검색어: the cryptographic hash function sha 256 (영어 - 페르시아어)

영어

번역기

the cryptographic hash function sha 256

번역기

페르시아어

번역기
번역기

Lara로 텍스트, 문서 및 음성을 즉시 번역

지금 번역하기

인적 기여

전문 번역가, 번역 회사, 웹 페이지 및 자유롭게 사용할 수 있는 번역 저장소 등을 활용합니다.

번역 추가

영어

페르시아어

정보

영어

let be a hash function, and let be a fixed integer.

페르시아어

فرض کنیم یک تابع درهم‌سازی باشد، و یک عدد صحیح ثابت.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

영어

a common technique uses block ciphers and cryptographic hash functions.

페르시아어

یک تکنیک رایج که در رمزنگاری block ciphers و توابع hash استفاده می‌شود.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

영어

in other situations, the key is created using a passphrase and a "key generation algorithm", usually involving a cryptographic hash function such as sha-1.

페르시아어

در شرایط دیگر، کلید براساس یک کلمه‌عبور ایجاد می‌شود و یک الگوریتم تولید کلید معمولاً شامل تابعی درهم‌ساز رمزنگاری مانند sha-۱ می‌شود.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

경고: 보이지 않는 HTML 형식이 포함되어 있습니다

영어

for the attack to be useful, the attacker must be in control of the input to the hash function.

페르시아어

برای حمله موفق، مهاجم باید ورودی تابع هش را کنترل کند.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

영어

the nist hash function competition was largely induced by published collision attacks against two very commonly used hash functions, md5 and sha-1.

페르시아어

در nist رقابت تابع هش تا حد زیادی ناشی از حملات تصادم منتشر شده در برابر دو تابع هشی که معمولاً استفاده می‌شود md5و sha-1.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

영어

these attacks do not contradict the security proof of hmac, but provide insight into hmac based on existing cryptographic hash functions.

페르시아어

این حمله‌ها تناقضی برای اثبات امنیت hmac نیست بلکه بینشی از hmac را براساس توابع درهم ساز رمزنگاری موجود ارائه می‌دهد.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

영어

it further supports hash functions sha, md5, md4, and md2.

페르시아어

که این قابلت پشتیبانی از توابع درهم sha ,md5,md4,md2 را نیز دارا می‌باشد.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

영어

==security==the cryptographic strength of the hmac depends upon the size of the secret key that is used.

페르시아어

قدرت رمزنگاری hmac بستگی به اندازهٔ کلید رمز مورد استفاده دارد.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

영어

the sha hash functions have been used for the basis of the shacal block ciphers.

페르시아어

توابع درهم سازی sha بنیان و اساس shacal block ciphers هستند.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

영어

==properties==most cryptographic hash functions are designed to take a string of any length as input and produce a fixed-length hash value.

페르시아어

منظور از تصادم hash موقعیتی است که در آن دو مقدار ورودی مختلف به یک تابع درهم‌سازی خروجی یکسان تولید نمایند.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

영어

a real-world collision attack was published in december 2008 when a group of security researchers published a forged x.509 signing certificate that could be used to impersonate a certificate authority, taking advantage of a prefix collision attack against the md5 hash function.

페르시아어

حمله تصادم در دنیای واقعی در دسامبر ۲۰۰۸ منتشر شد ؛ زمانی که یک گروه از محققان امنیتی، گواهی جعلی x.509 که می‌تواند به جعل هویت یک مرجع گواهی، با استفاده از یک حمله پیشوند تصادم علیه تابع هش md5 مورد استفاده قرار گیرد را منتشر کردند.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

영어

==applications==the sha-2 hash function is implemented in some widely used security applications and protocols, including tls and ssl, pgp, ssh, s/mime, and ipsec.

페르시아어

از این الگوریتم در tls , ssl , pgp , ssh , توسعه چندمنظوره پست الکترونیک اینترنت/امن , بیت‌کوین و آی‌پی‌سک استفاده می‌شود.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

영어

just as block ciphers can be used to build hash functions, hash functions can be used to build block ciphers.

