cryptography - определение. Что такое cryptography
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

Что (кто) такое cryptography - определение

Найдено результатов: 215
cryptography         
  • French]] cipher machine, with arms of [[Henri II of France]]
  • [[Poznań]] monument (''center'') to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
  • First page of a book by [[Al-Kindi]] which discusses encryption of messages
  • 1=''k'' = 3}}. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • [[Whitfield Diffie]] and [[Martin Hellman]], authors of the first published paper on public-key cryptography.
  • Enciphered letter from [[Gabriel de Luetz d'Aramon]], [[French Ambassador to the Ottoman Empire]], after 1546, with partial decipherment
  • Cipher Bureau]], for 7 years before the war, and subsequent decryption at [[Bletchley Park]], was important to Allied victory.<ref name="kahnbook" />
  • PGP]] and OpenPGP compatible software for time-efficient encryption of messages
  • NSA headquarters in Fort Meade, Maryland
  • In this example the message is only signed and not encrypted.
1) Alice signs a message with her private key.
2) Bob can verify that Alice sent the message and that the message has not been modified.
  • Public-key cryptography, where different keys are used for encryption and decryption.
  • Reconstructed [[ancient Greek]] ''[[scytale]]'', an early cipher device
  • Symmetric-key cryptography, where a single key is used for encryption and decryption
PRACTICE AND STUDY OF SECURE COMMUNICATION TECHNIQUES
CryptologY; CryptographY; Cryptology; Cryptographer; Cryptographic; Codes and ciphers; Cyptography; Computer Cryptology; Cryptography Classification; Cryptography Notes; Cryptographic systems; Declarative Security System; Cryptographic Systems; Secret code; Code making; Polygraphia; Applied cryptography; Kriptografia; Mathematical cryptography; Cryptographically; Lightweight cipher
<cryptography> The practise and study of encryption and decryption - encoding data so that it can only be decoded by specific individuals. A system for encrypting and decrypting data is a cryptosystem. These usually involve an algorithm for combining the original data ("plaintext") with one or more "keys" - numbers or strings of characters known only to the sender and/or recipient. The resulting output is known as "ciphertext". The security of a cryptosystem usually depends on the secrecy of (some of) the keys rather than with the supposed secrecy of the algorithm. A strong cryptosystem has a large range of possible keys so that it is not possible to just try all possible keys (a "brute force" approach). A strong cryptosystem will produce ciphertext which appears random to all standard statistical tests. A strong cryptosystem will resist all known previous methods for breaking codes ("cryptanalysis"). See also cryptology, public-key encryption, RSA. Usenet newsgroups: news:sci.crypt, news:sci.crypt.research. FAQ {cryptography-faq/">MIT (ftp://rtfm.mit.edu/pub/usenet/news.answers/cryptography-faq/)}. {Cryptography glossary (http://io.com/cryptographyritter/GLOSSARY.HTM#BruteForceAttack)}. {RSA cryptography glossary (http://rsasecurity.com/rsalabs/faq/glossary.html)}. {Cryptography, PGP, and Your Privacy (http://draco.centerline.com:8080/cryptographyfranl/crypto.html)}. (2000-01-16)
cryptography         
  • French]] cipher machine, with arms of [[Henri II of France]]
  • [[Poznań]] monument (''center'') to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
  • First page of a book by [[Al-Kindi]] which discusses encryption of messages
  • 1=''k'' = 3}}. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • [[Whitfield Diffie]] and [[Martin Hellman]], authors of the first published paper on public-key cryptography.
  • Enciphered letter from [[Gabriel de Luetz d'Aramon]], [[French Ambassador to the Ottoman Empire]], after 1546, with partial decipherment
  • Cipher Bureau]], for 7 years before the war, and subsequent decryption at [[Bletchley Park]], was important to Allied victory.<ref name="kahnbook" />
  • PGP]] and OpenPGP compatible software for time-efficient encryption of messages
  • NSA headquarters in Fort Meade, Maryland
  • In this example the message is only signed and not encrypted.
1) Alice signs a message with her private key.
2) Bob can verify that Alice sent the message and that the message has not been modified.
  • Public-key cryptography, where different keys are used for encryption and decryption.
  • Reconstructed [[ancient Greek]] ''[[scytale]]'', an early cipher device
  • Symmetric-key cryptography, where a single key is used for encryption and decryption
PRACTICE AND STUDY OF SECURE COMMUNICATION TECHNIQUES
CryptologY; CryptographY; Cryptology; Cryptographer; Cryptographic; Codes and ciphers; Cyptography; Computer Cryptology; Cryptography Classification; Cryptography Notes; Cryptographic systems; Declarative Security System; Cryptographic Systems; Secret code; Code making; Polygraphia; Applied cryptography; Kriptografia; Mathematical cryptography; Cryptographically; Lightweight cipher
¦ noun the art of writing or solving codes.
