slovo | definícia |
cryptograph (encz) | cryptograph, n: |
Cryptograph (gcide) | Cryptograph \Cryp"to*graph\ (-gr?f), n. [Gr. krypto`s hidden +
-graph: cf. F. cryptographe.]
Cipher; something written in cipher. "Decipherers of
cryptograph." --J. Earle.
[1913 Webster] |
cryptograph (wn) | cryptograph
n 1: a secret method of writing [syn: cipher, cypher,
cryptograph, secret code]
2: a piece of writing in code or cipher [syn: cryptogram,
cryptograph, secret writing]
3: a device for deciphering codes and ciphers |
| podobné slovo | definícia |
cryptography (mass) | cryptography
- kryptografia, šifrovanie |
cryptograph (encz) | cryptograph, n: |
cryptographer (encz) | cryptographer,kódovač n: Zdeněk Brožcryptographer,kryptograf Zdeněk Brož |
cryptographic (encz) | cryptographic,kryptografický adj: Zdeněk Brož |
cryptographical (encz) | cryptographical, adj: |
cryptographically (encz) | cryptographically,kryptograficky adv: Zdeněk Brož |
cryptography (encz) | cryptography,kryptografie jkcryptography,šifrování n: Zdeněk Brož |
Cryptographal (gcide) | Cryptographal \Cryp*tog"ra*phal\ (kr?p-t?g"r?-fal), a.
Pertaining to cryptography; cryptographical. --Boyle.
[1913 Webster] |
cryptographer (gcide) | cryptographer \cryp*tog"ra*pher\ (kr?p-t?g"r?-f?r), n.
1. One who writes in cipher, or secret characters.
[1913 Webster]
2. one who studies methods for encoding and decoding
messages; one who studies cryptography.
[PJC] Cryptographic |
Cryptographic (gcide) | Cryptographic \Cryp`to*graph"ic\ (kr?p`t?-gr?f"?k),
Cryptographical \Cryp`to*graph"ic*al\ (kr?p`t?-gr?f"?-kal), a.
Relating to cryptography; written in secret characters or in
cipher, or with sympathetic ink.
[1913 Webster] |
Cryptographical (gcide) | Cryptographic \Cryp`to*graph"ic\ (kr?p`t?-gr?f"?k),
Cryptographical \Cryp`to*graph"ic*al\ (kr?p`t?-gr?f"?-kal), a.
Relating to cryptography; written in secret characters or in
cipher, or with sympathetic ink.
[1913 Webster] |
Cryptographist (gcide) | Cryptographist \Cryp*tog"ra*phist\ (kr?p-t?g"r?-f?st), n.
Same as Cryptographer.
[1913 Webster] |
Cryptography (gcide) | Cryptography \Cryp*tog"ra*phy\ (-f?), n. [Cf. F. cryptographie.]
1. The act or art of writing in code or secret characters;
also, secret characters, codes or ciphers, or messages
written in a secret code.
[1913 Webster +PJC]
2. The science which studies methods for encoding messages so
that they can be read only by a person who knows the
secret information required for decoding, called the key;
it includes cryptanalysis, the science of decoding
encrypted messages without possessing the proper key, and
has several other branches; see for example
steganography.
[PJC] |
cryptograph (wn) | cryptograph
n 1: a secret method of writing [syn: cipher, cypher,
cryptograph, secret code]
2: a piece of writing in code or cipher [syn: cryptogram,
cryptograph, secret writing]
3: a device for deciphering codes and ciphers |
cryptographer (wn) | cryptographer
n 1: decoder skilled in the analysis of codes and cryptograms
[syn: cryptanalyst, cryptographer, cryptologist] |
cryptographic (wn) | cryptographic
adj 1: of or relating to cryptanalysis [syn: cryptanalytic,
cryptographic, cryptographical, cryptologic,
cryptological] |
cryptographical (wn) | cryptographical
adj 1: of or relating to cryptanalysis [syn: cryptanalytic,
cryptographic, cryptographical, cryptologic,
cryptological] |
cryptographically (wn) | cryptographically
adv 1: in a cryptographic manner |
cryptography (wn) | cryptography
n 1: the science of analyzing and deciphering codes and ciphers
and cryptograms [syn: cryptanalysis, cryptanalytics,
cryptography, cryptology]
2: act of writing in code or cipher [syn: cryptography,
coding, secret writing, steganography] |
cryptography (foldoc) | cryptography
The practise and study of encryption and
decryption - encoding data so that it can only be decoded by
specific individuals. A system for encrypting and decrypting
data is a cryptosystem. These usually involve an algorithm
for combining the original data ("plaintext") with one or
more "keys" - numbers or strings of characters known only to
the sender and/or recipient. The resulting output is known as
"ciphertext".
