Примеры использования Encryption algorithm на Английском языке и их переводы на Русский язык
{-}
-
Colloquial
-
Official
upload a file to create a checksum with the DES encryption algorithm.
discovered the vulnerabilities in its encryption algorithm that can be cracked to acquire the decryption key.
persistent encryption algorithm for zip archives, etc.
data files to be stored using an encryption algorithm such as Triple DES or CAST-128.
Encryption to Enhance Data Warehouse Security" by Michael Brightwell and">Harry Smith describes a way to use the DES encryption algorithm in a way that preserves the format of the plaintext.
This happens because the random seed value that is used to initialize the encryption algorithm and is included as part of the encrypted value is different for each encryption operation.
authentication data which is independent of the key generation technique, encryption algorithm and authentication mechanism.
If a potential hacker attempts to carry out the simplest cryptanalysis, as Microsoft claims, the following conclusions can be drawn from this encryption algorithm.
Then proceed to the actual secrets. Each secret now stores a key identifier, encryption algorithm identifier and the actual encrypted data.
The resulting 128 bits of data are then encrypted using the AES encryption algorithm and stored in the media.
describes a way to use the DES encryption algorithm in a manner that preserves the format of the data via modulo-n addition followed by an unbiasing operation.
AES running in this mode is the default encryption algorithm, with a default key size of 128 bits
At the same time Microsoft reminds, that between a source code and encryption algorithm there is a substantial difference: a source code is a program base of product, and an encryption algorithm is a method of information protection.
Use when creating a protected disk Crypto-resistant encryption algorithms GOST 28147-89, AES(256), BlowFish 448.
His encryption algorithms are beyond the beyond the beyond.
He highlighted the encryption algorithms and encryption methods supported by"BitLocker.
In addition, RC5 and RC6 encryption algorithms are commonly implemented in the released files.
NIST standardized the FF1 and FF3 Format-Preserving Encryption algorithms in its Special Publication 800-38G.
Restrictions on editing a Word document do not use encryption algorithms resistant to cracking.
The first implementation of DPAPI used in Windows 2000 had other Master Key encryption algorithms.