- cipher string
- (encrypting sequence) шифрующая последовательность
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Cipher — For other uses, see Cipher (disambiguation). Edward Larsson s rune cipher resembling that found on the Kensington Runestone. Also includes runically unrelated blackletter writing style and pigpen cipher. In cryptography, a cipher (or cypher) is… … Wikipedia
cipher — cipherable, adj. cipherer, n. /suy feuhr/, n. 1. zero. 2. any of the Arabic numerals or figures. 3. Arabic numerical notation collectively. 4. something of no value or importance. 5. a person of no influence; nonentity. 6. a secret method of… … Universalium
String operations — In computer science, in the area of formal language theory, frequent use is made of a variety of string functions; however, the notation used is different from that used on computer programming, and some commonly used functions in the theoretical … Wikipedia
Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… … Wikipedia
Stream cipher attack — Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive or operation (xor), can be very secure if used properly. However they are vulnerable to attack if certain precautions are not followed:*keys must never be… … Wikipedia
Transposition cipher — In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext… … Wikipedia
Hasty Pudding cipher — Infobox block cipher name = Hasty Pudding Cipher caption = designers = Richard Schroeppel publish date = 1998 ndash;06 derived from = derived to = related to = certification = key size = Variable block size = Variable structure = rounds =… … Wikipedia
XOR cipher — In cryptography, a simple XOR cipher is a relatively simple encryption algorithm that operates according to the principles::A oplus 0 = A,:A oplus A = 0,:(B oplus A) oplus A = B oplus 0 = B,where oplus denotes the exclusive disjunction (XOR)… … Wikipedia
List of formal language and literal string topics — This is a list of formal language and literal string topics, by Wikipedia page. Contents 1 Formal languages 2 Literal strings 3 Classical cryptography Formal languages Abstract syntax tree … Wikipedia
Book cipher — A book cipher is a cipher in which the key is some aspect of a book or other piece of text; books being common and widely available in modern times, users of book ciphers take the position that the details of the key is sufficiently well hidden… … Wikipedia
Cryptanalysis of the Lorenz cipher — The Lorenz SZ machines had 12 wheels each with a different number of cams (or pins). Wheel number 1 2 3 4 5 6 7 … Wikipedia