페르시아어

فقط رمزهای بلوک رابه عنوان توابع هش می توان مورد استفاده برای ساخت رمزهای بلوک مورد استفاده قرار داد.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

영어

this ability would allow a quantum computer to decrypt many of the cryptographic systems in use today, in the sense that there would be a polynomial time (in the number of digits of the integer) algorithm for solving the problem.

페르시아어

این قابلیت رایانه کوانتومی را قادر می‌سازد بسیاری از سیستمهای رمزنگاری امروزه را رمز گشایی کند، به این معنی که یک الگوریتم زمانی (در تعداد ارقام عدد صحیح) چند جمله‌ای برای حل مسئله وجود خواهد داشت.

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

영어

"* snefru – nist hash function competition* whirlpool – nessie selection hash function, scopus tecnologia s.a. (brazil) & k.u.leuven (belgium)==cryptanalysis==classical* frequency analysis –* contact analysis –* index of coincidence –* kasiski examination –modern*symmetric algorithms:* boomerang attack –:* brute force attack –:* davies' attack –:* differential –:* impossible differential –:* integral –:* linear –:* meet-in-the-middle attack –:* mod-n –:* related-key attack –:* slide attack –:* xsl attack –*hash functions::* birthday attack*attack models:*chosen-ciphertext –:*chosen-plaintext –:*ciphertext-only –:*known-plaintext –*side channel attacks:* power analysis –:* timing attack –*network attacks:* man-in-the-middle attack –:* replay attack –* external attacks:* black-bag –:* rubber-hose –==robustness properties==* provable security –* random oracle model –* ciphertext indistinguishability –* semantic security –* malleability –* forward secrecy –* forward anonymity –* freshness –== uncracked codes and ciphers ==* beale ciphers* chaocipher* d'agapeyeff* dorabella cipher* rongorongo* shugborough inscription* voynich manuscript==organizations and selection projects==standards* federal information processing standards publication program – run by nist to produce standards in many areas to guide operations of the us federal government; many fips publications are ongoing and related to cryptography* ansi – standardization process that produces many standards in many areas; some are cryptography related, ongoing)* iso – standardization process produces many standards in many areas; some are cryptography related, ongoing* ieee – standardization process produces many standards in many areas; some are cryptography related, ongoing* ietf – standardization process that produces many standards called rfcs) in many areas; some are cryptography related, ongoing)general cryptographic* nsa – internal evaluation/selections, charged with assisting nist in its cryptographic responsibilities* gchq – internal evaluation/selections, a division is charged with developing and recommending cryptographic standards for the uk government* dsd – australian sigint agency, part of echelon* communications security establishment (cse) – canadian intelligence agencyopen efforts* des – nbs selection process, ended 1976* ripe – division of the race project sponsored by the european union, ended mid-'80s* aes – a "break-off" competition sponsored by nist, ended in 2001* nessie project – an evaluation/selection program sponsored by the european union, ended in 2002* estream– program funded by ecrypt; motivated by the failure of all of the stream ciphers submitted to nessie, ended in 2008* cryptrec – evaluation/recommendation program sponsored by the japanese government; draft recommendations published 2003* internet engineering task force – technical body responsible for internet standards— the request for comment series is ongoing* cryptool – an e-learning freeware programme in english and german— exhaustive educational tool about cryptography and cryptanalysis== influential cryptographers ===== cryptography scholars ===== legal issues ==* free speech:* "bernstein v. united states" –:* "junger v. daley" –:* decss –:* phil zimmermann –* export of cryptography –* key escrow and clipper chip –* digital millennium copyright act –* digital rights management (drm) –* patents:* rsa – now public domain:* david chaum – and digital cash* cryptography and law enforcement:* wiretaps –:* espionage –* cryptography laws in different nations:* official secrets act – united kingdom, india, ireland, malaysia, and formerly new zealand:* regulation of investigatory powers act 2000 – united kingdom==academic and professional publications==: "further information: important publications in cryptography & books on cryptography"* journal of cryptology –* encyclopedia of cryptography and security –* cryptologia – quarterly journal focusing on historical aspects* communication theory of secrecy systems – cryptography from the viewpoint of information theory==allied sciences==* security engineering== see also ==* cypherpunk –* crypto-anarchism –* echelon –* zodiac killer –== references ==== external links ==

