compromised cryptosystem


compromised cryptosystem
скомпрометированная криптосистема (потерявшая секретность в результате того, что ее секретные криптопеременные стали известны противнику)

English-Russian cryptological dictionary . 2014.

Смотреть что такое "compromised cryptosystem" в других словарях:

  • скомпрометированная криптосистема — Криптосистема, потерявшая секретность в результате того, что ее секретные криптопеременные стали известны противнику. [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации EN compromised cryptosystem …   Справочник технического переводчика

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit …   Wikipedia

  • Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Plaintext — This article is about cryptography. For the computing term meaning the storage of textual material that is (largely) unformatted, see plain text. In cryptography, plaintext is information a sender wishes to transmit to a receiver. Cleartext is… …   Wikipedia

  • XSL attack — In cryptography, the XSL attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002 by researchers Nicolas Courtois and Josef Pieprzyk. It has caused some controversy as it was claimed to have the potential to… …   Wikipedia

  • Intelligence cycle management — This article is at the top level of a series of articles about Intelligence Cycle Management.Within the context of government, military and business affairs, intelligence (the gathering and analysis of accurate, reliable information) is intended… …   Wikipedia

  • Anonymous remailer — An anonymous remailer is a server computer which receives messages with embedded instructions on where to send them next, and which forwards them without revealing where they originally came from. There are Cypherpunk anonymous remailers,… …   Wikipedia

  • Backdoor (computing) — A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may …   Wikipedia

  • Random number generator attack — The security of cryptographic systems depends on some secret data that is known to authorized persons but unknown and unpredictable to others. To achieve this unpredictability, some randomization is typically employed. Modern cryptographic… …   Wikipedia

  • Clandestine HUMINT operational techniques — The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called tradecraft . It applies to clandestine… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.