Glossary entry

German term or phrase:

rechnerbasiert

English translation:

computer-based, computer-aided

Added to glossary by Steffen Walter
Feb 22, 2003 18:46
21 yrs ago
German term

rechnerbasiert

German to English Tech/Engineering Computers (general) IT security
context: Kopierschutz: Rechnerbasierte Datenverschlüsselung

computer based?
Proposed translations (English)
4 computer-aided
4 +1 computer-based
Change log

Jun 4, 2008 13:29: Steffen Walter changed "Term asked" from "Rechnerbasierte" to "rechnerbasiert" , "Field (specific)" from "(none)" to "Computers (general)"

Jun 4, 2008 13:29: Steffen Walter changed "Edited KOG entry" from "<a href="/profile/39164">verbis's</a> old entry - "Rechnerbasierte"" to ""computer-based, computer-aided""

Proposed translations

9 mins
Selected

computer-aided

computer-assisted
Something went wrong...
4 KudoZ points awarded for this answer. Comment: "thanks a lot"
+1
35 mins

computer-based

A few examples:

What is computer encryption?
Remember secret decoder rings? To read a scrambled message, you used a translation table to decode the text. Most rings substituted one character for another. For example, the letter "A" would be substituted for the letter "M". If both sender and receiver used the same code, a garbled message could be read by both parties. Think of decoder rings as having one key combination to secure the data.
Computer-based encryption takes this simple concept and adds tremendous complexity. Messages using computer encryption have billions of possible key combinations. Only the computers on both ends of the transaction know what key combination is in use during that session. Furthermore, a new key combination is used for each session. The result is rock-solid security for your financial transactions. Even though your data is transmitted over a public network, anyone attempting to read it will only see a string of numbers and characters.
www.onegroup.com/Help/browserfaq.asp

Most computer-based encryption techniques employ keys no larger than a few hundred bits, making some of these approaches vulnerable to an attack where a ...
www.meganet.com/news/press/pressrelease10-31-00.htm

Encryption is the art of turning a plain text message written by a sender to a ciphertext (encrypted) message which is sent to a recipient. Modern computer-based encryption is done by an algorithm (which is generally publicly available to anyone) and a secret (private) encryption key. For good encryption algorithms, it is nearly impossible to decrypt the ciphertext (recover the original plaintext message from the ciphertext) without the correct key ("breaking the code" in security lingo
www.jguru.com/faq/view.jsp?EID=4311 - 22k

Computer-based encryption schemes must also withstand the test of time. For example, if a credit card encryption scheme needs six months to break, the resulting credit card number is likely to be still valid and, therefore, useful to an intruder after that six-month period. In this case, the encryption scheme isn't strong enough to guard the information for its entire useful lifetime.
www.cert.org/homeusers/piglatin.html

HTH
Peer comment(s):

agree Elvira Stoianov
13 hrs
Something went wrong...
Term search
  • All of ProZ.com
  • Term search
  • Jobs
  • Forums
  • Multiple search