authenticated encryption

autentiv krüpteerimine

olemus
ISO/IEC 19772:
andmete (pööratav) teisendus krüptoalgoritmiga sellise krüptogrammi loomiseks, mida ei saa volitamatu olem avastamatult muuta, st on tagatud andmete konfidentsiaalsus, terviklus ja allika autentsus
= (reversible) transformation of data by a cryptographic algorithm to produce ciphertext that cannot be altered by an unauthorized entity without detection, i.e. it provides data confidentiality, data integrity, and data origin authentication

ülevaateid
https://en.wikipedia.org/wiki/Authenticated_encryption
https://blog.cryptographyengineering.com/2012/05/19/how-to-choose-authenticated-encryption/
https://crypto.stanford.edu/RealWorldCrypto/slides/phil.pdf

standardid
https://tools.ietf.org/html/rfc5116
https://www.iso.org/obp/ui/#iso:std:iso-iec:19772:ed-1:v1:en

Toimub laadimine

authenticated encryption

autentiv krüpteerimine

olemus
ISO/IEC 19772:
andmete (pööratav) teisendus krüptoalgoritmiga sellise krüptogrammi loomiseks, mida ei saa volitamatu olem avastamatult muuta, st on tagatud andmete konfidentsiaalsus, terviklus ja allika autentsus
= (reversible) transformation of data by a cryptographic algorithm to produce ciphertext that cannot be altered by an unauthorized entity without detection, i.e. it provides data confidentiality, data integrity, and data origin authentication

ülevaateid
https://en.wikipedia.org/wiki/Authenticated_encryption
https://blog.cryptographyengineering.com/2012/05/19/how-to-choose-authenticated-encryption/
https://crypto.stanford.edu/RealWorldCrypto/slides/phil.pdf

standardid
https://tools.ietf.org/html/rfc5116
https://www.iso.org/obp/ui/#iso:std:iso-iec:19772:ed-1:v1:en

Palun oodake...

Tõrge

authenticated encryption

autentiv krüpteerimine

olemus
ISO/IEC 19772:
andmete (pööratav) teisendus krüptoalgoritmiga sellise krüptogrammi loomiseks, mida ei saa volitamatu olem avastamatult muuta, st on tagatud andmete konfidentsiaalsus, terviklus ja allika autentsus
= (reversible) transformation of data by a cryptographic algorithm to produce ciphertext that cannot be altered by an unauthorized entity without detection, i.e. it provides data confidentiality, data integrity, and data origin authentication

ülevaateid
https://en.wikipedia.org/wiki/Authenticated_encryption
https://blog.cryptographyengineering.com/2012/05/19/how-to-choose-authenticated-encryption/
https://crypto.stanford.edu/RealWorldCrypto/slides/phil.pdf

standardid
https://tools.ietf.org/html/rfc5116
https://www.iso.org/obp/ui/#iso:std:iso-iec:19772:ed-1:v1:en

Andmete allalaadimisel või töötlemisel esines tehniline tõrge.
Vabandame!