The security of a cryptosystem usually depends on the secrecy
of (some of) the keys rather than with the supposed secrecy of
the algorithm. A strong cryptosystem has a large range of
possible keys so that it is not possible to just try all
possible keys (a "brute force" approach). A strong
cryptosystem will produce ciphertext which appears random to
all standard statistical tests. A strong cryptosystem will
resist all known previous methods for breaking codes
("cryptanalysis").
See also cryptology, public-key encryption, RSA.
Usenet newsgroups: news:sci.crypt,
news:sci.crypt.research.
FAQ {MIT
(ftp://rtfm.mit.edu/pub/usenet/news.answers/cryptography-faq/)}.
{Cryptography glossary
(http://io.com/~ritter/GLOSSARY.HTM#BruteForceAttack)}.
{RSA cryptography glossary
(http://rsasecurity.com/rsalabs/faq/glossary.html)}.
{Cryptography, PGP, and Your Privacy
(http://draco.centerline.com:8080/~franl/crypto.html)}.
(2000-01-16)
|
private-key cryptography (foldoc) | private-key cryptography
As opposed to public-key cryptography, a
cryptographic method in which the same key is used to encrypt
and decrypt the message. Private-key algorithms include the
obsolescent Data Encryption Standard (DES), triple-DES
(3DES), the Advanced Encryption Standard (AES), also known
as Rijndael, Blowfish, Twofish RC2, RC4, RC5 and RC6.
A problem with private-key cryptography is that the sender and
the recipient of the message must agree on a common key via
some alternative secure channel.
Public-key cryptography gives an answer to this problem.
(2008-02-07)
|
public-key cryptography (foldoc) | public-key encryption
PKE
public-key cryptography
(PKE, Or "public-key cryptography") An
encryption scheme, introduced by Diffie and Hellman in 1976,
where each person gets a pair of keys, called the public key
and the private key. Each person's public key is published
while the private key is kept secret. Messages are encrypted
using the intended recipient's public key and can only be
decrypted using his private key. This is often used in
conjunction with a digital signature.
The need for sender and receiver to share secret information
(keys) via some secure channel is eliminated: all
communications involve only public keys, and no private key is
ever transmitted or shared.
Public-key encryption can be used for authentication,
confidentiality, integrity and non-repudiation.
RSA encryption is an example of a public-key cryptosystem.
{alt.security FAQ
(http://cis.ohio-state.edu/hypertext/faq/bngusenet/alt/security/top.html)}.
See also knapsack problem.
(1995-03-27)
|
public-key cryptography standards (foldoc) | Public-Key Cryptography Standards
(PKCS) A set of standards for
public-key cryptography, developed by {RSA Data Security,
Inc.} in cooperation with an informal consortium, originally
including Apple, Microsoft, DEC, Lotus, Sun and
MIT. The PKCS have been cited by the {OSI Implementers'
Workshop} (OIW) as a method for implementation of OSI
standards.
PKCS includes both algorithm-specific and
algorithm-independent implementation standards. Many
algorithms are supported, including RSA and Diffie-Hellman
key exchange, however, only the latter two are specifically
detailed. PKCS also defines an algorithm-independent syntax
for digital signatures, digital envelopes, and extended
digital certificates; this enables someone implementing any
cryptographic algorithm whatsoever to conform to a standard
syntax, and thus achieve interoperability.
E-mail: pkcs@rsa.com.
(1999-02-16)
|
symmetric key cryptography (foldoc) | symmetric key cryptography
A cryptography system in which both parties
have the same encryption key, as in {secret key
cryptography}.
Opposite: public-key cryptography.
(1998-06-09)
|
|