cryptology - ترجمة إلى الروسية
Diclib.com
قاموس ChatGPT
أدخل كلمة أو عبارة بأي لغة 👆
اللغة:

ترجمة وتحليل الكلمات عن طريق الذكاء الاصطناعي ChatGPT

في هذه الصفحة يمكنك الحصول على تحليل مفصل لكلمة أو عبارة باستخدام أفضل تقنيات الذكاء الاصطناعي المتوفرة اليوم:

  • كيف يتم استخدام الكلمة في اللغة
  • تردد الكلمة
  • ما إذا كانت الكلمة تستخدم في كثير من الأحيان في اللغة المنطوقة أو المكتوبة
  • خيارات الترجمة إلى الروسية أو الإسبانية، على التوالي
  • أمثلة على استخدام الكلمة (عدة عبارات مع الترجمة)
  • أصل الكلمة

cryptology - ترجمة إلى الروسية

WIKIMEDIA LIST ARTICLE
Clock (cryptology)
  • Enigma rotors. Turnover notch can be seen in left rotor near 13. Right rotor marking near center shows it is rotor II.

cryptology         
  • French]] cipher machine, with arms of [[Henri II of France]]
  • [[Poznań]] monument (''center'') to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
  • First page of a book by [[Al-Kindi]] which discusses encryption of messages
  • 1=''k'' = 3}}. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • [[Whitfield Diffie]] and [[Martin Hellman]], authors of the first published paper on public-key cryptography.
  • Enciphered letter from [[Gabriel de Luetz d'Aramon]], [[French Ambassador to the Ottoman Empire]], after 1546, with partial decipherment
  • Cipher Bureau]], for 7 years before the war, and subsequent decryption at [[Bletchley Park]], was important to Allied victory.<ref name="kahnbook" />
  • PGP]] and OpenPGP compatible software for time-efficient encryption of messages
  • NSA headquarters in Fort Meade, Maryland
  • In this example the message is only signed and not encrypted.
1) Alice signs a message with her private key.
2) Bob can verify that Alice sent the message and that the message has not been modified.
  • Public-key cryptography, where different keys are used for encryption and decryption.
  • Reconstructed [[ancient Greek]] ''[[scytale]]'', an early cipher device
  • Symmetric-key cryptography, where a single key is used for encryption and decryption
PRACTICE AND STUDY OF SECURE COMMUNICATION TECHNIQUES
CryptologY; CryptographY; Cryptology; Cryptographer; Cryptographic; Codes and ciphers; Cyptography; Computer Cryptology; Cryptography Classification; Cryptography Notes; Cryptographic systems; Declarative Security System; Cryptographic Systems; Secret code; Code making; Polygraphia; Applied cryptography; Kriptografia; Mathematical cryptography; Cryptographically; Lightweight cipher

[krip'tɔlədʒi]

общая лексика

криптология

наука о создании и анализе систем безопасного хранения и передачи информации. Термин используется для обозначения всей области секретной связи. Происходит от слов cryptos - тайный и logos - сообщение. Делится на три направления: криптографию (cryptography), стеганографию (steganography) и криптоанализ (cryptoanalysis)