Derivatives
cryptographer noun
cryptographic adjective
cryptographically adverb
Cryptography         
  • French]] cipher machine, with arms of [[Henri II of France]]
  • [[Poznań]] monument (''center'') to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
  • First page of a book by [[Al-Kindi]] which discusses encryption of messages
  • 1=''k'' = 3}}. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • [[Whitfield Diffie]] and [[Martin Hellman]], authors of the first published paper on public-key cryptography.
  • Enciphered letter from [[Gabriel de Luetz d'Aramon]], [[French Ambassador to the Ottoman Empire]], after 1546, with partial decipherment
  • Cipher Bureau]], for 7 years before the war, and subsequent decryption at [[Bletchley Park]], was important to Allied victory.<ref name="kahnbook" />
  • PGP]] and OpenPGP compatible software for time-efficient encryption of messages
  • NSA headquarters in Fort Meade, Maryland
  • In this example the message is only signed and not encrypted.
1) Alice signs a message with her private key.
2) Bob can verify that Alice sent the message and that the message has not been modified.
  • Public-key cryptography, where different keys are used for encryption and decryption.
  • Reconstructed [[ancient Greek]] ''[[scytale]]'', an early cipher device
  • Symmetric-key cryptography, where a single key is used for encryption and decryption
PRACTICE AND STUDY OF SECURE COMMUNICATION TECHNIQUES
CryptologY; CryptographY; Cryptology; Cryptographer; Cryptographic; Codes and ciphers; Cyptography; Computer Cryptology; Cryptography Classification; Cryptography Notes; Cryptographic systems; Declarative Security System; Cryptographic Systems; Secret code; Code making; Polygraphia; Applied cryptography; Kriptografia; Mathematical cryptography; Cryptographically; Lightweight cipher
·noun The act or art of writing in secret characters; also, secret characters, or cipher.
Cryptographic         
  • French]] cipher machine, with arms of [[Henri II of France]]
  • [[Poznań]] monument (''center'') to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
  • First page of a book by [[Al-Kindi]] which discusses encryption of messages
  • 1=''k'' = 3}}. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • [[Whitfield Diffie]] and [[Martin Hellman]], authors of the first published paper on public-key cryptography.
  • Enciphered letter from [[Gabriel de Luetz d'Aramon]], [[French Ambassador to the Ottoman Empire]], after 1546, with partial decipherment
  • Cipher Bureau]], for 7 years before the war, and subsequent decryption at [[Bletchley Park]], was important to Allied victory.<ref name="kahnbook" />
  • PGP]] and OpenPGP compatible software for time-efficient encryption of messages
  • NSA headquarters in Fort Meade, Maryland
  • In this example the message is only signed and not encrypted.
1) Alice signs a message with her private key.
2) Bob can verify that Alice sent the message and that the message has not been modified.
  • Public-key cryptography, where different keys are used for encryption and decryption.
  • Reconstructed [[ancient Greek]] ''[[scytale]]'', an early cipher device
  • Symmetric-key cryptography, where a single key is used for encryption and decryption
PRACTICE AND STUDY OF SECURE COMMUNICATION TECHNIQUES
CryptologY; CryptographY; Cryptology; Cryptographer; Cryptographic; Codes and ciphers; Cyptography; Computer Cryptology; Cryptography Classification; Cryptography Notes; Cryptographic systems; Declarative Security System; Cryptographic Systems; Secret code; Code making; Polygraphia; Applied cryptography; Kriptografia; Mathematical cryptography; Cryptographically; Lightweight cipher
·adj ·Alt. of Cryptographical.
cryptology         
  • French]] cipher machine, with arms of [[Henri II of France]]
  • [[Poznań]] monument (''center'') to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
  • First page of a book by [[Al-Kindi]] which discusses encryption of messages
  • 1=''k'' = 3}}. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • [[Whitfield Diffie]] and [[Martin Hellman]], authors of the first published paper on public-key cryptography.
  • Enciphered letter from [[Gabriel de Luetz d'Aramon]], [[French Ambassador to the Ottoman Empire]], after 1546, with partial decipherment
  • Cipher Bureau]], for 7 years before the war, and subsequent decryption at [[Bletchley Park]], was important to Allied victory.<ref name="kahnbook" />
  • PGP]] and OpenPGP compatible software for time-efficient encryption of messages
  • NSA headquarters in Fort Meade, Maryland
  • In this example the message is only signed and not encrypted.
