- random key sequence
- случайная ключевая последовательность
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Random self-reducibility — (RSR): A good algorithm for the average case implies a good algorithm for the worst case. RSR is the ability to solve all instances of a problem by solving a large fraction of the instances.DefinitionIf a function f evaluating any instance x can… … Wikipedia
Random number generation — A random number generator (often abbreviated as RNG) is a computational or physical device designed to generate a sequence of numbers or symbols that lack any pattern, i.e. appear random. Computer based systems for random number generation are… … Wikipedia
Random number generator attack — The security of cryptographic systems depends on some secret data that is known to authorized persons but unknown and unpredictable to others. To achieve this unpredictability, some randomization is typically employed. Modern cryptographic… … Wikipedia
Key generator — A key generator is used in many cryptographic protocols to generate a sequence with many pseudo random characteristics. This sequence is used as an encryption key at one end of communication, and as a decryption key at the other.Examples: linear… … Wikipedia
Key Sequenced Data Set — A Key Sequenced Data Set (KSDS) is a type of data set used by the IBM VSAM computer data storage system. Each record in a KSDS data file is embedded with a unique key. A KSDS consists of two parts, the data component and a separate index file… … Wikipedia
Hardware random number generator — This SSL Accelerator computer card uses a hardware random number generator to generate cryptographic keys to encrypt data sent over computer networks. In computing, a hardware random number generator is an apparatus that generates random numbers… … Wikipedia
Algorithmically random sequence — Intuitively, an algorithmically random sequence (or random sequence) is an infinite sequence of binary digits that appears random to any algorithm. The definition applies equally well to sequences on any finite set of characters. Random sequences … Wikipedia
Derived unique key per transaction — In cryptography, Derived Unique Key Per Transaction (DUKPT) is a key management scheme in which for every transaction, a unique key is used which is derived from a fixed key. Therefore, if a derived key is compromised, future and past transaction … Wikipedia
Surrogate key — A surrogate key in a database is a unique identifier for either an entity in the modeled world or an object in the database. The surrogate key is not derived from application data. Definition Two definitions of a surrogate appear in the… … Wikipedia
Escape sequence — This article refers to codes used as commands for computing devices. Escape sequence can also refer to a sequence of escape characters used in parsing source code. An escape sequence is a series of characters used to change the state of computers … Wikipedia
Temporal Key Integrity Protocol — or TKIP is a security protocol used in the IEEE 802.11 wireless networks. Background TKIP (pronounced tee kip ) was designed by the IEEE 802.11i task group and the Wi Fi Alliance as a solution to replace WEP without requiring the replacement of… … Wikipedia