Словари
Англо-русский словарь по компьютерной безопасности
Слова
Поиск
Слова на "T" в Англо-русском словаре по компьютерной безопасности
(
2
И
П
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Все
TA
TC
TD
TE
TF
TH
TI
TL
TO
TP
TR
TS
TT
TU
TW
TY
Список всех слов на букву T
Англо-русский словарь по компьютерной безопасности содержит 719 слов на букву T
Слова, начинающиеся на букву T
TABLE
TABLE LOOKUP
TABLE LOOKUP
TABLE LOOKUP APPROACH
TABLET
TABULATION METHOD
TABULATION TECHNIQUE
TACTICAL ENCRYPTION DEVICE
TACTICAL PRIVACY LEVEL
TACTICAL PROTECTION
TACTILE KEYBOARD
TACTORING PROGRAM
TAG
TAGGED IMAGE FILE FORMAT
TAGGED KEY
TAGPROTECTED KEY
TAILGATING
TAKEANDGRANT MODEL
TALKER
TALKER AUTHENTICATION
TALKER RECOGNITION
TAMPER
TAMPER DETECTION
TAMPER EXCHANGE
TAMPER PROOFING
TAMPER PROTECTION
TAMPER RESISTANCE
TAMPER RESISTANCE ENCLOSURE
TAMPER RESISTANT BOX
TAMPER RESISTANT HARDWARE
TAMPER RESPONDING
TAMPER RESPONDING SECURITY
TAMPER RESPONSE SECURITY
TAMPER SENSOR
TAMPERED ACCESS
TAMPERFREE
TAMPERFREE CHANNEL
TAMPERING
TAMPERPROOF
TAMPERPROOF CARD
TAMPERPROOF CASE
TAMPERPROOF CHECKSUM
TAMPERPROOF CHIP
TAMPERPROOF DEVICE
TAMPERRESISTANCE
TAMPERRESISTANT DEVICE
TAMPERRESISTANT MODULE
TAMPERRESPONDING SYSTEM
TAP
TAP ALARM
TAP DETECTION
TAP DETECTION EQUIPMENT
TAP IN
TAP PROTECTION
TAPE
TAPE ALARM
TAPE BACKUP
TAPE DEGAUSSER
TAPE DISRUPTER
TAPE READER
TAPE RECORD
TAPE RECORD(ING)
TAPE RECORD(ING)
TAPE RECORDING
TAPE STARTER
TAPERECORDER DETECTOR
TAPI
TAPING DYNAMICS
TAPKILLER
TAPOFF
TAPPED
TAPPED CIPHERTEXT
TAPPED CIPHPERTEXT
TAPPED CIRCUIT
TAPPED CRYPTOGRAM
TAPPED INFORMATION
TAPPED LINE
TAPPED ROOM
TAPPER
TAPPING
TAPPING ATTACK
TAPPING DETECTION UNIT
TAPPING DEVICE
TAPPROOF TELEPHONE
TARGET
TARGET AREA
TARGET CRYPTOGRAM
TARGET INFORMATION
TARGET PROTECTION
TARGET ROOM
TARGETED LINE
TARGETTING
TASK
TASK FORCE
TAUT WIRE FENCE
TAXONOMY
TCB
TCP/IP
TCSEC
TCU
TCVR
TDM
TDM SCRAMBLING
TDMA
TEAM
TECHNICAL INTELLIGENCE
TECHNICAL PROTECTION
TECHNICAL SAFEGUARD
TECHNICAL SECURITY MEANS
TECHNICAL VULNERABILITY
TECHNIQUE
TECHNOLOGICAL ATTACK
TELECOMMUNICATION
TELECOMMUNICATION ACCESS
TELECOMMUNICATION ACCESS METHOD
TELECOMMUNICATION ACCESS MODE
TELECOMMUNICATION ACCESS REGIME
TELECOMMUNICATION ACCESS TECHNIQUE
TELECOMMUNICATION MONITOR
TELECOMMUNICATION SECURITY