페르시아어

"* snefru –* whirlpool – nessie تابع هش انتخابیمقاله اصلی _تحلیل رمز* frequency analysis –* contact analysis –* index of coincidence –*الگوریتم های متقارن:* boomerang attack –:* davies' attack –:* differential –:* impossible differential –:* integral –:* linear –:* meet-in-the-middle attack –:* mod-n –:* related-key attack –:* حمله ایکس اس ال –:* حمله روز تولد* attack model:*chosen-ciphertext –:*ciphertext-only –*side channel attack:* power analysis –:* timing attack –:* حمله مرد میانی –* حملات خارجی:* black-bag –:* rubber-hose –* provable security –* random oracle model –* ciphertext indistinguishability –* malleability –مقاله اصلی : uncracked codes and ciphers* beale ciphers –* chaocipher –* d'agapeyeff –* dorabella cipher –* rongorongo –* shugborough inscription –استانداردهامقاله اصلی_cryptography standards* federal information processing standard* ansi –* iso –* نیروی ضربت مهندسی اینترنت –* آژانس امنیت ملی ایالات متحده آمریکا – ارزیابی / انتخاب داخلی ، بخش متصدی مسئولیت های رمزنگاری* gchq – ارزیابی / انتخاب داخلی ، بخش متصدی توسعه و معرفی استانداردهای رمزنگاری برای دولت بریتانیا* dsd – sigint سازمان اطلاعات استرالیا, قسمتی از echelon* communications security establishment (cse) – سازمان اطلاعات کاناداopen efforts* استاندارد رمزنگاری داده‌هاdes – nbs بلوک انتخابی اتمام در سال 1976* استاندارد رمزنگاری پیشرفته – به ضمانتnist, اتمام در سال 2001* nessie project – یک برنامه ارزیابی / انتخاب با حمایت اتحادیه اروپا, اتمام در سال 2002* estream– توسط ecrypt; stream cipher* cryptrec – برنامه ارزیابی / توصیه با حمایت مالی دولت ژاپن ، پیش نویس توصیه های منتشر شده 2003* نیروی ضربت مهندسی اینترنت – مسئول فنی برای استاندارد اینترنت request for comment مجموعه ای در حال انجام است* cryptool – یک نرم‌افزار آموزش الکترونیکی، ابزار آموزشی جامع به زبان های انگلیسی و آلمانی و در مورد رمزنگاری و دلیل حملات== legal issues ==:* "bernstein v. united states" –:* "junger v. daley" –:* decss –:* phil zimmermann –* export of cryptography –* key escrow and clipper chip –* digital millennium copyright act –* مدیریت حقوق دیجیتال (drm) –:* آراس‌ای – now public domain:* david chaum – and digital cash* cryptography and law enforcement:* جاسوسی –* cryptography laws in different nations:* official secrets act – بریتانیا, هند, جزیره ایرلند, مالزی, and formerly نیوزیلند:* regulation of investigatory powers act 2000 – بریتانیا: "اطلاعات بیشتر: important publications in cryptography & books on cryptography"* journal of cryptology –* encyclopedia of cryptography and security –* cryptologia – فصلنامه تمرکز بر جنبه های تاریخی* communication theory of secrecy systems – رمزنگاری از منظر تئوری اطلاعات* security engineeringمقاله اصلی:cryptography* cypherpunk –* crypto-anarchism –* echelon –* zodiac killer –== references ==

마지막 업데이트: 2016-03-03
사용 빈도: 1
품질:

경고: 보이지 않는 HTML 형식이 포함되어 있습니다

연관성이 낮은 일부 인적 번역은 숨겨져 있습니다.
연관성이 낮은 결과 표시.

인적 기여로
8,892,113,859 더 나은 번역을 얻을 수 있습니다

사용자가 도움을 필요로 합니다:



당사는 사용자 경험을 향상시키기 위해 쿠키를 사용합니다. 귀하께서 본 사이트를 계속 방문하시는 것은 당사의 쿠키 사용에 동의하시는 것으로 간주됩니다. 자세히 보기. 확인