cryptology

(redirected from cryptological)
Also found in: Dictionary, Thesaurus, Medical.

cryptology

[krip′täl·ə·jē]
(communications)
The science of preparing messages in forms which are intended to be unintelligible to those not privy to the secrets of the form, and of deciphering such messages.
McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc.

cryptology

The study of cryptography and cryptanalysis.
This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)

cryptology

The science of developing secret codes and/or the use of those codes in encryption systems. See cryptography.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
The solution is based on the use of Cryptool, a software package that offers a graphical interface for modeling and simulation of cryptological scenarios with the ability to use popular algorithms.
All current accounts of the big "Other" misplace or otherwise obscure the channels by which powerful, cryptological gambits elude a critical intellectual gaze.
Whether the book will help trigger a sea change in the cultural dialogue about cryptological issues remains to be seen, but I for one am pretty hopeful about the prospect.
Instead of pronouncing the whole category of argot words dead, it might be useful to distinguish between 'dead' argot and 'living' argot, the former embracing words traditionally associated mainly with the Paris underworld, which have subsequently gained wider currency, losing their cryptological function in the process, the latter embracing terms currently being coined within particular subgroups in society either with the deliberate intention of excluding non-members or simply as a gesture of defiance at the 'straight' world.
Borrowing from cryptological techniques, we provide evidence that CRC computations can be more efficiently handled by a bytewise method other than the standard bitwise approach (up to 19 times faster!).
This makes it possible to use this concept for password protocols and in cryptological games like tossing a coin by telephone or exchanging secret keys (SN:9/26/81, p.205).
We will examine theoretical results of the three different strategies for solving the cryptological operations involved with respect to the costs of computation and communication incurred by each task according to the concept of modular arithmetic operations [31, 45].
Furthermore, the EMIB PED includes integration and synchronization of both the traditional GEOINT mission with the embedded Cryptological Support Teams tactical SIGINT operations.
For two reasons, the DAMMA protocol uses a cryptological hash function such as SHA-1 to change a real identity into an anonymous identity AID.
--electronic maintenance and evaluations such as satellite communications, weather radar, cryptological, air traffic control and landing systems and network infrastructure.
"By taking care of our people, they will fulfill the goals of the command and ultimately the Navy, since they go to work in the fleet," said Hall, who serves as the leading petty officer for the Operations Department of Maritime Cryptological Information center.

Full browser ?