилб) вчт. программировать3) pl.; вчт. скрытые коды (напр. в текстовых редакторах)4) бион. генетический код5) модулировать (напр. в системе с дельта-модуляцией)7) кодекс•- absolute code
- access code
- adaptive code
- additional code
- address code
- air-to-ground liaison code
- A-law code
- Alfa code
- alphanumeric code
- alternate mark inversion code
- AMI code
- answerback code
- area code
- assembly code
- authentication code
- authorization code
- automatic code
- auxiliary code
- balanced code
- bank code
- bar code
- Barker code
- base station identity code
- Baudot code
- BCD code
- BCH code
- binary code
- binary-coded decimal code
- biorthogonal code
- bipolar code
- bipolar with N zero substitution code
- biquinary code
- block code
- BNZS code
- boot code
- bootstrap code
- Bose-Chaudhuri-Hocquenghem code
- break code
- brevity code
- BT code
- burst-correcting code
- burst-detecting code
- burst-trapping code
- C/A code
- cable code
- cable Morse code
- call directing code
- call-station code
- capacitor color code
- card code
- carrier identification code
- chain code
- channel code
- character code
- circulant code
- close-packed code
- coarse acquisition code
- color bar code
- color code
- command code
- complementary code
- complementary Golay code
- completion code
- computer code
- computer numerical code
- concatenated code
- condensation code
- condition code
- constant-weight code
- Continental code
- control code
- convolution code
- convolutional code
- country code
- cross-interleaved Read-Solomon code
- cue code
- cyclic binary code
- cyclic code
- decimal code
- decomposable Golay code
- dense binary code
- destination code
- device code
- diffuse code
- digital code
- direct code
- directing code
- dot-and-dash code
- double-adjacent error-correcting code
- drawing code
- DVD regional code
- EFM code
- EIA color code
- eight-level code
- eight-to-fourteen modulation code
- elaborated code
- electrical code
- electrical safety code
- entropy code
- equal-length code
- equidistant code
- equipment manufacturer code
- error code
- error detection and correction code
- error-control code
- error-correcting code
- error-detecting code
- error-locating code
- escape code
- excess-three code
- executable machine code
- extended binary-coded decimal interchange code
- extremal code
- feedback balanced code
- fieldata code
- firewall code
- five-level code
- fixed-length code
- fixed-weight code
- format code
- four-of-eight code
- four-out-of-eight code
- fractal code
- framing code
- full frame time code
- function code
- GBT code
- generalized burst-trapping code
- genetic code
- Golay sequential code
- Gray code
- group code
- Hamming code
- hidden codes
- high density bipolar code
- Hollerith code
- HSF code
- Huffman-Shannon-Fano code
- ID code
- identification code
- identity code
- inheritance code
- in-line code
- instruction code
- interchange code
- interlace code
- interleaved code
- International cable code
- international Morse code
- international standard recording code
- interrogation-code
- interrupt code
- inverted code
- iterative code
- jargon code
- Java code
- key code
- lead color code
- legacy code
- line code
- linear code
- lock code
- longitudinal time code
- loop code
- machine code
- macro code
- magnetic tape code
- majority-decodable code
- make code
- Manchester code
- Manchester II code
- manipulation detection code
- manufacturer code
- maximally compressed pattern recognition code
- message authentication code
- Miller code
- minimum redundance code
- mnemonic code
- mobile country code
- mobile network code
- modular code
- Moore code
- Morse cable code
- Morse code
- multiple-address code
- multiple-burst code
- mutual code
- N-address code
- N-ary code - nonreturn-to-zero code
- nonreturn-to-zero inverted code
- NRZ code
- NRZI code
- object code
- offset binary code
- on-drop frame time code
- one-level code
- open source code
- operation code
- order code
- P code
- parity code
- parity-checking code
- partial-response code
- path-invariant code
- p-code
- perfect code
- permutation code
- permutation-modulation code
- pilot code
- PN code
- polynomial code
- position code
- postal code
- precision code
- predictive code
- prefix code
- primary address code
- printer-telegraph code
- printing-telegraph code
- PRN code
- progressive code
- progressive/sequential code
- pseudonoise code
- pseudorandom noise code
- pseudo-ternary code
- public code
- pulse code
- punched-card code
- punched-tape code
- punctured code
- quasi-cyclic code
- quasi-perfect code
- quaternary code
- quinbinary code
- radar code
- radar-type code
- radio paging code N 1
- randomized code
- Read-Solomon code
- Read-Solomon product code
- recurrent code
- redundancy-reducing code
- redundant code
- Reed-Muller code
- reenterable code
- reentrant code
- reflected binary code
- reflective code
- regional code
- relocatable code
- reserved code
- residue code
- resistor color code
- restricted code
- RETMA color code
- return code
- return-to-zero code
- RL code
- RMA color code
- robust code
- routing code
- run-length code
- RZ code
- salami code
- scan code
- search code
- secret code
- self-checking code
- self-complementing code
- self-correcting code
- self-documenting code
- self-dual code
- self-modifying code
- self-validating code
- sequential code
- servo code
- servo Gray code
- seven-unit teleprinter code
- SF code
- Shannon-Fano code
- shift codes
- short code
- signature code
- simplex code
- single-burst code
- SMPTE control code
- SMPTE time code
- source code
- spaghetti code
- specific code
- station-identification code
- stochastic code
- stop code
- straight-line code
- substitution error-correcting code
- synchronization error-correcting code
- systematic code
- systematic error-checking code
- tape code
- telegraph code
- teletype code
- teletypewriter code
- threaded code
- time address code
- time code
- time-invariant code
- transaction code
- transfer authentication code
- transorthogonal code
- transparent code
- tree code
- trellis code
- twinned-binary code
- two-of-five code
- two-out-of-five code
- two-part code
- unbreakable code
- unipolar code
- unit disparity code
- unit-memory code
- Universal code
- universal product code
- variable-length code
- variable-rate code
- Walsh code
- weighted code
- word code
- Wyner-Ash code
- zero-disparity code
- ZIP code
- zip codeThe New English-Russian Dictionary of Radio-electronics > code
См. также в других словарях:
Unbreakable (film) — Unbreakable … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
One time key — A one time key is a cryptographic key used once and then discarded, used either to authenticate or encrypt data.If a key is used only once and is truly random, it is theoretically unbreakable … Wikipedia
невскрываемый ключ — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=4922] Тематики защита информации EN unbreakable key … Справочник технического переводчика
Vigenère cipher — The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.The Vigenère (pronEng|ˌviːdʒɪˈnɛəɹ, veedj ih nair )… … Wikipedia
Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… … Wikipedia
Oracle Corporation — Type Public Traded as NYSE: ORCL NASDAQ: … Wikipedia
List of fictional swords — In Arthurian fiction [ thumb|left|ArthurExcalibur).] Excalibur is featured in every tale of Arthur or Merlin ever written, in some form or another. The examples below list two of the more distinctive takes on Arthurian swords. Bernard Cornwell:… … Wikipedia
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
Spells in Harry Potter — occur in the wizarding world of the series of books by author J. K. Rowling. Magic spells are used by many of the characters to achieve useful effects without the benefit of modern technology. The main depiction of a spell in the Harry Potter… … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia