cryptographic algorithm

cryptographic algorithm
криптографический алгоритм
набор правил, который определяет математические шаги (операции), необходимые для шифрования и расшифровки текстов (сообщений); криптографические алгоритмы делятся на две большие группы: специальные алгоритмы (restricted algorithm), где секретным является сам алгоритм шифрования, и алгоритмы на основе шифроключей (key-based algorithm), в которых секретом является ключ

Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. . 1998-2007.

Игры ⚽ Нужен реферат?

Смотреть что такое "cryptographic algorithm" в других словарях:

  • cryptographic algorithm — šifras statusas T sritis informatika apibrėžtis Taisyklių arba komandų rinkinys ↑užšifravimo ir ↑iššifravimo operacijoms atlikti. Dar vartojama kriptografinis algoritmas. atitikmenys: angl. cipher; cryptographic algorithm ryšiai: dar žiūrėk –… …   Enciklopedinis kompiuterijos žodynas

  • Cryptographic Module Validation Program — Logo of the Cryptographic Module Validation Program. The Cryptographic Module Validation Program (CMVP) is a joint American and Canadian security accreditation program for cryptographic modules. The program is available to any vendors who seek to …   Wikipedia

  • Cryptographic primitive — Cryptographic primitives are well established, low level cryptographic algorithms that are frequently used to build computer security systems. These routines include, but are not limited to, one way hash functions and encryption functions.… …   Wikipedia

  • Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… …   Wikipedia

  • Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… …   Wikipedia

  • Cryptographic key types — One of the most important aspects of any cryptographic system is key management; it is also the aspect which is most often neglected.[citation needed] A very common mistake is mixing different key types and reusing the same key for different… …   Wikipedia

  • Algorithm — Flow chart of an algorithm (Euclid s algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≤ A yields yes… …   Wikipedia

  • Cryptographic Message Syntax — The Cryptographic Message Syntax (CMS) is the IETF s standard for cryptographically protected messages. It can be used to digitally sign, digest, authenticate or encrypt any form of digital data. CMS is based on the syntax of PKCS#7, which in… …   Wikipedia

  • Cryptographic device —   An ISO term. The electronic hardware part, or subassembly which implements the encipherment algorithm …   International financial encyclopaedia

  • Cryptographic key —   An ISO term. A parameter used, in conjunction with an algorithm, for the purposes of validation, authentication, encipherment, or decipherment …   International financial encyclopaedia

  • Cayley-Purser algorithm — The Cayley Purser algorithm was a public key cryptography algorithm published in early 1999 by 16 year old Irishwoman Sarah Flannery, based on an unpublished work by Michael Purser, founder of Baltimore Technologies, a Dublin data security… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»