secret-key cryptographic system

  • 51Sécurité matérielle des cartes à puce — La sécurité matérielle des cartes à puce et des autres microcontrôleurs est l un des éléments clefs de la sécurité des informations sensibles qu ils manipulent. La littérature scientifique a produit un grand nombre de publications visant à… …

    Wikipédia en Français

  • 52Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… …

    Wikipedia

  • 53Information theory — Not to be confused with Information science. Information theory is a branch of applied mathematics and electrical engineering involving the quantification of information. Information theory was developed by Claude E. Shannon to find fundamental… …

    Wikipedia

  • 54STU-III — is a family of secure telephones introduced in 1987 by the NSA for use by the United States government, its contractors, and its allies. STU III desk units look much like typical office telephones, plug into a standard telephone wall jack and can …

    Wikipedia

  • 55Side-channel attack — In cryptography, a side channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms (compare cryptanalysis). For example, timing… …

    Wikipedia

  • 56Punchscan — infobox software caption = developer = Richard Carback, David Chaum, Jeremy Clark, Aleks Essex, and Stefan Popoveniuc. released = frequently updated = yes programming language = Java operating system = Cross platform language = English genre =… …

    Wikipedia

  • 57Blind signature — In cryptography, a blind signature, as introduced by David Chaum [David Chaum, Blind signatures for untraceable payments, Advances in Cryptology Crypto 82, Springer Verlag (1983), 199 203.] , is a form of digital signature in which the content of …

    Wikipedia

  • 58Chosen-ciphertext attack — A chosen ciphertext attack (CCA) is an attack model for cryptanalysis in which the cryptanalyst gathers information, at least in part, by choosing a ciphertext and obtaining its decryption under an unknown key. In the attack, an adversary has a… …

    Wikipedia

  • 59Internet security — is a branch of computer security[1] specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.[2] The Internet represents an insecure channel for exchanging information leading …

    Wikipedia

  • 60One-time password — A one time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. The most important shortcoming that is addressed by OTPs …

    Wikipedia