-
1 confidentiality algorithm
Безопасность: алгоритм сохранения конфиденциальности (информации)Универсальный англо-русский словарь > confidentiality algorithm
-
2 confidentiality algorithm
Англо-русский словарь по компьютерной безопасности > confidentiality algorithm
-
3 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
4 алгоритм сохранения конфиденциальности
Security: confidentiality algorithm (информации)Универсальный русско-английский словарь > алгоритм сохранения конфиденциальности
-
5 encryption
a) прибор шифрования (обозначение в схеме)b) (encryption)1) шифрование; зашифрование; операция (за) шифрования2) криптография; криптографическая защита; криптографическое сокрытие информации3) шифротекст- hardware encryption- hardware assisted encryptionАнгло-русский словарь по компьютерной безопасности > encryption
-
6 bulk encryption
"A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm."
См. также в других словарях:
Generic Security Service Algorithm for Secret Key Transaction — GSS TSIG (Generic Security Service Algorithm for Secret Key Transaction) is an authentication protocol for DNS, which is the extension to TSIG Protocol. The GSS TSIG is a frame work of GSS API to provide authentication, integrity and… … Wikipedia
NSA cryptography — The vast majority of the National Security Agency s work on encryption is classified, but from time to time NSA participates in standards processes or otherwise publishes information about its cryptographic algorithms. The NSA has categorized… … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia
CRYPTREC — is the Cryptography Research and Evaluation Committee set up by the Japanese Government to evaluate and recommend cryptographic techniques for government and industrial use. It is comparable in many respects to the European Union s NESSIE project … Wikipedia
IPsec — Internet Protocol Security (IPsec) is a suite of protocols for securing Internet Protocol (IP) communications by authenticating and/or encrypting each in a data stream. IPsec also includes protocols for cryptographic key establishment.… … Wikipedia
Pretty Good Privacy — Original author(s) Phil Zimmermann Developer(s) Phil Zimmermann Initial release In 1991 Written in Multi language … Wikipedia
Envaulting — otheruses4|envaulting, a novel cryptographic method for protecting the confidentiality and integrity of information|anoverview about traditional cryptographic technology in general|CryptographyEnvaulting is the process of transforming information … Wikipedia
Domain Name System Security Extensions — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP … Wikipedia
Internet security — is a branch of computer security[1] specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.[2] The Internet represents an insecure channel for exchanging information leading … Wikipedia