communications cryptograph

communications cryptograph
криптография для защиты связи

English-Russian cryptological dictionary . 2014.

Смотреть что такое "communications cryptograph" в других словарях:

  • Japanese cryptology from the 1500s to Meiji — The cipher system that Uesugi used is basically a simple substitution usually known as a Polybius square or “checkerboard.” The i ro ha alphabet contains forty eight letters, so a seven by seven square is used, with one of the cells left blank.… …   Wikipedia

  • Typex — In the history of cryptography, Typex (alternatively, Type X or TypeX) machines were British cipher machines used from 1937. It was an adaptation of the commercial German Enigma with a number of enhancements that greatly increased its security.… …   Wikipedia

  • cipher — cipherable, adj. cipherer, n. /suy feuhr/, n. 1. zero. 2. any of the Arabic numerals or figures. 3. Arabic numerical notation collectively. 4. something of no value or importance. 5. a person of no influence; nonentity. 6. a secret method of… …   Universalium

  • Crypto AG — Website Crypto AG is a Swiss company specialising in communications and information security. With headquarters in Steinhausen, the company is a long established manufacturer of encryption machines and a wide variety of… …   Wikipedia

  • Charles Wheatstone — Wheatstone, drawn by Samuel Laurence in 1868 Born 6 …   Wikipedia

  • Rotor machine — In cryptography, a rotor machine is an electro mechanical device used for encrypting and decrypting secret messages. Rotor machines were the cryptographic state of the art for a brief but prominent period of history; they were in widespread use… …   Wikipedia

  • M-94 — can also refer to a state trunkline in the U.S. state of Michigan. For the highway see, M 94 (Michigan highway) The M 94 was a piece of cryptographic equipment used by the United States army, consisting of several lettered discs arranged as a… …   Wikipedia

  • Geschichte der Kryptographie — Die Geschichte der Kryptographie lässt sich in drei Epochen aufteilen. In der ersten Phase wurde per Hand verschlüsselt, in der zweiten (etwa 1920 bis 1970) wurden spezielle Maschinen verwendet, in der dritten (etwa seit 1970) übernahm der… …   Deutsch Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.