- cryptographic model
- модель криптосистемы или криптоалгоритма
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Cryptographic protocol — A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security related function and applies cryptographic methods. A protocol describes how the algorithms should be used. A… … Wikipedia
Dolev-Yao model — The Dolev Yao model is a formal model used to prove properties of interactive protocols. Contents 1 The network 2 The adversary 3 The algebraic model 4 See also … Wikipedia
Standard Model (cryptography) — In cryptography the standard model is the model of computation in which the adversary is only limited by the amount of time and computational power available. Other names used are bare model and plain model.Cryptographic schemes are usually based … Wikipedia
Dolev-Yao threat model — The Dolev Yao model represents an attacker that can overhear, intercept, and synthesise any message and is only limited by the constraints of the cryptographic methods used. In other words: the attacker carries the message. This omnipotence has… … Wikipedia
OSI model — 7. Application layer NNTP · SIP · SSI · DNS · FTP · Gopher · … Wikipedia
Common reference string model — In cryptography, the common reference string (CRS) model captures the assumption that a trusted setup in which all involved parties get access to the same string crs taken from some distribution D exists. Schemes proven secure in the CRS model… … Wikipedia
Key server (cryptographic) — In computer security, a key server is a computer mdash; typically running special software mdash; which provides cryptographic keys to users or other programs. The users programs can be working on the same network as the key server or on another… … Wikipedia
Attack model — Attack models or attack typesref|secondname specify how much information a cryptanalyst has access to when cracking an encrypted message. Some common attack models are: *Ciphertext only attack *Known plaintext attack *Chosen plaintext attack… … Wikipedia
Enigma machine — Military Enigma machine … Wikipedia
Microsoft CryptoAPI — The Cryptographic Application Programming Interface (also known variously as CryptoAPI, Microsoft Cryptography API, MS CAPI or simply CAPI) is an application programming interface included with Microsoft Windows operating systems that provides… … Wikipedia
Digital signature — This article is about secure cryptographic signatures. For simple signatures in digital form, see Electronic signature. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital… … Wikipedia