- secret\ key
- секретный ключ (AC)
Англо-русский cловарь терминов и сокращений по мобильной радиосвязи стандарта GSM. 2013.
Англо-русский cловарь терминов и сокращений по мобильной радиосвязи стандарта GSM. 2013.
Secret Key — Entschlüsselung mit geheimem Schlüssel Unter einem geheimen Schlüssel (englisch secret key) versteht man in der Kryptologie Schlüssel, die nur ihren legitimen Inhabern bekannt sein dürfen, und diese in die Lage versetzen, einen Geheimtext in… … Deutsch Wikipedia
RSA Secret-Key Challenge — The RSA Secret Key Challenge was a series of cryptographic contests that were started by RSA Laboratories on January 28, 1997 with the intent of helping to demonstrate the relative security of different encryption algorithms. The RSA Secret Key… … Wikipedia
George's Secret Key to the Universe — Infobox Book | name = George s Secret Key to the Universe image caption = Cover author = Lucy Hawking, Stephen Hawking country = Great Britain language = English genre = Popular science publisher = Doubleday release date = 2007 media type = pages … Wikipedia
Generic Security Service Algorithm for Secret Key Transaction — GSS TSIG (Generic Security Service Algorithm for Secret Key Transaction) is an authentication protocol for DNS, which is the extension to TSIG Protocol. The GSS TSIG is a frame work of GSS API to provide authentication, integrity and… … Wikipedia
George's Secret Key to the Universe — Georges et les secrets de l univers Georges et les secrets de l univers Auteur Lucy Hawking, Stephen Hawking Préface Carl Sagan Genre Vulgarisation de la cosmologie Version originale Titre origina … Wikipédia en Français
Secret-Key-Kryptosystem — Verschlüsselung Entschlüsselung Ein symmetrisches Kryptosystem ist ein Kryptosystem, welches im Gegensatz zu einem asymmetrischen Kryptos … Deutsch Wikipedia
SECRET KEY ENCRYPTION - шифрование секретным ключом — метод, в котором для шифрования/расшифровки данных используется один ключ, известный только участникам сеанса связи … Словарь электронного бизнеса
Key generation — is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Modern cryptographic systems include symmetric key algorithms (such as DES and AES) and public key algorithms… … Wikipedia
Key distribution — In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it involved face to face meeting, use of a… … Wikipedia
Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… … Wikipedia
Key selection vector — The Key Selection Vector means the numerical associated with a Device Key Set and distributed by Licensor or its designee to Adopters and used to support authentication of Licensed Products and Revocation. It is considered a confidential set of… … Wikipedia