1) Alice signs a message with her private key.
2) Bob can verify that Alice sent the message and that the message has not been modified.
  • Public-key cryptography, where different keys are used for encryption and decryption.
  • Reconstructed [[ancient Greek]] ''[[scytale]]'', an early cipher device
  • Symmetric-key cryptography, where a single key is used for encryption and decryption
PRACTICE AND STUDY OF SECURE COMMUNICATION TECHNIQUES
CryptologY; CryptographY; Cryptology; Cryptographer; Cryptographic; Codes and ciphers; Cyptography; Computer Cryptology; Cryptography Classification; Cryptography Notes; Cryptographic systems; Declarative Security System; Cryptographic Systems; Secret code; Code making; Polygraphia; Applied cryptography; Kriptografia; Mathematical cryptography; Cryptographically; Lightweight cipher
¦ noun the study of codes, or the art of writing and solving them.
Derivatives
cryptological adjective
cryptologist noun
Cryptology         
  • French]] cipher machine, with arms of [[Henri II of France]]
  • [[Poznań]] monument (''center'') to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
  • First page of a book by [[Al-Kindi]] which discusses encryption of messages
  • 1=''k'' = 3}}. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • [[Whitfield Diffie]] and [[Martin Hellman]], authors of the first published paper on public-key cryptography.
  • Enciphered letter from [[Gabriel de Luetz d'Aramon]], [[French Ambassador to the Ottoman Empire]], after 1546, with partial decipherment
  • Cipher Bureau]], for 7 years before the war, and subsequent decryption at [[Bletchley Park]], was important to Allied victory.<ref name="kahnbook" />
  • PGP]] and OpenPGP compatible software for time-efficient encryption of messages
  • NSA headquarters in Fort Meade, Maryland
  • In this example the message is only signed and not encrypted.
1) Alice signs a message with her private key.
2) Bob can verify that Alice sent the message and that the message has not been modified.
  • Public-key cryptography, where different keys are used for encryption and decryption.
  • Reconstructed [[ancient Greek]] ''[[scytale]]'', an early cipher device
  • Symmetric-key cryptography, where a single key is used for encryption and decryption
PRACTICE AND STUDY OF SECURE COMMUNICATION TECHNIQUES
CryptologY; CryptographY; Cryptology; Cryptographer; Cryptographic; Codes and ciphers; Cyptography; Computer Cryptology; Cryptography Classification; Cryptography Notes; Cryptographic systems; Declarative Security System; Cryptographic Systems; Secret code; Code making; Polygraphia; Applied cryptography; Kriptografia; Mathematical cryptography; Cryptographically; Lightweight cipher
·noun Secret or enigmatical language.
cryptology         
  • French]] cipher machine, with arms of [[Henri II of France]]
  • [[Poznań]] monument (''center'') to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
  • First page of a book by [[Al-Kindi]] which discusses encryption of messages
  • 1=''k'' = 3}}. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • [[Whitfield Diffie]] and [[Martin Hellman]], authors of the first published paper on public-key cryptography.
  • Enciphered letter from [[Gabriel de Luetz d'Aramon]], [[French Ambassador to the Ottoman Empire]], after 1546, with partial decipherment
  • Cipher Bureau]], for 7 years before the war, and subsequent decryption at [[Bletchley Park]], was important to Allied victory.<ref name="kahnbook" />
  • PGP]] and OpenPGP compatible software for time-efficient encryption of messages
  • NSA headquarters in Fort Meade, Maryland
  • In this example the message is only signed and not encrypted.
1) Alice signs a message with her private key.
2) Bob can verify that Alice sent the message and that the message has not been modified.
  • Public-key cryptography, where different keys are used for encryption and decryption.
  • Reconstructed [[ancient Greek]] ''[[scytale]]'', an early cipher device
  • Symmetric-key cryptography, where a single key is used for encryption and decryption
PRACTICE AND STUDY OF SECURE COMMUNICATION TECHNIQUES
CryptologY; CryptographY; Cryptology; Cryptographer; Cryptographic; Codes and ciphers; Cyptography; Computer Cryptology; Cryptography Classification; Cryptography Notes; Cryptographic systems; Declarative Security System; Cryptographic Systems; Secret code; Code making; Polygraphia; Applied cryptography; Kriptografia; Mathematical cryptography; Cryptographically; Lightweight cipher
The study of cryptography and cryptanalysis. (1994-12-06)
Cryptographer         
  • French]] cipher machine, with arms of [[Henri II of France]]
  • [[Poznań]] monument (''center'') to Polish cryptanalysts whose breaking of Germany's Enigma machine ciphers, beginning in 1932, altered the course of World War II
  • First page of a book by [[Al-Kindi]] which discusses encryption of messages
  • 1=''k'' = 3}}. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • [[Whitfield Diffie]] and [[Martin Hellman]], authors of the first published paper on public-key cryptography.
