Working Key Encryption Key

Working Key Encryption Key
Security: WKEK

Универсальный русско-английский словарь. . 2011.

Игры ⚽ Поможем написать курсовую

Смотреть что такое "Working Key Encryption Key" в других словарях:

  • Key server (cryptographic) — In computer security, a key server is a computer mdash; typically running special software mdash; which provides cryptographic keys to users or other programs. The users programs can be working on the same network as the key server or on another… …   Wikipedia

  • Related-key attack — In cryptography, a related key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the… …   Wikipedia

  • Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis …   Wikipedia

  • Disk encryption theory — Disk encryption is a special case of data at rest protection when the storage media is a sector addressable device (e.g., a hard disk). This article presents cryptographic aspects of the problem. For discussion of different software packages and… …   Wikipedia

  • Public key infrastructure — In cryptography, a public key infrastructure (PKI) is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through …   Wikipedia

  • Certificate-based encryption — is a system in which a certificate authority uses ID based cryptography to produce a certificate. This system gives the users both implicit and explicit certification, the certificate can be used as a conventional certificate (for signatures, etc …   Wikipedia

  • RSA Secret-Key Challenge — The RSA Secret Key Challenge was a series of cryptographic contests that were started by RSA Laboratories on January 28, 1997 with the intent of helping to demonstrate the relative security of different encryption algorithms. The RSA Secret Key… …   Wikipedia

  • Password-authenticated key agreement — In cryptography, a password authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party s knowledge of a password. Contents 1 Types 2 Brief history 3 See also …   Wikipedia

  • Simple Key-Management for Internet Protocol — or SKIP is a protocol developed by the IETF Security Working Group for the sharing of encryption keys.Skip is hybrid Key distribution protocol Simple Key Management for Internet Protocols (SKIP) is similar to SSL, except that it requires no prior …   Wikipedia

  • WKEK — Working Key Encryption Key (Computing » Security) …   Abbreviations dictionary

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»