Encryption - ترجمة إلى إسباني
DICLIB.COM
أدوات لغة الذكاء الاصطناعي
أدخل كلمة أو عبارة بأي لغة 👆
اللغة:     

ترجمة وتحليل الكلمات بواسطة الذكاء الاصطناعي

في هذه الصفحة يمكنك الحصول على تحليل مفصل لكلمة أو عبارة باستخدام أفضل تقنيات الذكاء الاصطناعي المتوفرة اليوم:

  • كيف يتم استخدام الكلمة في اللغة
  • تردد الكلمة
  • ما إذا كانت الكلمة تستخدم في كثير من الأحيان في اللغة المنطوقة أو المكتوبة
  • خيارات الترجمة إلى الروسية أو الإسبانية، على التوالي
  • أمثلة على استخدام الكلمة (عدة عبارات مع الترجمة)
  • أصل الكلمة

Encryption - ترجمة إلى إسباني

PROCESS OF ENCODING INFORMATION, WHICH IS CONVERSION OF THE ORIGINAL REPRESENTATION OF THE INFORMATION, KNOWN AS PLAINTEXT, INTO AN ALTERNATIVE FORM KNOWN AS CIPHERTEXT
CipheR; Decrypt; Decryption; Decrypting; Data encryption; Encryption algorithm; Encrypt; Encrypting; Ciphertexts; Data encryption software; Decrypter; List of ciphers; Cipher algorithm; Encrypted; Encryptional wired system; Network encryption; Encryption algorithms; Decryption key; Encryption and decryption; Cryptographic algorithm; Encrypts; Cryptography algorithm; Draft:Encrytpion Algorithms
  • A simple illustration of [[public-key cryptography]], one of the most widely used forms of encryption

Encryption         
Encriptación, cifrado
encryption         
noun
cifrado m
encryption         
(n.) = encriptación, codificación
Ex: Apart from serving as "electronic money", smart cards are already being envisaged as identification and access control passes, bearers of personal records, encryption devices and so on.
----
* crack + encryption software = descodificar una programa de encriptación

ويكيبيديا

Encryption

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.

For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users.

Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often used in military messaging. Since then, new techniques have emerged and become commonplace in all areas of modern computing. Modern encryption schemes use the concepts of public-key and symmetric-key. Modern encryption techniques ensure security because modern computers are inefficient at cracking the encryption.

أمثلة من مجموعة نصية لـ٪ 1
1. Most WLAN networks used WEP encryption for security purposes, but FICORA recommends using the newer WPA encryption, if possible.
2. "Against traffic analysis, encryption is irrelevant." Agencies
3. To protect its Wi–Fi system, Dartmouth employs an encryption system called WEP2 (Wireless Equivalent Privacy) and is looking to enhance that with further encryption techniques, Mr.
4. Cheman calls his encryption method «Absolute Public Key Cryptography.» The above security essential is seriously lacking in the encryption techniques presently available in the market.
5. PGP, like all encryption algorithms, requires a password for decryption.