cryptographic hardware

cryptographic hardware
криптографические аппаратные средства, криптографическое оборудование, аппаратура шифрования

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Поможем решить контрольную работу

Смотреть что такое "cryptographic hardware" в других словарях:

  • Cryptographic accelerator — A cryptographic accelerator is a device that performs processor intensive decrypting/encrypting while freeing the host CPU to perform other tasks. In general cryptographic accelerator is a co processor. Common use for cryptographic accelerator is …   Wikipedia

  • Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… …   Wikipedia

  • Hardware security module — Pour les articles homonymes, voir HSM. Un Hardware Security Module HSM[1] (Module Matériel de Sécurité) est un appareil considéré comme inviolable offrant des fonctions cryptographiques. Il s agit d un matériel électronique offrant un service de… …   Wikipédia en Français

  • Hardware random number generator — This SSL Accelerator computer card uses a hardware random number generator to generate cryptographic keys to encrypt data sent over computer networks. In computing, a hardware random number generator is an apparatus that generates random numbers… …   Wikipedia

  • Hardware Security Module — A Hardware Security Module (often abbreviated to HSM) is a physical device in form of a plug in card or an external security device that can be attached to general purpose computer and servers.The goals of an HSM are the: (a) secure generation,… …   Wikipedia

  • Cryptographic Service Provider — In Microsoft Windows, a Cryptographic Service Provider (CSP) is a software library that implements the Microsoft CryptoAPI (CAPI). CSPs implement encoding and decoding functions, which computer application programs may use, for example, to… …   Wikipedia

  • Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… …   Wikipedia

  • Hardware Security Module — Pour les articles homonymes, voir HSM. Un Hardware Security Module HSM[1] (Module Matériel de Sécurité) est un appareil considéré comme inviolable offrant des fonctions cryptographiques. Il s agit d un matériel électronique offrant un service de… …   Wikipédia en Français

  • Cryptographic device —   An ISO term. The electronic hardware part, or subassembly which implements the encipherment algorithm …   International financial encyclopaedia

  • Custom hardware attack — The EFF s Deep Crack machine contained 1,856 custom chips and could brute force a DES key in a matter of days the photo shows a circuit board fitted with 32 custom attack chips In cryptography, a custom hardware attack uses specifically designed… …   Wikipedia

  • History of computing hardware — Computing hardware is a platform for information processing (block diagram) The history of computing hardware is the record of the ongoing effort to make computer hardware faster, cheaper, and capable of storing more data. Computing hardware… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»