Глоссарий





Новости переводов

19 апреля, 2024

Translations in furniture production

07 февраля, 2024

Ghostwriting vs. Copywriting

30 января, 2024

Preparing a scientific article for publication in an electronic (online) journal

20 декабря, 2023

Translation and editing of drawings in CAD systems

10 декабря, 2023

About automatic speech recognition

30 ноября, 2023

Translation services for tunneling shields and tunnel construction technologies

22 ноября, 2023

Proofreading of English text



Глоссарии и словари бюро переводов Фларус

Поиск в глоссариях:  

Cryptographic agility

Глоссарий ИТ-терминов
    The ability of software to support customer-preferred algorithms for encryption, hashing, entropy and digital signatures.




Agility, английский
  1. Резвость, ловкость. см. тж. agility trials

  2. Said of the ability of forces to react faster than their enemy can.


Agility dog см. agility trials, английский

Agility trials, английский
    Современный соревновательный спорт, в котором участвуют человек и собака и который с успехом использует и оттачивает физические и умственные способности как двуногих, так и четвероногих спортсменов, аджилити зародился в великобритании в 1977 году и начал


Agility, manoeuvrability, английский

Cryptographic, английский
  1. Криптографический

  2. Криптографический; шифровальный


Cryptographic algorithm, английский
    A mathematical function used for encryption and decryption. most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both.


Cryptographic assumption, английский

Cryptographic checkvalue, английский
    Криптографическое контрольное значение


Cryptographic device, английский

Cryptographic digest, английский
    The result of a one-way hash function that takes a variablelength input string and converts it to a fixed-length output string. this fixed-length output string is probabilistically unique for every different input string and thus can act as a fingerprint of a file. it can be used to determine whether a file was tampered with.


Cryptographic function, английский

Cryptographic hardware, английский
    Шифровальная аппаратура; шифровальное оборудование


Cryptographic hardware (device, facility), английский

Cryptographic hash function, английский
    Ithe cryptographic hash function is a mathematical algorithm that takes a particular input which can be any kind of digital data be it a password or jpeg file and produces a single fixed length output. some examples of different hash function algorithms are md5, md4 or sha256. the last one is used in the bitcoin protocol. main properties: (1) easy to compute hash value for any given message (2) infeasible to generate a message from its hash except by trying all possible input combinations(brute force attack) (3) infeasible to modify a message without changing the hash (4) infeasible to find two different messages with the same hash (5) deterministic so the same message always results in the same hash. cryptographic hash functions have many information security applications, notably in digital signatures, message authentication codes (macs), and other forms of authentication. they can also be used as ordinary hash functions, to index data in hash tables, for fingerprinting, to detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption


Cryptographic hash function with key, английский

Cryptographic information protection facility, английский

Cryptographic key, английский
    A piece of data that is required to initialize a cryptographic algorithm.


Cryptographic key disclosure, английский

Cryptographic operation, английский

Cryptographic primitive, английский

Algorithms, английский
    Complex mathematical formulae or rules used to solve complex problems in cctv they are used to achieve digital compression of a video picture.


Encryption, английский
  1. The process of transforming text into an unintelligible form called cipher.

  2. A method of encoding data for security.

  3. Защита сообщения от неправомочного прочтения, основанная на преобразовании его в шифрованный текст. расшифровать этот текст, т.е. восстановить исходное сообщение, можно только с помощью ключа, использовавшегося при его шифровании

  4. The rearrangement of the bit stream of a previously digitally encoded signal in a

  5. An encoder electronically alters a signal so that it can be clearly seen only by recipients who have a decoder to reverse encryption. selective addressability/scrambling designates receivers to descramble a signal. each decoder has a unique address.

  6. The rearrangement of the bit stream of a previously digitally encoded signal in a systematic fashion to make the information unrecognizable until restored on receipt of the necessary authorization key. this technique is used for securing information transmitted over a communication channel with the intent of excluding all other than authorized receivers from interpreting the message. can be used for voice, video and other communications signals.

  7. Encryption is a process by which a document (plaintext) is combined with a shorter string of data, called a key (eg. ), to produce an output (ciphertext) which can be "decrypted" back into the original plaintext by someone else who has the key, but which is incomprehensible and computationally infeasible to decrypt for anyone who does not have the key.

  8. Шифрование

  9. The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party.

  10. To use a code to render data unintelligible. an encryption key is data that when supplied to an encryption program and the original data to be encrypted yields the encrypted data. a decryption key when supplied with a decryption program and encrypted data the recovers the original data. many times these two keys are the same.

  11. Кодирование (в телефонии, банковской связи)


Signatures, английский
    Signatures. the very earliest prints were not signed at all, although by the later part of the fifteenth century many artists indicated their authorship of a print by incorporating a signature or monogram into the matrix design, what is called “signed in


In-place activation, английский
    The ability to activate or edit and embedded object from within an ole control.


Crypto agility, английский
    The ability of software to support customer-preferred algorithms for encryption, hashing, entropy and digital signatures.