index of cryptographic strength
- index of cryptographic strength
- показатель криптографической стойкости
показатель криптографической стойкости
—
[[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]]
Тематики
EN
- index of cryptographic strength
Англо-русский словарь нормативно-технической терминологии.
academic.ru.
2015.
Смотреть что такое "index of cryptographic strength" в других словарях:
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
показатель криптографической стойкости — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN index of cryptographic strength … Справочник технического переводчика
Enigma machine — Military Enigma machine … Wikipedia
Cyclic redundancy check — A cyclic redundancy check (CRC) is an error detecting code designed to detect accidental changes to raw computer data, and is commonly used in digital networks and storage devices such as hard disk drives. Blocks of data entering these systems… … Wikipedia
Vigenère cipher — The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.The Vigenère (pronEng|ˌviːdʒɪˈnɛəɹ, veedj ih nair )… … Wikipedia
криптографическая стойкость — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации EN cryptographic strength … Справочник технического переводчика
SHA hash functions — The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. The five algorithms … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Japanese cryptology from the 1500s to Meiji — The cipher system that Uesugi used is basically a simple substitution usually known as a Polybius square or “checkerboard.” The i ro ha alphabet contains forty eight letters, so a seven by seven square is used, with one of the cells left blank.… … Wikipedia
United States — a republic in the N Western Hemisphere comprising 48 conterminous states, the District of Columbia, and Alaska in North America, and Hawaii in the N Pacific. 267,954,767; conterminous United States, 3,022,387 sq. mi. (7,827,982 sq. km); with… … Universalium
Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… … Wikipedia