cryptographic$17950$ - Übersetzung nach spanisch
Diclib.com
Wörterbuch ChatGPT
Geben Sie ein Wort oder eine Phrase in einer beliebigen Sprache ein 👆
Sprache:     

Übersetzung und Analyse von Wörtern durch künstliche Intelligenz ChatGPT

Auf dieser Seite erhalten Sie eine detaillierte Analyse eines Wortes oder einer Phrase mithilfe der besten heute verfügbaren Technologie der künstlichen Intelligenz:

  • wie das Wort verwendet wird
  • Häufigkeit der Nutzung
  • es wird häufiger in mündlicher oder schriftlicher Rede verwendet
  • Wortübersetzungsoptionen
  • Anwendungsbeispiele (mehrere Phrasen mit Übersetzung)
  • Etymologie

cryptographic$17950$ - Übersetzung nach spanisch

Cryptographic Log On; Cryptographic logon

cryptographic      
adj. de idioma clave
cryptography         
  • French]] cipher machine, with arms of [[Henri II of France]]
  • [[Poznań]] monument (''center'') to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
  • First page of a book by [[Al-Kindi]] which discusses encryption of messages
  • 1=''k'' = 3}}. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • [[Whitfield Diffie]] and [[Martin Hellman]], authors of the first published paper on public-key cryptography.
  • Enciphered letter from [[Gabriel de Luetz d'Aramon]], [[French Ambassador to the Ottoman Empire]], after 1546, with partial decipherment
  • Cipher Bureau]], for 7 years before the war, and subsequent decryption at [[Bletchley Park]], was important to Allied victory.<ref name="kahnbook" />
  • PGP]] and OpenPGP compatible software for time-efficient encryption of messages
  • NSA headquarters in Fort Meade, Maryland
  • In this example the message is only signed and not encrypted.
1) Alice signs a message with her private key.
2) Bob can verify that Alice sent the message and that the message has not been modified.
  • Public-key cryptography, where different keys are used for encryption and decryption.
  • Reconstructed [[ancient Greek]] ''[[scytale]]'', an early cipher device
  • Symmetric-key cryptography, where a single key is used for encryption and decryption
PRACTICE AND STUDY OF SECURE COMMUNICATION TECHNIQUES
CryptologY; CryptographY; Cryptology; Cryptographer; Cryptographic; Codes and ciphers; Cyptography; Computer Cryptology; Cryptography Classification; Cryptography Notes; Cryptographic systems; Declarative Security System; Cryptographic Systems; Secret code; Code making; Polygraphia; Applied cryptography; Kriptografia; Mathematical cryptography; Cryptographically; Lightweight cipher
(n.) = criptografía
Ex: These latter may include control of access to stored data by, say, automatic finger-print or voice-print identification, or protection of data while in transit through a privacy transformation, better known as cryptography.
cryptology         
  • French]] cipher machine, with arms of [[Henri II of France]]
  • [[Poznań]] monument (''center'') to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
  • First page of a book by [[Al-Kindi]] which discusses encryption of messages
  • 1=''k'' = 3}}. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • [[Whitfield Diffie]] and [[Martin Hellman]], authors of the first published paper on public-key cryptography.
  • Enciphered letter from [[Gabriel de Luetz d'Aramon]], [[French Ambassador to the Ottoman Empire]], after 1546, with partial decipherment
  • Cipher Bureau]], for 7 years before the war, and subsequent decryption at [[Bletchley Park]], was important to Allied victory.<ref name="kahnbook" />
  • PGP]] and OpenPGP compatible software for time-efficient encryption of messages
  • NSA headquarters in Fort Meade, Maryland
  • In this example the message is only signed and not encrypted.
1) Alice signs a message with her private key.
2) Bob can verify that Alice sent the message and that the message has not been modified.
  • Public-key cryptography, where different keys are used for encryption and decryption.
  • Reconstructed [[ancient Greek]] ''[[scytale]]'', an early cipher device
  • Symmetric-key cryptography, where a single key is used for encryption and decryption
PRACTICE AND STUDY OF SECURE COMMUNICATION TECHNIQUES
CryptologY; CryptographY; Cryptology; Cryptographer; Cryptographic; Codes and ciphers; Cyptography; Computer Cryptology; Cryptography Classification; Cryptography Notes; Cryptographic systems; Declarative Security System; Cryptographic Systems; Secret code; Code making; Polygraphia; Applied cryptography; Kriptografia; Mathematical cryptography; Cryptographically; Lightweight cipher
noun
criptología f

Definition

one-way hash function
<algorithm> (Or "message digest function") A {one-way function} which takes a variable-length message and produces a fixed-length hash. Given the hash it is computationally infeasible to find a message with that hash; in fact one can't determine any usable information about a message with that hash, not even a single bit. For some one-way hash functions it's also computationally impossible to determine two messages which produce the same hash. A one-way hash function can be private or public, just like an encryption function. MD5, SHA and Snefru are examples of public one-way hash functions. A public one-way hash function can be used to speed up a public-key digital signature system. Rather than sign a long message, which can take a long time, compute the one-way hash of the message, and sign the hash. {sci.crypt FAQ (ftp://src.doc.ic.ac.uk/usenet/usenet-by-group/sci.crypt/)}. (2001-05-10)

Wikipedia

Cryptographic log on

Cryptographic log-on (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user's identification to a workstation and network. It replaces the username and passwords for identifying and authenticating users. To log-on cryptographically to a CLO-enabled workstation, users simply insert their CAC into their workstation’s CAC reader and provide their Personal Identification Number (PIN).

The Navy/Marine Corps Intranet, among many other secure networks, uses CLO.