strong cryptography

strong cryptography
устойчивая криптография
обеспечивает криптографическую защиту, весьма трудоёмкую для взлома. Граница между устойчивой и слабой криптографией с ростом производительности компьютеров и совершенствованием методов криптоанализа постепенно смещается в сторону всё более длинных ключей шифрования

Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. . 1998-2007.

Игры ⚽ Поможем решить контрольную работу

Смотреть что такое "strong cryptography" в других словарях:

  • Strong cryptography — or cryptographically strong are general terms applied cryptographic systems or components that are considered highly resistant to cryptanalysis. Demonstrating the resistance of any cryptographic scheme to attack is a complex matter, requiring… …   Wikipedia

  • Strong — may refer to:General usage*Strong acid *Strong agnosticism *Strong AI *Strong atheism *Strong cardinal *Strong coloring *Strong convergence *Strong CP problem *Strong cryptography *Strong inflection (linguistics):*Germanic strong verb *Strong… …   Wikipedia

  • Strong key — is a naming convention used in computer programming. There can be more than one component (eg: DLL) with the same naming, but with different versions. This can lead to many conflicts. Strong key is a solution to maintain different versions of a… …   Wikipedia

  • Strong secrecy — is a term used in cryptography. Bruno Blanchet provides the following definition:: Strong secrecy means that an adversary cannot see any difference when the value of the secret changes [Blanchet, B. (2004) Automatic proof of strong secrecy for… …   Wikipedia

  • Strong prime — In mathematics, a strong prime is a prime number with certain special properties. The definitions of strong primes are different in cryptography and number theory. Definition in cryptography In cryptography, a prime number p is strong if the… …   Wikipedia

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Strong RSA assumption — In cryptography, the strong RSA assumption states that the RSA problem is intractable even when the solver is allowed to choose the public exponent e (for e ge 3). More specifically, given a modulus N of unknown factorization, and a ciphertext C …   Wikipedia

  • Cryptography in Japan — There is not much cryptological history in Japan prior to the twentieth century, only a few simple codes were used and there seems to have been no practice of cryptanalysis at all.There seems to be almost no cryptology in Japan before the Warring …   Wikipedia

  • Export of cryptography — The export of cryptography is the transfer from one country to another of devices and technology related to cryptography.Since World War II, Western governments, including the U.S. and its NATO allies, have regulated the export of cryptography… …   Wikipedia

  • Server gated cryptography — (SGC) was created in response to United States federal legislation on the export of strong cryptography in the 1990s.The legislation had limited encryption to weak algorithms and shorter key lengths if used in software outside of the United… …   Wikipedia

  • History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»