OnlineWoerterBuecher.de
Internes

Lexikon


cryptography


The practise and study of encryption and decryption - encoding data so that it can only be decoded by specific individuals. A system for encrypting and decrypting data is a cryptosystem. These usually involve an algorithm for combining the original data ("plaintext") with one or more "keys" - numbers or strings of characters known only to the sender and/or recipient. The resulting output is known as "ciphertext". The security of a cryptosystem usually depends on the secrecy of (some of) the keys rather than with the supposed secrecy of the algorithm. A strong cryptosystem has a large range of possible keys so that it is not possible to just try all possible keys (a "brute force" approach). A strong cryptosystem will produce ciphertext which appears random to all standard statistical tests. A strong cryptosystem will resist all known previous methods for breaking codes ("cryptanalysis"). See also cryptology, public-key encryption, RSA. Usenet newsgroups: news:sci.crypt, news:sci.crypt.research. FAQ {MIT (ftp://rtfm.mit.edu/pub/usenet/news.answers/cryptography-faq/)}. {Cryptography glossary (http://www.io.com/~ritter/GLOSSARY.HTM#BruteForceAttack)}. {RSA cryptography glossary (http://www.rsasecurity.com/rsalabs/faq/glossary.html)}. {Cryptography, PGP, and Your Privacy (http://draco.centerline.com:8080/~franl/crypto.html)}. (2000-01-16)

In addition suitable contents:
[ 2 ] [ 8080 ] [ = ] [ ai ] [ al ] [ algorithm ] [ am ] [ an ] [ app ] [ aq ] [ ar ] [ arc ] [ arg ] [ as ] [ at ] [ B ] [ b ] [ be ] [ bi ] [ br ] [ break ] [ bs ] [ by ] [ C ] [ ca ] [ ch ] [ char ] [ character ] [ ci ] [ ciphertext ] [ ck ] [ co ] [ code ] [ codes ] [ com ] [ cr ] [ crypt ] [ cryptanalysis ] [ cryptology ] [ cu ] [ cy ] [ data ] [ de ] [ dec ] [ decode ] [ decryption ] [ ding ] [ do ] [ draco ] [ du ] [ dual ] [ ec ] [ ed ] [ edu ] [ ee ] [ encryption ] [ er ] [ es ] [ et ] [ FAQ ] [ fi ] [ file ] [ fm ] [ fo ] [ for ] [ Force ] [ fr ] [ G ] [ ge ] [ gi ] [ GL ] [ gl ] [ GLOS ] [ GP ] [ gr ] [ graph ] [ group ] [ gs ] [ gy ] [ h ] [ hat ] [ hm ] [ hr ] [ HT ] [ ht ] [ id ] [ ie ] [ il ] [ in ] [ int ] [ io ] [ is ] [ IT ] [ it ] [ ke ] [ key ] [ ki ] [ kn ] [ la ] [ Lex ] [ li ] [ line ] [ LO ] [ loss ] [ ls ] [ lt ] [ lv ] [ ly ] [ M ] [ method ] [ MIT ] [ ml ] [ mo ] [ mod ] [ module ] [ na ] [ nc ] [ ne ] [ net ] [ news ] [ newsgroup ] [ ng ] [ ni ] [ nl ] [ no ] [ ns ] [ nu ] [ numbers ] [ O ] [ om ] [ OS ] [ output ] [ pe ] [ PGP ] [ ph ] [ pl ] [ plaintext ] [ pr ] [ pt ] [ public-key encryption ] [ Q ] [ query ] [ random ] [ range ] [ rc ] [ re ] [ recipient ] [ rl ] [ ro ] [ roach ] [ RS ] [ RSA ] [ ru ] [ S ] [ SA ] [ sa ] [ SAR ] [ sc ] [ se ] [ sg ] [ si ] [ so ] [ spec ] [ SSA ] [ st ] [ standard ] [ string ] [ su ] [ sy ] [ system ] [ T ] [ test ] [ text ] [ tf ] [ th ] [ TM ] [ tm ] [ to ] [ tp ] [ tr ] [ tron ] [ tt ] [ ua ] [ um ] [ up ] [ us ] [ Usenet ] [ va ] [ ve ] [ vi ] [ ws ] [ Y ] [ ~ ] [ brute force ]






Go Back ]

Free On-line Dictionary of Computing

Copyright © by OnlineWoerterBuecher.de - (9959 Reads)

All logos and trademarks in this site are property of their respective owner.

Page Generation in 0.1031 Seconds, with 17 Database-Queries
Zurück zur Startseite