  • Enciphered letter from [[Gabriel de Luetz d'Aramon]], [[French Ambassador to the Ottoman Empire]], after 1546, with partial decipherment
  • Cipher Bureau]], for 7 years before the war, and subsequent decryption at [[Bletchley Park]], was important to Allied victory.<ref name="kahnbook" />
  • PGP]] and OpenPGP compatible software for time-efficient encryption of messages
  • NSA headquarters in Fort Meade, Maryland
  • In this example the message is only signed and not encrypted.
1) Alice signs a message with her private key.
2) Bob can verify that Alice sent the message and that the message has not been modified.
  • Public-key cryptography, where different keys are used for encryption and decryption.
  • Reconstructed [[ancient Greek]] ''[[scytale]]'', an early cipher device
  • Symmetric-key cryptography, where a single key is used for encryption and decryption
PRACTICE AND STUDY OF SECURE COMMUNICATION TECHNIQUES
CryptologY; CryptographY; Cryptology; Cryptographer; Cryptographic; Codes and ciphers; Cyptography; Computer Cryptology; Cryptography Classification; Cryptography Notes; Cryptographic systems; Declarative Security System; Cryptographic Systems; Secret code; Code making; Polygraphia; Applied cryptography; Kriptografia; Mathematical cryptography; Cryptographically; Lightweight cipher
·noun One who writes in cipher, or secret characters.
Post-quantum cryptography         
CRYPTOGRAPHY THAT IS SECURE AGAINST QUANTUM COMPUTERS
PQCrypto; PQcrypto; Pqcrypto; Post-quantum; Post-Quantum; Post-Quantum Cryptography; Post quantum cryptography; Post Quantum Cryptography; Post quantum; Post Quantum; Quantum Safe Cryptography; Quantum Resistant Cryptography; Post-quantum encryption; Algorithms for post-quantum cryptography; Quantum resistant cryptography; Quantum-resistant cryptography; Quantum safe cryptography; Quantum-safe cryptography; Quantum proof cryptography; Quantum-proof cryptography; Draft:Delaram Kahrobaei
In cryptography, post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against a cryptanalytic attack by a quantum computer. The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem.
Public-key cryptography         
  • digitally signed]] with Alice's private key, but the message itself is not encrypted.
1) Alice signs a message with her private key.
2) Using Alice's public key, Bob can verify that Alice sent the message and that the message has not been modified.
  • In an asymmetric key encryption scheme, anyone can encrypt messages using a public key, but only the holder of the paired private key can decrypt such a message. The security of the system depends on the secrecy of the private key, which must not become known to any other.
  • symmetric cipher]] which will be, in essentially all cases, much faster.
CRYPTOSYSTEM THAT USES BOTH PUBLIC AND PRIVATE KEYS
Private key; Asymmetric key algorithm; Public key algorithm; Public key; Public key cryptography; Asymmetric key cryptography; Public key encyption; Public key crytography; Asymmetric key; Asymmetric key encryption algorithm; Public key encryption; Public-key encryption; Public-key; Asymmetric key encryption; Asymmetric cryptography; Non-secret encryption; Asymmetric key algorithms; Asymmetric encryption; Keypair cryptography; Public Key Cryptography; Private key encryption; Public-key cryptosystem; Public key cryptosystem; Assymetric key cryptography; PubKey; Asymmetric-key cryptography; Asynchronous encryption; Public/private key cryptography; Asymmetric-key algorithm; Key pair; Keypair; Key Pair; Asymmetric crypto; Public encryption key; Asymmetric cryptosystem; Asymmetric cypher; Asymmetric cipher; Asymmetric algorithm; Asymmetric Algorithms; Public Key Encryption; Private Key Encryption; Secret-key; Key pairs; Asymmetric-key cryptosystem; Public key pair; Public-key encrytption; Asymmetrical encryption; Private keys; Applications of public-key cryptography
Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys. Each pair consists of a public key (which may be known to others) and a private key (which may not be known by anyone except the owner).

Википедия

Cryptography
Cryptography, or cryptology (from |translit=kryptós}} "hidden, secret"; and graphein, "to write", or -logia, "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages.