cryptographic$17950$ - translation to italian
DICLIB.COM
AI-based language tools
Enter a word or phrase in any language 👆
Language:     

Translation and analysis of words by artificial intelligence

On this page you can get a detailed analysis of a word or phrase, produced by the best artificial intelligence technology to date:

  • how the word is used
  • frequency of use
  • it is used more often in oral or written speech
  • word translation options
  • usage examples (several phrases with translation)
  • etymology

cryptographic$17950$ - translation to italian

Cryptographic Log On; Cryptographic logon

cryptographic      
adj. crittografo
digital certificate         
  • The roles of root certificate, intermediate certificate and end-entity certificate as in the [[chain of trust]].
  • The procedure of obtaining a Public key certificate
ELECTRONIC DOCUMENT USED TO PROVE THE OWNERSHIP OF A PUBLIC KEY
Digital certificate; Digital Certificate; Identity certificate; Digital identity certificate; Certificate (cryptography); Digital certificates; SSL Certificate; Server certificate; SSL certificate; Certificate in Computer Programming; Ssl certificate; Digital certification; Public-key certificate; Public key certificates; SSL Certificates; Cryptographic certificate; Digital Certification; SSL security certificate; SSL certificates; Organization Validation Certificate; OV certificate; Trusted root store; TLS certificate; Organization validation certificate; Intermediate certificate (cryptography)
(Internet) certificato di identità elettronico contenente dati personali dell"operatore (supporto digitale e codice inclusi), promette riserbo negli affari in rete

Definition

one-way hash function
<algorithm> (Or "message digest function") A {one-way function} which takes a variable-length message and produces a fixed-length hash. Given the hash it is computationally infeasible to find a message with that hash; in fact one can't determine any usable information about a message with that hash, not even a single bit. For some one-way hash functions it's also computationally impossible to determine two messages which produce the same hash. A one-way hash function can be private or public, just like an encryption function. MD5, SHA and Snefru are examples of public one-way hash functions. A public one-way hash function can be used to speed up a public-key digital signature system. Rather than sign a long message, which can take a long time, compute the one-way hash of the message, and sign the hash. {sci.crypt FAQ (ftp://src.doc.ic.ac.uk/usenet/usenet-by-group/sci.crypt/)}. (2001-05-10)

Wikipedia

Cryptographic log on

Cryptographic log-on (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user's identification to a workstation and network. It replaces the username and passwords for identifying and authenticating users. To log-on cryptographically to a CLO-enabled workstation, users simply insert their CAC into their workstation’s CAC reader and provide their Personal Identification Number (PIN).

The Navy/Marine Corps Intranet, among many other secure networks, uses CLO.