- secret-key cryptography
- криптография с индивидуальным ключом
Большой англо-русский и русско-английский словарь. 2001.
Большой англо-русский и русско-английский словарь. 2001.
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
public-key cryptography — noun A form of cryptography which allows users to communicate securely without previously agreeing on a shared secret key (abbreviation PKC) Syn: asymmetric cryptography, public key encryption … Wiktionary
private key cryptography — UK US noun [uncountable] business, computing a way of keeping Internet messages secret in which a single key (=letter or number) changes the message into code and back again Thesaurus: codes and codificationhyponym communicating by email or text… … Useful english dictionary
private key cryptography — UK / US noun [uncountable] business, computing a way of keeping Internet messages secret in which a single key (= letter or number) changes the message into code and back again … English dictionary
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Key generation — is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Modern cryptographic systems include symmetric key algorithms (such as DES and AES) and public key algorithms… … Wikipedia
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Key distribution — In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it involved face to face meeting, use of a… … Wikipedia