- cipher strength
- криптографическая стойкость (криптостойкость) шифра
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Cipher Complex — Developer(s) Edge of Reality Publisher(s) Sega Composer(s) Front 242 Plat … Wikipedia
Vigenère cipher — The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.The Vigenère (pronEng|ˌviːdʒɪˈnɛəɹ, veedj ih nair )… … Wikipedia
Intel Cascade Cipher — Infobox block cipher name = Intel Cascaded Cipher caption = designers = Ernie Brickell, Gary Graunke publish date = derived from = AES, Serpent derived to = related to = certification = key size = 128 bits block size = 128 bits structure = AES… … Wikipedia
Four-square cipher — The Four square cipher is a manual symmetric encryption technique. It was invented by famous French cryptographer Felix Delastelle.The technique encrypts pairs of letters ( digraphs ), and thus falls into a category of ciphers known as… … Wikipedia
Two-square cipher — The Two square cipher is a manual symmetric encryption technique. It was developed to ease the cumbersome nature of the large encryption/decryption matrix used in the four square cipher while still being slightly stronger than the Playfair cipher … Wikipedia
Nihilist cipher — In the history of cryptography, the Nihilist cipher is a manually operated symmetric encryption cipher originally used by Russian Nihilists in the 1880s to organize terrorism against the czarist regime. The term is sometimes extended to several… … Wikipedia
Rabbit (cipher) — Rabbit is a high speed stream cipher first presented [M. Boesgaard, M. Vesterager, T. Pedersen, J. Christiansen, O. Scavenius. Rabbit: A High Performance Stream Cipher. Proc. FSE 2003. Springer LNCS 2887, pp. 307 329 (… … Wikipedia
KASUMI (block cipher) — Infobox block cipher name = KASUMI caption = designers = Security Algorithms Group of Experts publish date = derived from = MISTY1 derived to = key size = 128 bits block size = 64 bits structure = Feistel network rounds = 8 cryptanalysis =… … Wikipedia
Orders of magnitude (data) — Computer memory types can be ordered into a magnitude hierarchy: memory at the top is fastest to access but holds little data, while each lower type holds more, but is slower to access An order of magnitude is generally a factor of ten. A… … Wikipedia
Internet Explorer 7 — Windows Internet Explorer 7 A component of Microsoft Windows Interne … Wikipedia
Japanese cryptology from the 1500s to Meiji — The cipher system that Uesugi used is basically a simple substitution usually known as a Polybius square or “checkerboard.” The i ro ha alphabet contains forty eight letters, so a seven by seven square is used, with one of the cells left blank.… … Wikipedia