- enciphered key
- зашифрованный ключ
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Notarised key enciphering key — (KKU) An ISO term. A key enciphering key enciphered under a notarising key pair. 16x … International financial encyclopaedia
Notarised key enciphering key pair — (*KKU) An ISO term. A key enciphering key pair enciphered under a notarising key pair. 32x … International financial encyclopaedia
Notarised data key — (KDU) An ISO term. A data key enciphered under a notarising key pair. 16x … International financial encyclopaedia
зашифрованный ключ — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации EN enciphered key … Справочник технического переводчика
Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… … Wikipedia
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
Vigenère cipher — The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.The Vigenère (pronEng|ˌviːdʒɪˈnɛəɹ, veedj ih nair )… … Wikipedia
M-209 — can also refer to a highway in the U.S. state of Michigan; see M 209 (Michigan highway) In cryptography, the M 209, designated CSP 1500 by the Navy (C 38 by the manufacturer) is a portable, mechanical cipher machine used by the US military… … Wikipedia
Room 40 — Admiralty Ripley building In Whitehall, built in 1726 and still used for naval board meetings. Room 40 was in the northern section of the first floor, on the same corridor as the boardroom and First Sea Lord s office. In the history of… … Wikipedia
Enigma machine — Military Enigma machine … Wikipedia
Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent … Wikipedia