существительное

общая лексика

криптология

наука о расшифровке тайнописи

синоним

cryptanalisis

cryptology         
  • French]] cipher machine, with arms of [[Henri II of France]]
  • [[Poznań]] monument (''center'') to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
  • First page of a book by [[Al-Kindi]] which discusses encryption of messages
  • 1=''k'' = 3}}. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • [[Whitfield Diffie]] and [[Martin Hellman]], authors of the first published paper on public-key cryptography.
  • Enciphered letter from [[Gabriel de Luetz d'Aramon]], [[French Ambassador to the Ottoman Empire]], after 1546, with partial decipherment
  • Cipher Bureau]], for 7 years before the war, and subsequent decryption at [[Bletchley Park]], was important to Allied victory.<ref name="kahnbook" />
  • PGP]] and OpenPGP compatible software for time-efficient encryption of messages
  • NSA headquarters in Fort Meade, Maryland
  • In this example the message is only signed and not encrypted.
1) Alice signs a message with her private key.
2) Bob can verify that Alice sent the message and that the message has not been modified.
  • Public-key cryptography, where different keys are used for encryption and decryption.
  • Reconstructed [[ancient Greek]] ''[[scytale]]'', an early cipher device
  • Symmetric-key cryptography, where a single key is used for encryption and decryption
PRACTICE AND STUDY OF SECURE COMMUNICATION TECHNIQUES
CryptologY; CryptographY; Cryptology; Cryptographer; Cryptographic; Codes and ciphers; Cyptography; Computer Cryptology; Cryptography Classification; Cryptography Notes; Cryptographic systems; Declarative Security System; Cryptographic Systems; Secret code; Code making; Polygraphia; Applied cryptography; Kriptografia; Mathematical cryptography; Cryptographically; Lightweight cipher
computer cryptology         
  • French]] cipher machine, with arms of [[Henri II of France]]
  • [[Poznań]] monument (''center'') to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
  • First page of a book by [[Al-Kindi]] which discusses encryption of messages
  • 1=''k'' = 3}}. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • [[Whitfield Diffie]] and [[Martin Hellman]], authors of the first published paper on public-key cryptography.
  • Enciphered letter from [[Gabriel de Luetz d'Aramon]], [[French Ambassador to the Ottoman Empire]], after 1546, with partial decipherment
  • Cipher Bureau]], for 7 years before the war, and subsequent decryption at [[Bletchley Park]], was important to Allied victory.<ref name="kahnbook" />
  • PGP]] and OpenPGP compatible software for time-efficient encryption of messages
  • NSA headquarters in Fort Meade, Maryland
  • In this example the message is only signed and not encrypted.
1) Alice signs a message with her private key.
2) Bob can verify that Alice sent the message and that the message has not been modified.
  • Public-key cryptography, where different keys are used for encryption and decryption.
  • Reconstructed [[ancient Greek]] ''[[scytale]]'', an early cipher device
  • Symmetric-key cryptography, where a single key is used for encryption and decryption
PRACTICE AND STUDY OF SECURE COMMUNICATION TECHNIQUES
CryptologY; CryptographY; Cryptology; Cryptographer; Cryptographic; Codes and ciphers; Cyptography; Computer Cryptology; Cryptography Classification; Cryptography Notes; Cryptographic systems; Declarative Security System; Cryptographic Systems; Secret code; Code making; Polygraphia; Applied cryptography; Kriptografia; Mathematical cryptography; Cryptographically; Lightweight cipher
1) криптология в вычислительной технике 2) компьютерная криптология

تعريف

cryptology
¦ noun the study of codes, or the art of writing and solving them.
Derivatives
cryptological adjective
cryptologist noun

ويكيبيديا

Clock (cryptography)

In cryptography, the clock was a method devised by Polish mathematician-cryptologist Jerzy Różycki, at the Polish General Staff's Cipher Bureau, to facilitate decrypting German Enigma ciphers. The method determined the rightmost rotor in the German Enigma by exploiting the different turnover positions. For the Poles, learning the rightmost rotor reduced the rotor-order search space by a factor of 3 (the number of rotors). The British improved the method, and it allowed them to use their limited number of bombes more effectively (the British confronted 5 to 8 rotors).

أمثلة من مجموعة نصية لـ٪ 1
1. The decree means foreign investors who want to take a significant stake in French companies operating in 11 sensitive sectors from defence to cryptology must seek approval first.
2. Craig Koziol, a top Air Force intelligence officer in charge of information operations and cryptology, according to records obtained by the AP under the Freedom of Information Act.
3. The government list of sensitive industries is due to be published in the next few weeks and will include strategic sectors such as defence, armaments and cryptology, as well as security, vaccine production and secure information systems.
4. The New York Times on Sunday highlighted a lengthy analysis by a top historian at the National Security Agency, the US communications/cryptology intelligence service, which suggests that a combination of incompetence and anti–Semitism prevented the Allied intelligence services from identifying the unfolding Holocaust in Europe.
5. The protected sectors include the provision of private security for sensitive installations such as nuclear reactors; information security; dual–use technology for military or civilian applications; biotechnology that could be useful to terrorists; cryptology; bugging equipment; and casinos, where the government is concerned about money laundering. à Charlie McCreevy, the EU internal market commissioner, wrote to the French government in January warning that the decree could run foul of rules guaranteeing the free movement of capital in the EU.
What is the الروسية for cryptology? Translation of &#39cryptology&#39 to الروسية