about icon-addNote android4 Answer apple4 icon-appStoreEN icon-appStoreES icon-appStorePT icon-appStoreRU Imported Layers Copy 7 icon-arrow-spined icon-ask icon-attention icon-bubble-blue icon-bubble-red ButtonError ButtonLoader ButtonOk icon-cake icon-camera icon-card-add icon-card-calendar icon-card-remove icon-card-sort chrome-extension-ru chrome-extension-es-mx chrome-extension-pt-br chrome-extension-ru comment comment icon-cop-cut icon-cop-star Cross Dislike icon-editPen icon-entrance icon-errorBig facebook flag flag_vector icon-globe icon-googlePlayEN icon-googlePlayRU icon-greyLoader icon-cake Heart 4EB021E9-B441-4209-A542-9E882D3252DE Created with sketchtool. Info Kebab icon-lamp icon-lampBig icon-learnHat icon-learning-hat Dislike Loup Loup icon-more icon-note icon-notifications icon-pen Pencil icon-play icon-plus-light icon-plus icon-rosie-cut Rune scrollUp Share-icon Shevron-Down Shevron Left Shevron Right sound sound1 sound2 sound3 sound4 sound2 icon-star Swap icon-translate Trash icon-tutor-ellipsis icon-tutor-flip Tutor folder icon icon-tutor-learned icon-twoWayArrow Mezhdunarodny_logotip_VK vk icon-word pen_icon Logo Logo Logo
without examplesFound in 4 dictionaries

The Universal Dictionary
  • It is intended for a full-text search and it significantly expands the possibilities of working with lexical items from the Russian glossary of LingvoUniversal. Contains usage examples, synonyms, and antonyms.

cipher

['saɪfə] брит. / амер.

  1. сущ.

    1. код, шифр, тайнопись

    2. арабская цифра

    3. нуль, фикция; ничтожество, пустое место (о человеке)

    4. монограмма; магическое сочетание символов, вензель

  2. гл.

    1. подсчитывать, высчитывать, вычислять

    2. зашифровывать, писать шифром сообщение; обозначать условным знаком

LingvoComputer (En-Ru)

cipher

  1. код; шифр||кодировать; шифровать

  2. нуль (число)

