cipher-text string

cipher-text string
последовательность шифротекста

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Нужна курсовая?

Смотреть что такое "cipher-text string" в других словарях:

  • cipher — cipherable, adj. cipherer, n. /suy feuhr/, n. 1. zero. 2. any of the Arabic numerals or figures. 3. Arabic numerical notation collectively. 4. something of no value or importance. 5. a person of no influence; nonentity. 6. a secret method of… …   Universalium

  • Transposition cipher — In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext… …   Wikipedia

  • Stream cipher attack — Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive or operation (xor), can be very secure if used properly. However they are vulnerable to attack if certain precautions are not followed:*keys must never be… …   Wikipedia

  • Book cipher — A book cipher is a cipher in which the key is some aspect of a book or other piece of text; books being common and widely available in modern times, users of book ciphers take the position that the details of the key is sufficiently well hidden… …   Wikipedia

  • XOR cipher — In cryptography, a simple XOR cipher is a relatively simple encryption algorithm that operates according to the principles::A oplus 0 = A,:A oplus A = 0,:(B oplus A) oplus A = B oplus 0 = B,where oplus denotes the exclusive disjunction (XOR)… …   Wikipedia

  • Voynich manuscript — The Voynich manuscript is a mysterious illustrated book written in an indecipherable text. It is thought to have been written between 1450 and 1520. The author, script and language of the manuscript remain unknown.Over its recorded existence, the …   Wikipedia

  • crypt (Unix) — In Unix computing, crypt is the name of both a utility program and a C programming function. Though both are used for encrypting data, they are otherwise essentially unrelated. To distinguish between the two, writers often refer to the utility… …   Wikipedia

  • Multiple channel cryptography — Infobox block cipher name = MCC designers = Richard Ervasti publish date = 2008 ndash;02 key size = variable block size = variable structure = SPN rounds = 2 cryptanalysis = Multiple channel cryptography (MCC) is an emerging approach to block… …   Wikipedia

  • List of MS-DOS commands — Contents 1 Resident and transient commands 2 Command line arguments 3 Windows command prompt …   Wikipedia

  • Crypt (Unix) — In Unix computing, crypt is the name of both a commonly available utility program and a C programming function. Though both are used for encrypting data, they are otherwise essentially unrelated. To distinguish between the two, writers often… …   Wikipedia

  • Pseudorandom generator — In theoretical computer science, a pseudorandom generator is a deterministic method of generating a large amount of pseudorandom, or apparently random, data, from a small amount of initial random data. The initial data is commonly known as a… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»