cryptographic checksum - definição. O que é cryptographic checksum. Significado, conceito
Diclib.com
Dicionário ChatGPT
Digite uma palavra ou frase em qualquer idioma 👆
Idioma:

Tradução e análise de palavras por inteligência artificial ChatGPT

Nesta página você pode obter uma análise detalhada de uma palavra ou frase, produzida usando a melhor tecnologia de inteligência artificial até o momento:

  • como a palavra é usada
  • frequência de uso
  • é usado com mais frequência na fala oral ou escrita
  • opções de tradução de palavras
  • exemplos de uso (várias frases com tradução)
  • etimologia

O que (quem) é cryptographic checksum - definição

Cryptographic Log On; Cryptographic logon

one-way hash function         
SPECIAL CLASS OF HASH FUNCTION THAT HAS CERTAIN PROPERTIES WHICH MAKE IT SUITABLE FOR USE IN CRYPTOGRAPHY
Message digest; Cryptographic hash; Cryptographic message digest; One-way hash; Modification Detection Code; Cryptographic hash functions; Hash function (cryptography); One-way hash function; CRHF; Secure hash function; One way encryption; Numerical hash; Cryptograhic hash; Cryptographic hash value; Cryptographic Hash Function; Cryptographic one-way hash function; Message-digest; Message-digest algorithm; Sphincter hash; Terahash; Cryptographic hashing; Wide pipe; Wide pipe hash; Wide pipe design; Wide pipe construction; Wide-pipe; Widepipe; Narrowpipe; Narrow-pipe; Narrow pipe; Applications of cryptographic hash functions; Cryptographic hashes; Hash (cryptography)
<algorithm> (Or "message digest function") A {one-way function} which takes a variable-length message and produces a fixed-length hash. Given the hash it is computationally infeasible to find a message with that hash; in fact one can't determine any usable information about a message with that hash, not even a single bit. For some one-way hash functions it's also computationally impossible to determine two messages which produce the same hash. A one-way hash function can be private or public, just like an encryption function. MD5, SHA and Snefru are examples of public one-way hash functions. A public one-way hash function can be used to speed up a public-key digital signature system. Rather than sign a long message, which can take a long time, compute the one-way hash of the message, and sign the hash. {sci.crypt FAQ (ftp://src.doc.ic.ac.uk/usenet/usenet-by-group/sci.crypt/)}. (2001-05-10)
checksum         
  • Effect of a typical checksum function (the Unix<code>[[cksum]]</code> utility)
SMALL-SIZE DATUM COMPUTED FROM AN ARBITRARY BLOCK OF DIGITAL DATA FOR THE PURPOSE OF DETECTING ERRORS
Check sum; Check-sum; Checksums; Integrity check value; Checksun; ICV - Integrity Check Value; Checksum algorithm; Header checksum; Modular sum; Fuzzy checksum; Checksum function
<storage, communications> A computed value which depends on the contents of a block of data and which is transmitted or stored along with the data in order to detect corruption of the data. The receiving system recomputes the checksum based upon the received data and compares this value with the one sent with the data. If the two values are the same, the receiver has some confidence that the data was received correctly. The checksum may be 8 bits (modulo 256 sum), 16, 32, or some other size. It is computed by summing the bytes or words of the data block ignoring overflow. The checksum may be negated so that the total of the data words plus the checksum is zero. Internet packets use a 32-bit checksum. See also digital signature, cyclic redundancy check. (1996-03-01)
Checksum         
  • Effect of a typical checksum function (the Unix<code>[[cksum]]</code> utility)
SMALL-SIZE DATUM COMPUTED FROM AN ARBITRARY BLOCK OF DIGITAL DATA FOR THE PURPOSE OF DETECTING ERRORS
Check sum; Check-sum; Checksums; Integrity check value; Checksun; ICV - Integrity Check Value; Checksum algorithm; Header checksum; Modular sum; Fuzzy checksum; Checksum function
A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity.

Wikipédia

Cryptographic log on

Cryptographic log-on (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user's identification to a workstation and network. It replaces the username and passwords for identifying and authenticating users. To log-on cryptographically to a CLO-enabled workstation, users simply insert their CAC into their workstation’s CAC reader and provide their Personal Identification Number (PIN).

The Navy/Marine Corps Intranet, among many other secure networks, uses CLO.