data cryptography - ترجمة إلى الروسية
Diclib.com
قاموس ChatGPT
أدخل كلمة أو عبارة بأي لغة 👆
اللغة:

ترجمة وتحليل الكلمات عن طريق الذكاء الاصطناعي ChatGPT

في هذه الصفحة يمكنك الحصول على تحليل مفصل لكلمة أو عبارة باستخدام أفضل تقنيات الذكاء الاصطناعي المتوفرة اليوم:

  • كيف يتم استخدام الكلمة في اللغة
  • تردد الكلمة
  • ما إذا كانت الكلمة تستخدم في كثير من الأحيان في اللغة المنطوقة أو المكتوبة
  • خيارات الترجمة إلى الروسية أو الإسبانية، على التوالي
  • أمثلة على استخدام الكلمة (عدة عبارات مع الترجمة)
  • أصل الكلمة

data cryptography - ترجمة إلى الروسية

CRYPTOGRAPHIC PROOF OF A MESSAGE SENDER'S IDENTITY
Nonrepudiation; Non-Repudiation; Non-repudiability; Data availability (cryptography)

data cryptography      
криптография для защиты (закрытия) данных; шифрование данных
public key cryptography         
  • digitally signed]] with Alice's private key, but the message itself is not encrypted.
1) Alice signs a message with her private key.
2) Using Alice's public key, Bob can verify that Alice sent the message and that the message has not been modified.
  • In an asymmetric key encryption scheme, anyone can encrypt messages using a public key, but only the holder of the paired private key can decrypt such a message. The security of the system depends on the secrecy of the private key, which must not become known to any other.
  • symmetric cipher]] which will be, in essentially all cases, much faster.
CRYPTOSYSTEM THAT USES BOTH PUBLIC AND PRIVATE KEYS
Private key; Asymmetric key algorithm; Public key algorithm; Public key; Public key cryptography; Asymmetric key cryptography; Public key encyption; Public key crytography; Asymmetric key; Asymmetric key encryption algorithm; Public key encryption; Public-key encryption; Public-key; Asymmetric key encryption; Asymmetric cryptography; Non-secret encryption; Asymmetric key algorithms; Asymmetric encryption; Keypair cryptography; Public Key Cryptography; Private key encryption; Public-key cryptosystem; Public key cryptosystem; Assymetric key cryptography; PubKey; Asymmetric-key cryptography; Asynchronous encryption; Public/private key cryptography; Asymmetric-key algorithm; Key pair; Keypair; Key Pair; Asymmetric crypto; Public encryption key; Asymmetric cryptosystem; Asymmetric cypher; Asymmetric cipher; Asymmetric algorithm; Asymmetric Algorithms; Public Key Encryption; Private Key Encryption; Secret-key; Key pairs; Asymmetric-key cryptosystem; Public key pair; Public-key encrytption; Asymmetrical encryption; Private keys; Applications of public-key cryptography
криптография с открытым ключом, двухключевая криптография, криптография множественного доступа
asymmetric encryption         
  • digitally signed]] with Alice's private key, but the message itself is not encrypted.
1) Alice signs a message with her private key.
2) Using Alice's public key, Bob can verify that Alice sent the message and that the message has not been modified.
  • In an asymmetric key encryption scheme, anyone can encrypt messages using a public key, but only the holder of the paired private key can decrypt such a message. The security of the system depends on the secrecy of the private key, which must not become known to any other.
  • symmetric cipher]] which will be, in essentially all cases, much faster.
CRYPTOSYSTEM THAT USES BOTH PUBLIC AND PRIVATE KEYS
Private key; Asymmetric key algorithm; Public key algorithm; Public key; Public key cryptography; Asymmetric key cryptography; Public key encyption; Public key crytography; Asymmetric key; Asymmetric key encryption algorithm; Public key encryption; Public-key encryption; Public-key; Asymmetric key encryption; Asymmetric cryptography; Non-secret encryption; Asymmetric key algorithms; Asymmetric encryption; Keypair cryptography; Public Key Cryptography; Private key encryption; Public-key cryptosystem; Public key cryptosystem; Assymetric key cryptography; PubKey; Asymmetric-key cryptography; Asynchronous encryption; Public/private key cryptography; Asymmetric-key algorithm; Key pair; Keypair; Key Pair; Asymmetric crypto; Public encryption key; Asymmetric cryptosystem; Asymmetric cypher; Asymmetric cipher; Asymmetric algorithm; Asymmetric Algorithms; Public Key Encryption; Private Key Encryption; Secret-key; Key pairs; Asymmetric-key cryptosystem; Public key pair; Public-key encrytption; Asymmetrical encryption; Private keys; Applications of public-key cryptography
асимметричное шифрование (в двухключевой криптосистеме) асимметричное шифрование (в двухключевой криптосистеме)

تعريف

private key
<cryptography> A piece of data used in {private-key cryptography} and public-key cryptography. In the former the private key is known by both sender and recipient whereas in the latter it is known only to the sender. (2008-02-07)

ويكيبيديا

Non-repudiation

In law, non-repudiation is a situation where a statement's author cannot successfully dispute its authorship or the validity of an associated contract. The term is often seen in a legal setting when the authenticity of a signature is being challenged. In such an instance, the authenticity is being "repudiated".

For example, Mallory buys a cell phone for $100, writes a paper cheque as payment, and signs the cheque with a pen. Later, she finds that she can't afford it, and claims that the cheque is a forgery. The signature guarantees that only Mallory could have signed the cheque, and so Mallory's bank must pay the cheque. This is non-repudiation; Mallory cannot repudiate the cheque. In practice, pen-and-paper signatures aren't hard to forge, but digital signatures can be very hard to break.

What is the الروسية for data cryptography? Translation of &#39data cryptography&#39 to الروسية