TELECOMMUNICATION SESSION
TELECONFERENCE SYSTEM
TELECONFERENCING
TELEFAX
TELEGRAPH LINK
TELEGRAPH MODEM
TELENETWORK
TELENOCTOVISOR
TELEPHONE
TELEPHONE (EN)CRYPTOR
TELEPHONE (EN)CRYPTOR
TELEPHONE ACCESS
TELEPHONE ACOUSTIC COUPLER
TELEPHONE ANALYSIS
TELEPHONE ANALYZER
TELEPHONE ANALYZING ANTUBUGGING SYSTEM
TELEPHONE ANSWERING DEVICE
TELEPHONE BUG
TELEPHONE BUG DESTROYER
TELEPHONE BUG RECEIVER
TELEPHONE BUGGING
TELEPHONE CALL RECORDER
TELEPHONE COMPROMISE
TELEPHONE CONVERSATION INTERCEPTION UNIT
TELEPHONE CRYPTOR
TELEPHONE EAVESDROPPING
TELEPHONE ENCRYPTION UNIT
TELEPHONE ENCRYPTOR
TELEPHONE LINE ACCESS
TELEPHONE LINE TAP
TELEPHONE LINE TAP(PING)
TELEPHONE LINE TAP(PING)
TELEPHONE LINE TAPPING
TELEPHONE MONITOR
TELEPHONE MONITORING SYSTEM
TELEPHONE NUMBER DECODER
TELEPHONE PRIVACY DEVICE
TELEPHONE PROBE
TELEPHONE PROTOCOL
TELEPHONE SCRAMBLER
TELEPHONE SCRAMBLING
TELEPHONE SECURITY
TELEPHONE SECURITY DEVICE
TELEPHONE TAP
TELEPHONE TAP DETECTOR
TELEPHONE TAPPING
TELEPHONE VOICE SCRAMBLER
TELEPHONEOPERATED BUG
TELEPHONY APPLICATION PROGRAMMING INTERFACE
TELEPORT
TELEPORTING BACKUP
TELEPRINTER
TELEPRINTER (TELE)COMMUNICATION
TELEPRINTER (TELE)COMMUNICATION
TELEPRINTER COMMUNICATION
TELEPRINTER TELECOMMUNICATION
TELEPRIVACY
TELETEXT
TELETYPE (TELE)COMMUNICATION
TELETYPE (TELE)COMMUNICATION
TELETYPE COMMUNICATION
TELETYPE TELECOMMUNICATION
TELETYPEWRITER
TELEVISION MONITOR
TELEVOTING
TELEX
TELEX TAPE (EN)CRYPTOR
TELEX TAPE (EN)CRYPTOR
TELEX TAPE CRYPTOR
TELEX TAPE ENCRYPTOR
TELEX TERMINAL
TELEX( )TERMINAL
TELEX()TERMINAL
TELEXTERMINAL
TELLTALE EMISSION
TEMPEST
TEMPEST CERTIFICATION
TEMPEST CERTIFIED EQUIPMENT
TEMPEST DEVICE
TEMPEST PRODUCT
TEMPEST PROTECTION
TEMPEST SECURE EQUIPMENT
TEMPEST SHIELDING
TEMPEST SUPPRESSION
TEMPEST TEST
TEMPESTCERTIFIED
TEMPESTIZING
TEMPESTPROTECTION
TEMPLATE MATCHING
TEMPORAL DISTANCE
TEMPORARY CODE
TEMPORARY KEY
TEMPORARY SECURITY
TEMPORARY STOR(AG)E
TEMPORARY STOR(AG)E
TEMPORARY STORAGE
TEMPORARY STORE
TERMAL IMAGE SENSOR
TERMINAL
TERMINAL ACCESS CONTROLLER
TERMINAL ATTACK
TERMINAL CRYPTOGRAPHIC UNIT
TERMINAL ID
TERMINAL KEY
TERMINAL MASQUERADE
TERMINAL SECURITY
TERMINAL SERVER
TERMINAL USER
TERMINALLEVEL KEY
TERMINALTOCOMPUTER (TELE)COMMUNICATION
TERMINALTOCOMPUTER (TELE)COMMUNICATION
TERMINALTOCOMPUTER COMMUNICATION
TERMINALTOCOMPUTER TELECOMMUNICATION
TERMINALTOHOST COMPUTER ENCRYPTION
TERMINALTOTERMINAL (TELE)COMMUNICATION
TERMINALTOTERMINAL (TELE)COMMUNICATION
TERMINALTOTERMINAL COMMUNICATION
TERMINALTOTERMINAL TELECOMMUNICATION
TERMINATEANDSTAYRESIDENT
TEST
TEST DOCUMENTATION
TEST KEY
TEST PATTERN
TEST SEQUENCE
TEST STRING
TESTING
TETRAGRAPH
TETRANOME
TEXT
TEXT ANALYSIS
TEXT CIPHER SET
TEXT COMPRESSION
TEXT ENCRYPTION
TEXT ENCRYPTION DEVICE
TEXT ENCRYPTION EQUIPMENT
TEXT ENCRYPTION TERMINAL
TEXT ENCRYPTION UNIT
TEXT MATRIX
TEXT ONLY EMAIL SYSTEM
TEXT RECONSTRUCTION
TEXT SYNTHESIS
TEXTDEPENDENT ENCRYPTION
TEXTTOSPEECH
TFT
THEFT
THEFT PREVENTION DEVICE
THEFTDETERRENT DEVICE
THEOREM
THEORETICAL SECURITY
THEORETICALLY SECURE
THEORETICALLY SECURE SYSTEM
THEORETICALLY UNBREAKABLE (CRYPTO)SYSTEM
THEORETICALLY UNBREAKABLE (CRYPTO)SYSTEM
THEORETICALLY UNBREAKABLE CRYPTOSYSTEM
THEORETICALLY UNBREAKABLE SYSTEM
THEORY
THERMAL IMAGING
THERMAL PAPER
THERMAL VIEWER
THERMIONIC NOISE SOURCE
THIEVERY
THINFILM TRANSISTOR
THIRD WIRE TAP
THIRD WIRE TAP(PING)
THIRD WIRE TAP(PING)
THIRD WIRE TAPPING
THIRDPARTY
THIRDPARTY INTERCEPT
THIRDPARTY INTERCEPT(ION)
THIRDPARTY INTERCEPT(ION)
THIRDPARTY INTERCEPTION
THIRDPARTY KEY
THIRDPARTY NOTARIZATION
THIRDPARTY THREAT
THREAT
THREAT ANALYSIS
THREAT ASSESSMENT
THREAT AVOIDANCE CONTROL
THREAT DOMAIN
THREAT ENVIRONMENT
THREAT ID
THREAT IDENTIFICATION
THREAT INFORMATION
THREAT MONITOR
THREAT SCENARIO
THREEKEY METHOD
THREEKEY TECHNIQUE
THREESTAGE SHIFT REGISTER
THREEWAY HANDSHAKING
THRESHOLD (CRYPTO)SYSTEM
THRESHOLD (CRYPTO)SYSTEM
THRESHOLD ANALYSIS
THRESHOLD CRYPTOSYSTEM
THRESHOLD DECODER
THRESHOLD ESTIMATE
THRESHOLD EVALUATION
THRESHOLD FORMULA
THRESHOLD FUNCTION
THRESHOLD INFORMATION PRESERVATION SYSTEM
THRESHOLD KEYING SCHEME
THRESHOLD LEVEL
THRESHOLD LOGIC
THRESHOLD RATE
THRESHOLD SCHEME
THRESHOLD SYSTEM
THRESHOLD VALUE
THROUGHPUT
THWART
THWART THE ATTACK
TICKET
TIER
TIERED
TIFF
TIGER TEAM
TIME
TIME AND DATE GENERATOR
TIME AND FREQUENCY SEQUENTIAL PERMUTATION
TIME AXIS
TIME COEFFICIENT
TIME COMPLEXITY
TIME CORRELATION
TIME DELAY
TIME DIVISION AND FREQUENCY PROCESSING
TIME DIVISION DEVICE
TIME DIVISION METHOD
TIME DIVISION MULTIPLE ACCESS
TIME DIVISION MULTIPLEXING SCRAMBLING
TIME DIVISION SCRAMBLER
TIME DIVISION TECHNIQUE
TIME DOMAIN
TIME DOMAIN HARMONIC COMPRESSION
