key-dependent algorithm

key-dependent algorithm
алгоритм (шифрования), управляемый ключом (зависящий от ключа)

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Поможем написать курсовую

Смотреть что такое "key-dependent algorithm" в других словарях:

  • Key selection vector — The Key Selection Vector means the numerical associated with a Device Key Set and distributed by Licensor or its designee to Adopters and used to support authentication of Licensed Products and Revocation. It is considered a confidential set of… …   Wikipedia

  • Weak key — In cryptography, a weak key is a key which when used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually represent a very small fraction of the overall keyspace, which usually means that if one generates a… …   Wikipedia

  • Search algorithm — In computer science, a search algorithm, broadly speaking, is an algorithm that takes a problem as input and returns a solution to the problem, usually after evaluating a number of possible solutions. Most of the algorithms studied by computer… …   Wikipedia

  • Pre-shared key — In cryptography, a pre shared key or PSK is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used. Such systems almost always use symmetric key cryptographic algorithms. The… …   Wikipedia

  • Blowfish (cipher) — Infobox block cipher name = Blowfish caption = The round function (Feistel function) of Blowfish designers = Bruce Schneier publish date = 1993 derived from = derived to = Twofish key size = 32 448 bits in steps of 8 bits; default 128 bits block… …   Wikipedia

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Twofish — Infobox block cipher name = Twofish caption = The Twofish algorithm designers = Bruce Schneier publish date = 1998 derived from = Blowfish, SAFER, Square derived to = related to = certification = AES finalist key size = 128, 192 or 256 bits block …   Wikipedia

  • ICE (cipher) — Infobox block cipher name = ICE caption = The ICE Feistel function designers = Matthew Kwan publish date = 1997 derived from = DES derived to = key size = 64 bits (ICE), 64 times; n bits (ICE n ) block size = 64 bits structure = Feistel network… …   Wikipedia

  • FROG — This article is about the block cipher algorithm. For the ultrafast laser pulse measurement technique, see frequency resolved optical gating. For the amphibian, see Frog. For other uses, see Frog (disambiguation). Infobox block cipher name = FROG …   Wikipedia

  • Хандшух, Хелен — Хелен Хандшух (англ. Helena Handschuh)  криптограф. Наиболее известная разработка  симметричный блочный криптоалгоритм SHACAL. Помимо этого принимала участие в создании блочного шифра Universal Encryption Standard. С 2009 года… …   Википедия

  • Hasty Pudding cipher — Infobox block cipher name = Hasty Pudding Cipher caption = designers = Richard Schroeppel publish date = 1998 ndash;06 derived from = derived to = related to = certification = key size = Variable block size = Variable structure = rounds =… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»