  3. символ; цифра

Unlock all free
thematic dictionaries

Examples from texts

Longer keys are better than shorter ones, and the Microsoft Crypto Provider takes advantage of the loosening of export restrictions in 2000 to use a 128-bit random number as a cipher key.
Чем длиннее ключ, тем лучше. В результате ослабления экспортных ограничений в 2000 году в поставщике шифрования Microsoft в качестве ключа шифрования используется 128-разрядное случайное число.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
Using this key and the IDEA cipher, find the output of round 1.
Используя этот ключ и шифр IDEA, найдите выход цикла 1.
Sklar, Bernard / Digital Communications: Fundamentals and ApplicationsСкляр, Бернард / Цифровая связь. Теоретические основы и практическое применение
Цифровая связь. Теоретические основы и практическое применение
Скляр, Бернард
© Издательский дом "Вильямc", 2003
© Prentice Hall PTR, 2001
Digital Communications: Fundamentals and Applications
Sklar, Bernard
To avoid the ECB mode of encryption, WEP uses a 24-bit IV, which is concatenated to the key before being processed by the RC4 cipher.
Чтобы избежать шифрования в режиме ЕСВ, WEP использует 24-разрядный вектор инициализации, который добавляется к ключу перед выполнением обработки по алгоритму RC4.
Roshan, Pejman,Leary, Jonathan / 802.11 Wireless LAN FundamentalsРошан, Педжман,Лиэри, Джонатан / Основы построения беспроводных локальных сетей стандарта 802.11
Основы построения беспроводных локальных сетей стандарта 802.11
Рошан, Педжман,Лиэри, Джонатан
© Cisco Press, 2004
© Издательский дом "Вильямc", 2004
802.11 Wireless LAN Fundamentals
Roshan, Pejman,Leary, Jonathan
© 2004 Cisco Systems, Inc.
To use the blowfish cipher, type -c blowfish.
Для использования этого шифра введите -с blowfish.
Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.
Антихакинг в сети. Трюки.
Локхарт, Эндрю
© 2004 O'Reilly Media, Inc.
© Издание на русском языке ЗАО Издательский дом «Питер», 2005
© Перевод на русский язык ЗАО Издательский дом «Питер», 2005
Network Security Hacks
Lockhart, Andrew
© 2004 O'Reilly Media, Inc.
Afterwards he had, to fulfil the prearranged cipher, to fill in any two words in each space.
После того как он расположил шифр, ему нужно было заполнить пустые места любыми двумя словами.
Conan Doyle, Arthur / The “Gloria Scott”Конан Дойль, Артур / «Глория Скотт»
«Глория Скотт»
Конан Дойль, Артур
© Издательство "Правда", 1966
The “Gloria Scott”
Conan Doyle, Arthur
© 1975 by Clarkson N. Potter, Inc.
In broad terms, DESX is a block cipher that uses a three-step process to encrypt a file:
Если коротко, то DESX является блочным шифратором, использующим три этапа шифрования файла.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
I guess you'll report what you hear and see to the cipher at the Grange; and this thing won't be settled while you linger about it.'
Я понимаю, ты собираешься дать на Мызе полный отчет обо всем, что ты слышала и видела у нас. Но пока ты тут мешкаешь, дело улажено не будет.
Bronte, Emily / Wuthering HeightsБронт Эмили / Грозовой перевал
Грозовой перевал
Бронт Эмили
© Издательство "Правда", 1988
Wuthering Heights
Bronte, Emily
©2009 by Pearson Education, Inc.
As a result, block cipher operation decreases the effective throughput of a device.
В результате производительность устройств, применяющих блочное шифрование, снижается.
Roshan, Pejman,Leary, Jonathan / 802.11 Wireless LAN FundamentalsРошан, Педжман,Лиэри, Джонатан / Основы построения беспроводных локальных сетей стандарта 802.11
Основы построения беспроводных локальных сетей стандарта 802.11
Рошан, Педжман,Лиэри, Джонатан
© Cisco Press, 2004
© Издательский дом "Вильямc", 2004
802.11 Wireless LAN Fundamentals
Roshan, Pejman,Leary, Jonathan
© 2004 Cisco Systems, Inc.
'I have done nothing, of course,' he'll tell you. 'I'm a cipher, because I've had no training, but I've incomparably more melody and more ideas in me than in Meyerbeer.'
"Я, говорит, конечно, ничего, я нуль, потому что я не учился, но у меня не в пример больше мелодий и больше идей, чем у Мейербера".
Тургенев, И.С. / ДымTurgenev, I.S. / Smoke
Smoke
Turgenev, I.S.
© 1919, by BONI & LIVERIGHT, Inc.
Дым
Тургенев, И.С.
© Издательство "Правда", 1979
The cipher stream classes transparently handle the calls to update and doFinal, which is clearly a convenience.
Из классов шифрованных потоков автоматически вызываются методы update и doFinal, так что программисту не придется выполнять связанную с ними работу.
Horstmann, Cay S.,Cornell, Gary / Core Java™ 2. Volume II - Advanced FeaturesХорстманн, Кей С.,Корнелл, Гари / Java 2. Том II. Тонкости программирования
Java 2. Том II. Тонкости программирования
Хорстманн, Кей С.,Корнелл, Гари
© Издательский дом "Вильямc", 2002
© Prentice Hall, Inc., 2002
Core Java™ 2. Volume II - Advanced Features
Horstmann, Cay S.,Cornell, Gary
© 2002 Sun Microsystems, Inc.
Then, it uses a separate 56-bit cipher to encrypt the encrypted block again using standard DES encryption.
После этого отдельный 56-разрядный шифратор используется для шифрования зашифрованных блоков с помощью стандартного шифрования DES.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
One method of using such an alphabet is to select the first cipher character from the shift 1 row, the second cipher character from the shift 2 row, and so on.
Один из методов использования такого алфавита заключается в выборе первого символа шифрованного сообщения из строки, полученной при сдвиге на 1 символ, второго символа — из строки, полученной при сдвиге на 2 символа, и т.д.
Sklar, Bernard / Digital Communications: Fundamentals and ApplicationsСкляр, Бернард / Цифровая связь. Теоретические основы и практическое применение
Цифровая связь. Теоретические основы и практическое применение
Скляр, Бернард
© Издательский дом "Вильямc", 2003
© Prentice Hall PTR, 2001
Digital Communications: Fundamentals and Applications
Sklar, Bernard
For example, cipher /w:\e:\would wipe all unallocated clusters on the E: drive of a machine.
Например, команда cipher /w: \е\ позволяет очистить все свободные кластеры на диске Е.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
The duke says:"Leave me alone to cipher out a way so we can run in the daytime if we want to.
Герцог сказал: — Предоставьте это мне — я найду какой-нибудь способ, чтобы нам плыть днем, если понадобится.
Twain, Mark / Huckleberry FinnТвен, Марк / Приключения Гекльберри Финна
Приключения Гекльберри Финна
Твен, Марк
© «Государственное издательство художественной литературы», 1960
Huckleberry Finn
Twain, Mark
© 2004 BookSurge LLC
A block cipher, in contrast, generates a single encryption key stream of a fixed size.
Блочный шифр, наоборот, генерирует единственный ключевой поток шифрования фиксированного размера.
Roshan, Pejman,Leary, Jonathan / 802.11 Wireless LAN FundamentalsРошан, Педжман,Лиэри, Джонатан / Основы построения беспроводных локальных сетей стандарта 802.11
Основы построения беспроводных локальных сетей стандарта 802.11
Рошан, Педжман,Лиэри, Джонатан
© Cisco Press, 2004
© Издательский дом "Вильямc", 2004
802.11 Wireless LAN Fundamentals
Roshan, Pejman,Leary, Jonathan
© 2004 Cisco Systems, Inc.