TIME DOMAIN PROCESSING
TIME DOMAIN SEGMENTATION
TIME ELEMENT SCRAMBLER
TIME FACTOR
TIME HOPPING
TIME LOCK
TIME OF DAY RESTRICTION
TIME OF DAY SIGNAL
TIME SAMPLE SCRAMBLING
TIME SCRAMBLING
TIME SEGMENT
TIME SEGMENT PERMUTATION
TIME SEGMENT REARRANGEMENT
TIME SEGMENT TRANSPOSITION
TIME SEGMENT TRANSPOSITION SCRAMBLER
TIME SLOT
TIME STAMP
TIME SYNCHRONIZATION
TIME VARIABLE CHANNEL
TIME VARYING BLOCK
TIME VARYING ENCRYPTION
TIMEBASED SCRAMBLING
TIMEDATED MESSAGE
TIMEDEPENDENT
TIMEDEPENDENT PASSWORD
TIMEDIVISION MULTIPLEXING
TIMEDOMAIN ANALYSIS
TIMEDOMAIN CIPHERING
TIMEDOMAIN SCRAMBLER
TIMEDOMAIN SCRAMBLING
TIMEDOMAINBASED SCRAMBLER
TIMEEXPIRED KEY
TIMEFORWARD
TIMEFREQUENCY ANALYSIS
TIMEFREQUENCY SPACE
TIMEINVARIANT FUNCTION
TIMEINVARIANT WIENER FILTERING
TIMELINESS
TIMEOUT
TIMER
TIMEREVERSE
TIMESENSITIVE INFORMATION
TIMESHARING REGIME
TIMESPACE COMPLEXITY
TIMESPACE MAPPING
TIMESTAMP
TIMESTAMP CERTIFICATE
TIMESTAMP PROTOCOL
TIMESTAMP SIGNAL
TIMESTAMPED AUDIT TRAIL
TIMESTAMPING
TIMESTAMPING SERVER
TIMEVARIANT KEY
TIMEVARYING CIPHER
TIMEVARYING FUNCTION
TIMEVARYING SCRAMBLER
TIMEVARYING TRANSFORM
TIMEVARYING TRANSFORM(ATION)
TIMEVARYING TRANSFORM(ATION)
TIMEVARYING TRANSFORMATION
TIMEWARPING
TIMING
TIMING CIRCUIT
TIMING DIAGRAM
TLU
TOKEN
TOKEN ACCESS
TOKEN CARD
TOKEN ID
TOKEN IDENTIFICATION
TOKEN IDENTIFICATION SYSTEM
TOKEN PASSING
TOKENACCESS SYSTEM
TOLERANCE
TONE
TONE MASKING
TONE TEST
TONOSCOPE
TOOLKIT
TOOLS
TOP PRIORITY
TOP SECRECY
TOP SECRET
TOP SECRET CLEARANCE
TOP SECRET INFORMATION
TOP SECURITY
TOP SECURITY (TELE)COMMUNICATION
TOP SECURITY (TELE)COMMUNICATION
TOP SECURITY COMMUNICATION
TOP SECURITY TELECOMMUNICATION
TOPALERT
TOPLEVEL KEY
TOPLEVEL SECURITY
TOPNOTCH SECURITY
TOPPING WINDOW
TOPPING WINDOW SCRAMBLER
TOTAL
TOTAL ENCRYPTION
TOTALLY RANDOM KEY
TOTALLY RANDOM SEQUENCE
TOTALLY RANDOM STRING
TOURIST
TP
TPC
TPI
TPS
TRACER
TRACING
TRACING INFORMATION
TRACKING
TRACKING DEVICE
TRACKS PER INCH
TRACT
TRADE SECRET
TRADE SECRET PIRACY
TRADEOFF ANALYSIS
TRADITIONAL PASSWORD
TRADITIONAL SIGNATURE
TRAFFIC
TRAFFIC ANALYSIS
TRAFFIC ANALYSIS SECURITY
TRAFFIC CRYPTOALGORITHM
TRAFFIC CRYPTOALGORITM
TRAFFIC DATA ENCRYPTION
TRAFFIC ENCRYPTION
TRAFFIC ENCRYPTION KEY
TRAFFIC FLOW ANALYSIS
TRAFFIC FLOW CONFIDENTIALITY
TRAFFIC FLOW CONFIDENTIALITY SERVICE
TRAFFIC FLOW SECURITY
TRAFFIC INTERCEPT
TRAFFIC INTERCEPT(ION)
TRAFFIC INTERCEPT(ION)
TRAFFIC INTERCEPTION
TRAFFIC KEY
TRAFFIC PADDING
TRAIL
TRAILER
TRANCEIVER
TRANMISSION SECURITY
TRANQUILITY PRINCIPLE
TRANSACTION
TRANSACTION KEY
TRANSACTION PROCESSING
TRANSACTION PROCESSING COUNCIL
TRANSACTION SECURITY
TRANSACTION SEQUENCE NUMBER
TRANSACTIONS PER SECOND
TRANSBORDER DATA FLOW
TRANSCEIVER
TRANSCIPHER
TRANSCODER
TRANSDUCER
TRANSEC
TRANSFER
TRANSFORM
TRANSFORM COEFFICIENT
TRANSFORM MATRIX
TRANSFORM OPERATION
TRANSFORM(ATION) OPERATION
TRANSFORM(ATION) OPERATION
TRANSFORMATION
TRANSFORMATION FUNCTION
TRANSFORMATION KEY
TRANSFORMATION OPERATION
TRANSFORMATION PARAMETER
TRANSFORMATIONAL ALGORITHM
TRANSFORMBASED SCRAMBLER
TRANSFORMED CIPHERTEXT
TRANSFORMED CIPHPERTEXT
TRANSFORMED CRYPTOGRAM
TRANSFORMED DATA
TRANSFORMED PASSWORD
TRANSFORMED TEXT
TRANSGRESSION
TRANSIENT ELECTROMAGNETIC PULSE EMANATIONS STANDARD
TRANSIENT KEY
TRANSIENT KEY (CRYPTO)SYSTEM
TRANSIENT KEY (CRYPTO)SYSTEM
TRANSIENT KEY CRYPTOGRAPHY
TRANSIENT KEY CRYPTOSYSTEM
TRANSIENT KEY SYSTEM
TRANSITION
TRANSITIVE CODE
TRANSLATION
TRANSLATION FREQUENCY
TRANSLATION FROM ONE KEY TO THE NEXT
TRANSLATION TABLE
TRANSLINER
TRANSMISSION
TRANSMISSION CHANNEL CAPACITY
TRANSMISSION CONTROL PROTOCOL
TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL
TRANSMISSION DELAY
TRANSMISSION ERROR
TRANSMISSION MEDIUM
TRANSMISSION PATH DELAY
TRANSMISSION RATE
TRANSMISSION SECURITY
TRANSMIT LEVEL
TRANSMITTED MESSAGE
TRANSMITTER
TRANSMITTER BUG
TRANSMITTER DETECTOR
TRANSMITTER LOCATOR
TRANSMITTER'S KEY
TRANSMITTING BUG
TRANSMITTING DISTANCE
TRANSMULTIPLEXOR
TRANSNATIONAL DATA FLOW
TRANSPARENCY
TRANSPARENT ACCESS
TRANSPARENT CRYPTOGRAPHY
TRANSPARENT ENCRYPTION
TRANSPARENT MODE
TRANSPARENT REGIME
TRANSPORT CONNECTION
TRANSPORT ENCRYPTION
TRANSPORT INTO CIPHER
TRANSPORT KEY
TRANSPORTS
TRANSPOSE INTO CIPHER
TRANSPOSITION
TRANSPOSITION (CRYPTO)SYSTEM
TRANSPOSITION (CRYPTO)SYSTEM
TRANSPOSITION CIPHER
TRANSPOSITION CRYPTOSYSTEM
TRANSPOSITION ENCRYPTION
TRANSPOSITION MODE
TRANSPOSITION OPERATION
TRANSPOSITION REGIME
TRANSPOSITION SYSTEM
TRANSPOSITION TABLE
TRANSPOSITIONSUBSTITUTION CIPHER
TRAPDOOR
TRAPDOOR FUNCTION
TRAPDOOR INFORMATION
TRAPDOOR ONEWAY FUNCTION
TRAPDOOR PARAMETER
TRAPDOOR PERMUTATION
TRAPDOORKNAPSACK PUBLIC KEY (CRYPTO)SYSTEM
TRAPDOORKNAPSACK PUBLIC KEY (CRYPTO)SYSTEM
TRAPDOORKNAPSACK PUBLIC KEY CRYPTOSYSTEM
TRAPDOORKNAPSACK PUBLIC KEY SYSTEM
TRAVELLER
TREATMENT
TREBLE ENCRYPTION
TREE
TREE STRUCTURE
TRELLIS CODING
TRENDS ANALYSIS
TRESPASS ALARM
TRESPASSER
TRF
TRIAL
TRIAL KEY
TRIALANDERROR CRYPTANALYSIS
TRIALANDERROR METHOD
TRIALANDERROR SEARCH
TRIALANDERROR TECHNIQUE
TRICK
TRIGRAM
TRIGRAPH
TRINOME
TRIPLE ENCRYPTION
TRIPLET
TRIPWIRE
TRIVIAL PASSWORD
TROJAN HORSE
TROJAN HORSE ATTACK
TROJAN HORSE PROGRAM
TROJAN HORSE SOFTWARE
TRUE KEY
TRUE MESSAGE
TRUE MESSAGE REFECTION
TRUE RANDOM NUMBER
TRUE RANDOM SOURCE
TRUE RANDOMNESS
TRULY RANDOM SEQUENCE
TRULY RANDOM STRING
TRULY UNBREAKABLE CIPHER
TRUNCATED SET
TRUNCATION
TRUNK ENCRYPTION DEVICE
TRUST
TRUST LEVEL
TRUSTED
TRUSTED COMPUTER
TRUSTED COMPUTER BASE
TRUSTED COMPUTER SYSTEM
TRUSTED COMPUTER SYSTEM EVALUATION CRITERIAL
TRUSTED COMPUTING BASE
TRUSTED CONNECTION
TRUSTED EMPLOYEE
TRUSTED ENVIRONMENT
TRUSTED FUNCTIONALITY
TRUSTED KEY DISTRIBUTION CENTER
TRUSTED NETWORK CONTROLLER
TRUSTED PATH
TRUSTED PERSON
TRUSTED PERSONNEL
TRUSTED PROCESS
TRUSTED PRODUCT
TRUSTED SOFTWARE
TRUSTED SUBJECT
TRUSTED THIRDPARTY
TRUSTED USER
TRUSTEE
TRUSTWORTHINESS
TRUSTWORTHY NETWORK
TRUSTWORTHY SYSTEM
TRUSTWORTY INFORMATION
TRUTH TABLE
TRY ALL POSSIBLE KEYS CRYPTANALYSIS
TS
TSCRAMBLING
TSD
TSEC
TSR
TTS
TUPLE
TURING MACHINE
TURNKEY SECURITY SYSTEM
TURNSTILE
TWISTED PAIR
TWODIMENSIONAL CIPHERING
TWODIMENSIONAL MATRIX
TWODIMENSIONAL OPERATION
TWODIMENSIONAL SCRAMBLER
TWODIMENSIONAL SCRAMBLING
TWOKEY (CRYPTO)SYSTEM
TWOKEY (CRYPTO)SYSTEM
TWOKEY CRYPTOGRAPHIC METHOD
TWOKEY CRYPTOGRAPHIC TECHNIQUE
TWOKEY CRYPTOGRAPHY
TWOKEY CRYPTOSYSTEM
TWOKEY ENCRYPTION
TWOKEY SIGNATURE
TWOKEY SYSTEM
TWOKEY TRIPLE ENCRYPTION
TWOLEVEL ACCESS CONTROL
TWOMASTERKEY APPROACH
TWOPART KEY
TWOPARTY PROTOCOL
TWOPASS MODE
TWOPASS REGIME
TWOPERSON PRINCIPLE
TWOSTEP SUBSTITUTE
TWOSTEP SUBSTITUTION
TWOTIERED PROTECTION
TWOWAY (TELE)COMMUNICATION
TWOWAY (TELE)COMMUNICATION
TWOWAY AUTHENTICATION
TWOWAY CHANNEL
TWOWAY COMMUNICATION
TWOWAY HANDSHAKING
TWOWAY KEY
TWOWAY SYNCHRONIZATION
TWOWAY TELECOMMUNICATION
TWOWAYKEY CRYPTOALGORITHM
TWOWAYKEY CRYPTOALGORITM
TYPE 1 ERROR
TYPE 2 ERROR
TYPE SIGNATURE
TYPE THE PASSWORD
TYPE1 CRYPTOGRAPHIC PRODUCT
TYPE2 CRYPTOGRAPHIC PRODUCT
TYPING RHYTM
T: 172