key splitting

key splitting
деление ключа на части (ключ делится на составные части, которые распределяются между несколькими лицами так, что ключ может быть восстановлен в полном объеме только в том случае, если каждый из них предоставит для этого свою часть ключа)

English-Russian cryptological dictionary . 2014.

Игры ⚽ Поможем написать курсовую

Смотреть что такое "key splitting" в других словарях:

  • Key distribution — In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it involved face to face meeting, use of a… …   Wikipedia

  • Splitting maul — Woodsplitting maul Other names Wood maul Wood mall Block Buster (Typically used throughout Australia and New Zealand) Classification Hand tool Related Sledge hammer …   Wikipedia

  • key — key1 /kee/, n., pl. keys, adj., v., keyed, keying. n. 1. a small metal instrument specially cut to fit into a lock and move its bolt. 2. any of various devices resembling or functioning as a key: the key of a clock. 3. See key card. 4. something… …   Universalium

  • key — I [[t]ki[/t]] n. pl. keys, adj. v. 1) bui a small metal instrument specially cut to fit into a lock and move its bolt 2) any of various devices functioning as a key: the key of a clock[/ex] 3) something that affords a means to achive, master, or… …   From formal English to slang

  • Fee splitting — is the practice of sharing fees with professional colleagues, such as physicians or lawyers, in return for being sent referrals [http://www.answers.com/topic/fee splitting] . Fee splitting in medician and healthcareThis is essentially the payment …   Wikipedia

  • Single-access key — A key in Biology is a modeling method used for categorizing species using logical choices. A single access key (Dichotomous key also called sequential key , analytical key [1], or pathway key ) is a key where the sequence and structure of… …   Wikipedia

  • HTTP response splitting — is a form of web application vulnerability, resulting from the failure of the application or its environment to properly sanitize input values. It can be used to perform cross site scripting attacks, cross user defacement, Web cache poisoning,… …   Wikipedia

  • List of algorithms — The following is a list of the algorithms described in Wikipedia. See also the list of data structures, list of algorithm general topics and list of terms relating to algorithms and data structures.If you intend to describe a new algorithm,… …   Wikipedia

  • Madan Senki Ryukendo — Infobox Television show name = Madan Senki Ryukendo gentr = Superhero tokusatsu runtime = 24 25 minutes (per episode) country = Japan network = TV Aichi caption = 魔弾戦記リュウケンドー num episodes = 52 + 2 specials list episodes = List of Ryukendo… …   Wikipedia

  • KSD-64 — Crypto ignition keys on display at the National Cryptologic Museum in 2005 The KSD 64[A] Crypto Ignition Key (CIK) is an NSA developed EEPROM chip packed in a plastic case that looks like a toy key. The model number is due to its storage capacity …   Wikipedia

  • разделение ключей — Секретный ключ делится на части, которые распределяются нескольким ответственным лицам, которые при необходимости могут восстановить ключ по всем или нескольким его компонентам. То же что secret sharing [Криптографический словарь Карэна… …   Справочник технического переводчика


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»