without examplesFound in 4 dictionaries
The Universal Dictionary- It is intended for a full-text search and it significantly expands the possibilities of working with lexical items from the Russian glossary of LingvoUniversal. Contains usage examples, synonyms, and antonyms.
- It is intended for a full-text search and it significantly expands the possibilities of working with lexical items from the Russian glossary of LingvoUniversal. Contains usage examples, synonyms, and antonyms.
cipher
сущ.
код, шифр, тайнопись
арабская цифра
нуль, фикция; ничтожество, пустое место (о человеке)
монограмма; магическое сочетание символов, вензель
гл.
подсчитывать, высчитывать, вычислять
зашифровывать, писать шифром сообщение; обозначать условным знаком
LingvoComputer (En-Ru)
cipher
код; шифр||кодировать; шифровать
нуль (число)
символ; цифра
Unlock all free
thematic dictionaries
Examples from texts
Longer keys are better than shorter ones, and the Microsoft Crypto Provider takes advantage of the loosening of export restrictions in 2000 to use a 128-bit random number as a cipher key.Чем длиннее ключ, тем лучше. В результате ослабления экспортных ограничений в 2000 году в поставщике шифрования Microsoft в качестве ключа шифрования используется 128-разрядное случайное число.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
Using this key and the IDEA cipher, find the output of round 1.Используя этот ключ и шифр IDEA, найдите выход цикла 1.Sklar, Bernard / Digital Communications: Fundamentals and ApplicationsСкляр, Бернард / Цифровая связь. Теоретические основы и практическое применениеЦифровая связь. Теоретические основы и практическое применениеСкляр, Бернард© Издательский дом "Вильямc", 2003© Prentice Hall PTR, 2001Digital Communications: Fundamentals and ApplicationsSklar, Bernard
To avoid the ECB mode of encryption, WEP uses a 24-bit IV, which is concatenated to the key before being processed by the RC4 cipher.Чтобы избежать шифрования в режиме ЕСВ, WEP использует 24-разрядный вектор инициализации, который добавляется к ключу перед выполнением обработки по алгоритму RC4.Roshan, Pejman,Leary, Jonathan / 802.11 Wireless LAN FundamentalsРошан, Педжман,Лиэри, Джонатан / Основы построения беспроводных локальных сетей стандарта 802.11Основы построения беспроводных локальных сетей стандарта 802.11Рошан, Педжман,Лиэри, Джонатан© Cisco Press, 2004© Издательский дом "Вильямc", 2004802.11 Wireless LAN FundamentalsRoshan, Pejman,Leary, Jonathan© 2004 Cisco Systems, Inc.
To use the blowfish cipher, type -c blowfish.Для использования этого шифра введите -с blowfish.Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.Антихакинг в сети. Трюки.Локхарт, Эндрю© 2004 O'Reilly Media, Inc.© Издание на русском языке ЗАО Издательский дом «Питер», 2005© Перевод на русский язык ЗАО Издательский дом «Питер», 2005Network Security HacksLockhart, Andrew© 2004 O'Reilly Media, Inc.
Afterwards he had, to fulfil the prearranged cipher, to fill in any two words in each space.После того как он расположил шифр, ему нужно было заполнить пустые места любыми двумя словами.Conan Doyle, Arthur / The “Gloria Scott”Конан Дойль, Артур / «Глория Скотт»«Глория Скотт»Конан Дойль, Артур© Издательство "Правда", 1966The “Gloria Scott”Conan Doyle, Arthur© 1975 by Clarkson N. Potter, Inc.
In broad terms, DESX is a block cipher that uses a three-step process to encrypt a file:Если коротко, то DESX является блочным шифратором, использующим три этапа шифрования файла.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
I guess you'll report what you hear and see to the cipher at the Grange; and this thing won't be settled while you linger about it.'Я понимаю, ты собираешься дать на Мызе полный отчет обо всем, что ты слышала и видела у нас. Но пока ты тут мешкаешь, дело улажено не будет.Bronte, Emily / Wuthering HeightsБронт Эмили / Грозовой перевалГрозовой перевалБронт Эмили© Издательство "Правда", 1988Wuthering HeightsBronte, Emily©2009 by Pearson Education, Inc.
As a result, block cipher operation decreases the effective throughput of a device.В результате производительность устройств, применяющих блочное шифрование, снижается.Roshan, Pejman,Leary, Jonathan / 802.11 Wireless LAN FundamentalsРошан, Педжман,Лиэри, Джонатан / Основы построения беспроводных локальных сетей стандарта 802.11Основы построения беспроводных локальных сетей стандарта 802.11Рошан, Педжман,Лиэри, Джонатан© Cisco Press, 2004© Издательский дом "Вильямc", 2004802.11 Wireless LAN FundamentalsRoshan, Pejman,Leary, Jonathan© 2004 Cisco Systems, Inc.
