Also found in: Thesaurus, Medical, Encyclopedia.


The study of cryptanalysis or cryptography.

cryp′to·log′ic (-tə-lŏj′ĭk), cryp′to·log′i·cal (-ĭ-kəl) adj.
cryp·tol′o·gist n.
American Heritage® Dictionary of the English Language, Fifth Edition. Copyright © 2016 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Adj.1.cryptological - of or relating to cryptanalysis
Based on WordNet 3.0, Farlex clipart collection. © 2003-2012 Princeton University, Farlex Inc.
References in periodicals archive ?
Joe Rochefort, the WWII cryptological officer whose codebreaking is credited with helping win the Battle of Midway in June 1942.
All current cryptological programs depend upon the mathematical fact that there is no shortcut or algorithm to factoring very large numbers into prime factors.
* Signals Intelligence: Cryptological Support Team Crew.
We will examine the theoretical frameworks of these different suggestions for solving the cryptological techniques related to the computation and communication costs incurred by each task in accordance with the concept of modular arithmetic operations [38][48] and [49].
In [7], they first described the formalized definition of PDP and proposed the original PDP schemes by utilizing the homomorphic verifiable tags that are constructed based on the public key cryptological technique.
Team CNS was visited by representatives from the Asymmetric Warfare Group (AWG), the Army Cryptological Office, the Center for Army Lessons Learned (CALL), the RC-S commander, and the 504th BfSB commander.
Examples of such controls are firewalls for information systems, fire alarms and sprinkler systems, firefighting training for personnel, storm hardening, physical security for critical records, awareness and de-escalation training for personnel to mitigate the potential for workplace violence, seismic upgrades in earthquake prone locations, physical security items such as badges and entrance control procedures, flood alarms, locating cryptological functions in secure areas, virus protection, surge protectors for vulnerable circuits, and low battery alarms (Rosenthal and Sheiniuk, 1993; NyBlom, 2003).
The two cryptological linguist recruits were both shifted to become parachute and fabrication specialists.
An hour or so onwards is the National Cryptological Museum, which boasts a genuine Enigma machine, the one British boffins cracked to get at top-level Nazi communications, a move said to have shortened World War Two by at least a year.
The MC-12W has two pilots, a sensor operator and a cryptological operator.
Instead of using the bottom-up approach - building from the necessary mathematical foundations towards their cryptographic application, we opted for a top-down approach--representing cryptological principles in the context of their practical application with the aim of provoking the interest for mastering the underpinning mathematical principles.

Full browser ?