翻訳と辞書 |
List of telecommunications encryption terms : ウィキペディア英語版 | List of telecommunications encryption terms
__NOTOC__ This is a list of telecommunications encryption terms. This list is derived in part from the ''Glossary of Telecommunication Terms'' published as Federal Standard 1037C. *A5/1a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard. *Bulk encryption *Cellular Message Encryption Algorithma block cipher which was used for securing mobile phones in the United States. *Cipher *Cipher system *Cipher text *Ciphony *Civision *Codress message
*COMSEC equipment
*Cryptanalysis *Cryptographic key *CRYPTO (International Cryptology Conference) *Crypto phone *Data Encryption Standard (DES) 〔Coppersmith, Don. (1994). (The data encryption standard (DES) and its strength against attacks ). ''IBM Journal of Research and Development'', 38(3), 243–250.〕 *Decipher *Decode *Decrypt *DECT Standard Cipher *Descrambler *Dncipher *Encode *Encoding law *Encrypt *End-to-end encryption
*group *IMSI-catcheran eavesdropping device used for interception of cellular phones and usually is undetectable for users of mobile phones. *Key distribution center (KDC) *Key management *Key stream *KSD-64 *Link encryption *MISTY1 *Multiplex link encryption *Net control station (NCS) *Null cipher *One-time pad *Over the Air Rekeying (OTAR) *Plaintext *PPPoX *Protected distribution system (PDS) *Protection interval (PI) *Pseudorandom number generator *Public-key cryptography *RED/BLACK concept *RED signal
*Remote rekeying *Security management *Spoofing *STU-IIIa family of secure telephones introduced in 1987 by the National Security Agency for use by the United States government, its contractors, and its allies. *Superencryption *Synchronous crypto-operation *Transmission security key (TSK) *Trunk encryption device (TED) *Type 1 encryption *Type 2 encryption *Type 3 encryption *Type 4 encryption *Unique key
*VoIP VPNcombines voice over IP and virtual private network technologies to offer a method for delivering secure voice. *ZRTPa cryptographic key-agreement protocol used in Voice over Internet Protocol (VoIP) phone telephony. ==See also==
*Communications security *CONDOR secure cell phone *Cryptography standards *Secure communication *Secure telephone * Telecommunication
抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「List of telecommunications encryption terms」の詳細全文を読む
スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース |
Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.
|
|