'I have done nothing, of course,' he'll tell you. 'I'm a cipher, because I've had no training, but I've incomparably more melody and more ideas in me than in Meyerbeer.'"Я, говорит, конечно, ничего, я нуль, потому что я не учился, но у меня не в пример больше мелодий и больше идей, чем у Мейербера".Тургенев, И.С. / ДымTurgenev, I.S. / SmokeSmokeTurgenev, I.S.© 1919, by BONI & LIVERIGHT, Inc.ДымТургенев, И.С.© Издательство "Правда", 1979
The cipher stream classes transparently handle the calls to update and doFinal, which is clearly a convenience.Из классов шифрованных потоков автоматически вызываются методы update и doFinal, так что программисту не придется выполнять связанную с ними работу.Horstmann, Cay S.,Cornell, Gary / Core Java™ 2. Volume II - Advanced FeaturesХорстманн, Кей С.,Корнелл, Гари / Java 2. Том II. Тонкости программированияJava 2. Том II. Тонкости программированияХорстманн, Кей С.,Корнелл, Гари© Издательский дом "Вильямc", 2002© Prentice Hall, Inc., 2002Core Java™ 2. Volume II - Advanced FeaturesHorstmann, Cay S.,Cornell, Gary© 2002 Sun Microsystems, Inc.
Then, it uses a separate 56-bit cipher to encrypt the encrypted block again using standard DES encryption.После этого отдельный 56-разрядный шифратор используется для шифрования зашифрованных блоков с помощью стандартного шифрования DES.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
One method of using such an alphabet is to select the first cipher character from the shift 1 row, the second cipher character from the shift 2 row, and so on.Один из методов использования такого алфавита заключается в выборе первого символа шифрованного сообщения из строки, полученной при сдвиге на 1 символ, второго символа — из строки, полученной при сдвиге на 2 символа, и т.д.Sklar, Bernard / Digital Communications: Fundamentals and ApplicationsСкляр, Бернард / Цифровая связь. Теоретические основы и практическое применениеЦифровая связь. Теоретические основы и практическое применениеСкляр, Бернард© Издательский дом "Вильямc", 2003© Prentice Hall PTR, 2001Digital Communications: Fundamentals and ApplicationsSklar, Bernard
For example, cipher /w:\e:\would wipe all unallocated clusters on the E: drive of a machine.Например, команда cipher /w: \е\ позволяет очистить все свободные кластеры на диске Е.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
The duke says:"Leave me alone to cipher out a way so we can run in the daytime if we want to.Герцог сказал: — Предоставьте это мне — я найду какой-нибудь способ, чтобы нам плыть днем, если понадобится.Twain, Mark / Huckleberry FinnТвен, Марк / Приключения Гекльберри ФиннаПриключения Гекльберри ФиннаТвен, Марк© «Государственное издательство художественной литературы», 1960Huckleberry FinnTwain, Mark© 2004 BookSurge LLC
A block cipher, in contrast, generates a single encryption key stream of a fixed size.Блочный шифр, наоборот, генерирует единственный ключевой поток шифрования фиксированного размера.Roshan, Pejman,Leary, Jonathan / 802.11 Wireless LAN FundamentalsРошан, Педжман,Лиэри, Джонатан / Основы построения беспроводных локальных сетей стандарта 802.11Основы построения беспроводных локальных сетей стандарта 802.11Рошан, Педжман,Лиэри, Джонатан© Cisco Press, 2004© Издательский дом "Вильямc", 2004802.11 Wireless LAN FundamentalsRoshan, Pejman,Leary, Jonathan© 2004 Cisco Systems, Inc.
User translations
No translations for this text yet.
Be the first to translate it!
Collocations
cipher code
шифровальный код
cipher feedback
шифрованная обратная связь
cipher key
ключ к шифру
cipher machine
криптографическая машина
cipher machine
шифровальный аппарат
cipher officer
шифровальщик
in cipher
зашифрованный
one-time cipher
разовый шифр
product cipher
продукционный шифр
stream cipher
групповой шифр
substitution cipher
подстановочный шифр
substitutional cipher
подстановочный шифр
transposition cipher
перестановочный шифр
to cipher
шифровать
chief cipher officer
начальник шифровальной службы
Word forms
cipher
noun
Singular | Plural | |
Common case | cipher | ciphers |
Possessive case | cipher's | ciphers' |
cipher
verb
Basic forms | |
---|---|
Past | ciphered |
Imperative | cipher |
Present Participle (Participle I) | ciphering |
Past Participle (Participle II) | ciphered |
Present Indefinite, Active Voice | |
---|---|
I cipher | we cipher |
you cipher | you cipher |
he/she/it ciphers | they cipher |
Present Continuous, Active Voice | |
---|---|
I am ciphering | we are ciphering |
you are ciphering | you are ciphering |
he/she/it is ciphering | they are ciphering |
Present Perfect, Active Voice | |
---|---|
I have ciphered | we have ciphered |
you have ciphered | you have ciphered |
he/she/it has ciphered | they have ciphered |
Present Perfect Continuous, Active Voice | |
---|---|
I have been ciphering | we have been ciphering |
you have been ciphering | you have been ciphering |
he/she/it has been ciphering | they have been ciphering |
Past Indefinite, Active Voice | |
---|---|
I ciphered | we ciphered |
you ciphered | you ciphered |
he/she/it ciphered | they ciphered |
Past Continuous, Active Voice | |
---|---|
I was ciphering | we were ciphering |
you were ciphering | you were ciphering |
he/she/it was ciphering | they were ciphering |
Past Perfect, Active Voice | |
---|---|
I had ciphered | we had ciphered |
you had ciphered | you had ciphered |
he/she/it had ciphered | they had ciphered |
Past Perfect Continuous, Active Voice | |
---|---|
I had been ciphering | we had been ciphering |
you had been ciphering | you had been ciphering |
he/she/it had been ciphering | they had been ciphering |
Future Indefinite, Active Voice | |
---|---|
I shall/will cipher | we shall/will cipher |
you will cipher | you will cipher |
he/she/it will cipher | they will cipher |
Future Continuous, Active Voice | |
---|---|
I shall/will be ciphering | we shall/will be ciphering |
you will be ciphering | you will be ciphering |
he/she/it will be ciphering | they will be ciphering |
Future Perfect, Active Voice | |
---|---|
I shall/will have ciphered | we shall/will have ciphered |
you will have ciphered | you will have ciphered |
he/she/it will have ciphered | they will have ciphered |
Future Perfect Continuous, Active Voice | |
---|---|
I shall/will have been ciphering | we shall/will have been ciphering |
you will have been ciphering | you will have been ciphering |
he/she/it will have been ciphering | they will have been ciphering |
Future in the Past Indefinite, Active Voice | |
---|---|
I should/would cipher | we should/would cipher |
you would cipher | you would cipher |
he/she/it would cipher | they would cipher |
Future in the Past Continuous, Active Voice | |
---|---|
I should/would be ciphering | we should/would be ciphering |
you would be ciphering | you would be ciphering |
he/she/it would be ciphering | they would be ciphering |
Future in the Past Perfect, Active Voice | |
---|---|
I should/would have ciphered | we should/would have ciphered |
you would have ciphered | you would have ciphered |
he/she/it would have ciphered | they would have ciphered |
Future in the Past Perfect Continuous, Active Voice | |
---|---|
I should/would have been ciphering | we should/would have been ciphering |
you would have been ciphering | you would have been ciphering |
he/she/it would have been ciphering | they would have been ciphering |
Present Indefinite, Passive Voice | |
---|---|
I am ciphered | we are ciphered |
you are ciphered | you are ciphered |
he/she/it is ciphered | they are ciphered |
Present Continuous, Passive Voice | |
---|---|
I am being ciphered | we are being ciphered |
you are being ciphered | you are being ciphered |
he/she/it is being ciphered | they are being ciphered |
Present Perfect, Passive Voice | |
---|---|
I have been ciphered | we have been ciphered |
you have been ciphered | you have been ciphered |
he/she/it has been ciphered | they have been ciphered |
Past Indefinite, Passive Voice | |
---|---|
I was ciphered | we were ciphered |
you were ciphered | you were ciphered |
he/she/it was ciphered | they were ciphered |
Past Continuous, Passive Voice | |
---|---|
I was being ciphered | we were being ciphered |
you were being ciphered | you were being ciphered |
he/she/it was being ciphered | they were being ciphered |
Past Perfect, Passive Voice | |
---|---|
I had been ciphered | we had been ciphered |
you had been ciphered | you had been ciphered |
he/she/it had been ciphered | they had been ciphered |
Future Indefinite, Passive Voice | |
---|---|
I shall/will be ciphered | we shall/will be ciphered |
you will be ciphered | you will be ciphered |
he/she/it will be ciphered | they will be ciphered |
Future Perfect, Passive Voice | |
---|---|
I shall/will have been ciphered | we shall/will have been ciphered |
you will have been ciphered | you will have been ciphered |
he/she/it will have been ciphered | they will have been ciphered |