Add to my dictionary

cipher1/13
'saɪfəNounкод; шифр; тайнопись

User translations

No translations for this text yet.
Be the first to translate it!

Collocations

cipher code
шифровальный код
cipher feedback
шифрованная обратная связь
cipher key
ключ к шифру
cipher machine
криптографическая машина
cipher machine
шифровальный аппарат
cipher officer
шифровальщик
in cipher
зашифрованный
one-time cipher
разовый шифр
product cipher
продукционный шифр
stream cipher
групповой шифр
substitution cipher
подстановочный шифр
substitutional cipher
подстановочный шифр
transposition cipher
перестановочный шифр
to cipher
шифровать
chief cipher officer
начальник шифровальной службы

Word forms

cipher

noun
SingularPlural
Common casecipherciphers
Possessive casecipher'sciphers'

cipher

verb
Basic forms
Pastciphered
Imperativecipher
Present Participle (Participle I)ciphering
Past Participle (Participle II)ciphered
Present Indefinite, Active Voice
I cipherwe cipher
you cipheryou cipher
he/she/it ciphersthey cipher
Present Continuous, Active Voice
I am cipheringwe are ciphering
you are cipheringyou are ciphering
he/she/it is cipheringthey are ciphering
Present Perfect, Active Voice
I have cipheredwe have ciphered
you have cipheredyou have ciphered
he/she/it has cipheredthey have ciphered
Present Perfect Continuous, Active Voice
I have been cipheringwe have been ciphering
you have been cipheringyou have been ciphering
he/she/it has been cipheringthey have been ciphering
Past Indefinite, Active Voice
I cipheredwe ciphered
you cipheredyou ciphered
he/she/it cipheredthey ciphered
Past Continuous, Active Voice
I was cipheringwe were ciphering
you were cipheringyou were ciphering
he/she/it was cipheringthey were ciphering
Past Perfect, Active Voice
I had cipheredwe had ciphered
you had cipheredyou had ciphered
he/she/it had cipheredthey had ciphered
Past Perfect Continuous, Active Voice
I had been cipheringwe had been ciphering
you had been cipheringyou had been ciphering
he/she/it had been cipheringthey had been ciphering
Future Indefinite, Active Voice
I shall/will cipherwe shall/will cipher
you will cipheryou will cipher
he/she/it will cipherthey will cipher
Future Continuous, Active Voice
I shall/will be cipheringwe shall/will be ciphering
you will be cipheringyou will be ciphering
he/she/it will be cipheringthey will be ciphering
Future Perfect, Active Voice
I shall/will have cipheredwe shall/will have ciphered
you will have cipheredyou will have ciphered
he/she/it will have cipheredthey will have ciphered
Future Perfect Continuous, Active Voice
I shall/will have been cipheringwe shall/will have been ciphering
you will have been cipheringyou will have been ciphering
he/she/it will have been cipheringthey will have been ciphering
Future in the Past Indefinite, Active Voice
I should/would cipherwe should/would cipher
you would cipheryou would cipher
he/she/it would cipherthey would cipher
Future in the Past Continuous, Active Voice
I should/would be cipheringwe should/would be ciphering
you would be cipheringyou would be ciphering
he/she/it would be cipheringthey would be ciphering
Future in the Past Perfect, Active Voice
I should/would have cipheredwe should/would have ciphered
you would have cipheredyou would have ciphered
he/she/it would have cipheredthey would have ciphered
Future in the Past Perfect Continuous, Active Voice
I should/would have been cipheringwe should/would have been ciphering
you would have been cipheringyou would have been ciphering
he/she/it would have been cipheringthey would have been ciphering
Present Indefinite, Passive Voice
I am cipheredwe are ciphered
you are cipheredyou are ciphered
he/she/it is cipheredthey are ciphered
Present Continuous, Passive Voice
I am being cipheredwe are being ciphered
you are being cipheredyou are being ciphered
he/she/it is being cipheredthey are being ciphered
Present Perfect, Passive Voice
I have been cipheredwe have been ciphered
you have been cipheredyou have been ciphered
he/she/it has been cipheredthey have been ciphered
Past Indefinite, Passive Voice
I was cipheredwe were ciphered
you were cipheredyou were ciphered
he/she/it was cipheredthey were ciphered
Past Continuous, Passive Voice
I was being cipheredwe were being ciphered
you were being cipheredyou were being ciphered
he/she/it was being cipheredthey were being ciphered
Past Perfect, Passive Voice
I had been cipheredwe had been ciphered
you had been cipheredyou had been ciphered
he/she/it had been cipheredthey had been ciphered
Future Indefinite, Passive Voice
I shall/will be cipheredwe shall/will be ciphered
you will be cipheredyou will be ciphered
he/she/it will be cipheredthey will be ciphered
Future Perfect, Passive Voice
I shall/will have been cipheredwe shall/will have been ciphered
you will have been cipheredyou will have been ciphered
he/she/it will have been cipheredthey will have been ciphered