written language texts. dissolving the utility of a linguistic approac перевод - written language texts. dissolving the utility of a linguistic approac английский как сказать

written language texts. dissolving

written language texts. dissolving the utility of a linguistic approach lo cryptanalysis in many cases. Many computer ciphers can be characterized by their operation on binary' bit sequences i
0/5000
Источник: -
Цель: -
Результаты (английский) 1: [копия]
Скопировано!
written language texts. dissolving the utility of a linguistic approach lo cryptanalysis in many cases. Many computer ciphers can be characterized by their operation on binary ' bit sequences (i) (I) Extensive open academic research into cryptography is relatively recent-it began only in the mid-1970s wuh the public specification of DES (the Data Encryption Standard) by the NBS, the Diffic-lldlman paper, and the public release of the RSA algorithm. Since then, cryptography has become a widely used tool in communications, computer networks, and computer security generally, llie present security level of many modem cryptographic techniques is based on the difficulty of certain computational problems, such as the integer factorisation problem or the discrete logarithm problem. In many cases, there are proofs that cryptographic techniques (arc/' a certain computational problem cannot be is solved efficiently. With one notable exception — the one-time pad — these proofs are contingent, and thus not definitive, but the arc is currently the best available for cryptographic algorithms and roioccl As well as being aware of cryptographic history-' cry ptographic algorithm and system designers must also sensibly consider probable future developments in their designs. For instance, the date continued in computer processing power have increased the scope of brute-force attacks when specifying key lengths. The potential effects of quantum computing are already being considered by some cryptographic system designers; the announced imminence of small implementations of these machines is making the need for this preemptive caution fully explicit. Essentially, prior to the early 20th century, cryptography was chiefly ' concerned with linguistic patterns. Since then the emphasis has shifted, and cryptography now makes extensive use of mathematics, including aspects of information theory, computational complexity, statistics, combinatorics, abstract algebra, and number theory. Cryptography is also a branch of engineering, but an unusual one as it deals with active, intelligent, and malevolent opposition (sec cryptographic engineering and security engineering); most other kinds of engineering need deal only with neuLral natural forces. There is also active research torture cross-examining the relationship between cryptographic problems and quantum physics (see quantum cryptography and quantum computing).
переводится, пожалуйста, подождите..
Результаты (английский) 3:[копия]
Скопировано!
written language texts. dissolving the utility of a linguistic approach to cryptanalysis in many cases. the computer ciphers can be characterized by their operation on binary 'bit sequences (i < emetines in groups or blocks), unlike classical and mechanical schemes, which generally manipulate traditional characters (i.e., letters and digits) directly. however, computers have also assisted cryptanalysis, which has compensated to some extent for increased cipher complexity. Nonetheless, very modern ciphers have stayed ahead of italy ptanalysis; it is usually the case that use of a quality cipher is very efficient (i.e., fast and requiring few resources), while breaking it requires an effort many orders of magnitude larger, making cryptanalysis so inefficient and impractical as to be effectively impossible.iin open academic research into cryptography is relatively recent, it was only in the mid wuh condition the public specification of des (the data encryption standard) by the nbs, the Diffic - lldlman paper, and the public release of the rsa algorithm. since then, cryptography has become a widely used tool in communications, computer networks, and computer security generally, llie present security level of the modem cryptographictechniques is based on the price of certain computational problems, such as the integer factorisation problem or the discrete logarithm problem. in many cases, there are proofs that cryptographic techniques arc area (of a certain computational problem cannot be solved efficiently. with one exception - with the one time pad, these proofs are contingent, and thus not definitive, but is currently the best available for cryptographic algorithms androiocclas well as being aware of cryptographic history ', cry ptographic algorithm and system designers must also sensibly consider probable future developments in their bedrooms. for instance, the continued improvements in computer processing power have increased the scope of succession of attacks when specifying key lengths. the potential effects of quantum computing are already being considered by some cryptographic system designers; the announced imminence small implementation of these machines is making the need for this preemptive caution fully explicit.Essentially, prior to the early 20th century ', cryptography was chiefly concerned with linguistic patterns. since then the emphasis has shifted, and cryptography now makes extensive use of mathematics, including aspects of information theory, computational complexity, statistics, combinatorics, abstract algebra, and number theory. Cryptography is also a branch of engineering, but an unusual one as it deals with active, intelligent, and malevolent opposition (sec cryptographic engineering and security engineering); most other kinds of engineering need deal only with neuLral natural forces. this is the most active research examining the relationship between cryptographic problems and quantum physics (see quantum cryptography and quantum computing).
переводится, пожалуйста, подождите..
 
Другие языки
Поддержка инструмент перевода: Клингонский (pIqaD), Определить язык, азербайджанский, албанский, амхарский, английский, арабский, армянский, африкаанс, баскский, белорусский, бенгальский, бирманский, болгарский, боснийский, валлийский, венгерский, вьетнамский, гавайский, галисийский, греческий, грузинский, гуджарати, датский, зулу, иврит, игбо, идиш, индонезийский, ирландский, исландский, испанский, итальянский, йоруба, казахский, каннада, каталанский, киргизский, китайский, китайский традиционный, корейский, корсиканский, креольский (Гаити), курманджи, кхмерский, кхоса, лаосский, латинский, латышский, литовский, люксембургский, македонский, малагасийский, малайский, малаялам, мальтийский, маори, маратхи, монгольский, немецкий, непальский, нидерландский, норвежский, ория, панджаби, персидский, польский, португальский, пушту, руанда, румынский, русский, самоанский, себуанский, сербский, сесото, сингальский, синдхи, словацкий, словенский, сомалийский, суахили, суданский, таджикский, тайский, тамильский, татарский, телугу, турецкий, туркменский, узбекский, уйгурский, украинский, урду, филиппинский, финский, французский, фризский, хауса, хинди, хмонг, хорватский, чева, чешский, шведский, шона, шотландский (гэльский), эсперанто, эстонский, яванский, японский, Язык перевода.

Copyright ©2024 I Love Translation. All reserved.

E-mail: