Also found in: Thesaurus, Medical, Encyclopedia.


The study of cryptanalysis or cryptography.

cryp′to·log′ic (-tə-lŏj′ĭk), cryp′to·log′i·cal (-ĭ-kəl) adj.
cryp·tol′o·gist n.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Adj.1.cryptological - of or relating to cryptanalysis
References in periodicals archive ?
We will examine the theoretical frameworks of these different suggestions for solving the cryptological techniques related to the computation and communication costs incurred by each task in accordance with the concept of modular arithmetic operations [38][48] and [49].
These data are then, after their registration at the entry point, immediately anonymized and encoded using a cryptological procedure in such a way that it is impossible to work out any details of the actual vehicle or any personal data at any time during the measurement.
Examples of such controls are firewalls for information systems, fire alarms and sprinkler systems, firefighting training for personnel, storm hardening, physical security for critical records, awareness and de-escalation training for personnel to mitigate the potential for workplace violence, seismic upgrades in earthquake prone locations, physical security items such as badges and entrance control procedures, flood alarms, locating cryptological functions in secure areas, virus protection, surge protectors for vulnerable circuits, and low battery alarms (Rosenthal and Sheiniuk, 1993; NyBlom, 2003).
The two cryptological linguist recruits were both shifted to become parachute and fabrication specialists.
An hour or so onwards is the National Cryptological Museum, which boasts a genuine Enigma machine, the one British boffins cracked to get at top-level Nazi communications, a move said to have shortened World War Two by at least a year.
Furthermore, the EMIB PED includes integration and synchronization of both the traditional GEOINT mission with the embedded Cryptological Support Teams tactical SIGINT operations.
The MC-12W has two pilots, a sensor operator and a cryptological operator.
Instead of using the bottom-up approach - building from the necessary mathematical foundations towards their cryptographic application, we opted for a top-down approach--representing cryptological principles in the context of their practical application with the aim of provoking the interest for mastering the underpinning mathematical principles.

Full browser ?