cryptographic algorithm

cryptographic algorithm
šifras statusas T sritis informatika apibrėžtis Taisyklių arba komandų rinkinys ↑užšifravimo ir ↑iššifravimo operacijoms atlikti. Dar vartojama kriptografinis algoritmas. atitikmenys: angl. cipher; cryptographic algorithm ryšiai: dar žiūrėkiššifravimas dar žiūrėkkriptografija viešuoju raktu dar žiūrėkpasirašymo liudijimas dar žiūrėkprivatusis raktas dar žiūrėksimetrinis šifravimas dar žiūrėksudvejintos raktų poros dar žiūrėkužšifravimas dar žiūrėkužšifravimo liudijimas dar žiūrėkviešasis raktas palyginkkodas palyginkkodas palyginkkodas

Enciklopedinis kompiuterijos žodynas . . 2008.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Cryptographic Module Validation Program — Logo of the Cryptographic Module Validation Program. The Cryptographic Module Validation Program (CMVP) is a joint American and Canadian security accreditation program for cryptographic modules. The program is available to any vendors who seek to …   Wikipedia

  • Cryptographic primitive — Cryptographic primitives are well established, low level cryptographic algorithms that are frequently used to build computer security systems. These routines include, but are not limited to, one way hash functions and encryption functions.… …   Wikipedia

  • Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… …   Wikipedia

  • Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… …   Wikipedia

  • Cryptographic key types — One of the most important aspects of any cryptographic system is key management; it is also the aspect which is most often neglected.[citation needed] A very common mistake is mixing different key types and reusing the same key for different… …   Wikipedia

  • Algorithm — Flow chart of an algorithm (Euclid s algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≤ A yields yes… …   Wikipedia

  • Cryptographic Message Syntax — The Cryptographic Message Syntax (CMS) is the IETF s standard for cryptographically protected messages. It can be used to digitally sign, digest, authenticate or encrypt any form of digital data. CMS is based on the syntax of PKCS#7, which in… …   Wikipedia

  • Cryptographic device —   An ISO term. The electronic hardware part, or subassembly which implements the encipherment algorithm …   International financial encyclopaedia

  • Cryptographic key —   An ISO term. A parameter used, in conjunction with an algorithm, for the purposes of validation, authentication, encipherment, or decipherment …   International financial encyclopaedia

  • Cayley-Purser algorithm — The Cayley Purser algorithm was a public key cryptography algorithm published in early 1999 by 16 year old Irishwoman Sarah Flannery, based on an unpublished work by Michael Purser, founder of Baltimore Technologies, a Dublin data security… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”