- cipher-analyst
- криптоаналитик
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Two-square cipher — The Two square cipher is a manual symmetric encryption technique. It was developed to ease the cumbersome nature of the large encryption/decryption matrix used in the four square cipher while still being slightly stronger than the Playfair cipher … Wikipedia
Kasiski examination — In cryptanalysis, Kasiski examination (also referred to as Kasiski s Test or Kasiski s Method) is a method of attacking polyalphabetic substitution ciphers, such as the Vigenère cipher. It was independently developed by Charles Babbage and later… … Wikipedia
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
List of Metal Gear characters — The Metal Gear franchise features a large number of fictional characters. The series canon comprises (not including re releases and remakes) Metal Gear (MG) and Metal Gear 2: Solid Snake (MG2) for the MSX2, Metal Gear Solid (MGS) for the… … Wikipedia
Cardan grille — The Cardan grille is a method of writing secret messages using a grid.HistoryIn 1550, Girolamo Cardano (1501 1576), known in French as Jérôme Cardan, proposed a simple grid for writing hidden messages. He intended to cloak his messages inside an… … Wikipedia
Signals intelligence by alliances, nations and industries — This article is a subset article under the main article SIGINT, which addresses the unifying conceptual and technical factors in this intelligence discipline. This article describes how the discipline is used by multinational alliances and… … Wikipedia
Failure in the intelligence cycle — or intelligence failure, while never defined in texts, can be understood to be the outcome of the inadequacies within the intelligence cycle. The intelligence cycle itself consists of six steps that are constantly in motion. The six steps are:… … Wikipedia
Chuck Versus the First Date — Chuck episode Episode no. Season 2 Episode 1 Directed by Jason Ensler … Wikipedia
Code (cryptography) — For other uses, see Code (disambiguation). In cryptography, a code is a method used to transform a message into an obscured form, preventing those who do not possess special information, or key, required to apply the transform from understanding… … Wikipedia
Cognitive traps for intelligence analysis — This article deals with a subset of the intellectual process of intelligence analysis itself, as opposed to intelligence analysis management, which in turn is a subcomponent of intelligence cycle management. For a complete hierarchical list of… … Wikipedia
Kryptos — is a sculpture by American artist James Sanborn located on the grounds of the Central Intelligence Agency (CIA) in Langley, Virginia, in the United States. Since its dedication on November 3, 1990, there has been much speculation about the… … Wikipedia