-
1 40-bit encryption
A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key. -
2 128-bit encryption
A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key. -
3 encryption key
A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data. -
4 Data Encryption Standard
"An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key." -
5 data encryption key
A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data. -
6 SGC
"An extension of the Secure Sockets Layer (SSL) that allows financial institutions with export versions of Microsoft Windows 2000 Server to use 128-bit encryption. Although SGC capabilities are built into Windows 2000 Server, a special SGC certificate is required to use SGC." -
7 Server Gated Cryptography
"An extension of the Secure Sockets Layer (SSL) that allows financial institutions with export versions of Microsoft Windows 2000 Server to use 128-bit encryption. Although SGC capabilities are built into Windows 2000 Server, a special SGC certificate is required to use SGC." -
8 Wired Equivalent Privacy
"An encryption algorithm system included as part of the 802.11 standard, developed by the Institute of Electrical and Electronics Engineers as a security measure to protect wireless LANs from casual eavesdropping. WEP uses a shared secret key to encrypt packets before transmission between wireless LAN devices and monitors packets in transit to detect attempts at modification. WEP offers both 40-bit and 128-bit hardware-based encryption options." -
9 WEP
"An encryption algorithm system included as part of the 802.11 standard, developed by the Institute of Electrical and Electronics Engineers as a security measure to protect wireless LANs from casual eavesdropping. WEP uses a shared secret key to encrypt packets before transmission between wireless LAN devices and monitors packets in transit to detect attempts at modification. WEP offers both 40-bit and 128-bit hardware-based encryption options." -
10 DES
"An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key." -
11 DEK
A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data.
См. также в других словарях:
40-bit encryption — refers to a key size of forty bits, or five bytes, for symmetric encryption; this represents a relatively low level of security. A forty bit length corresponds to a total of 2^{40} possible keys. Although this is a large number in human terms… … Wikipedia
Encryption software — is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Contents 1 Security 2… … Wikipedia
Bit manipulation — is the act of algorithmically manipulating bits or other pieces of data shorter than a byte. Programming tasks that require bit manipulation include low level device control, error detection and correction algorithms, encryption algorithms, and… … Wikipedia
Encryption Control Protocol — Das Protokoll ECP (Encryption Control Protocol) ist ein Begriff aus der Informatik. ECP ermöglicht bei einer PPP (Point to Point Protocol) eine Verschlüsselung. Beispielsweise wird mittels 3DESE (Triple DES Encryption Protocol Extension) eine… … Deutsch Wikipedia
encryption — The process of encoding information in an attempt to make it secure from unauthorized access, particularly during transmission. There verse of this process is known as decryption. Two main encryption schemes are in common use: • Private… … Dictionary of networking
Bit-flipping attack — A bit flipping attack is an attack on a cryptographic cipher in which the attacker can change the ciphertext in such a way as to result in a predictable change of the plaintext, although the attacker is not able to learn the plaintext itself.… … Wikipedia
Bit Torrent — BitTorrent (protocole) Pour les articles homonymes, voir BitTorrent. BitTorrent est un protocole de transfert de données Pair à pair (P2P) à travers un réseau informatique. Le protocole a été conçu en avril 2001 et mis en place à l été 2002… … Wikipédia en Français
Bit torrent — BitTorrent (protocole) Pour les articles homonymes, voir BitTorrent. BitTorrent est un protocole de transfert de données Pair à pair (P2P) à travers un réseau informatique. Le protocole a été conçu en avril 2001 et mis en place à l été 2002… … Wikipédia en Français
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Advanced Encryption Standard — Infobox block cipher name = AES caption = The SubBytes step, one of four stages in a round of AES designers = Vincent Rijmen, Joan Daemen publish date = 1998 derived from = Square derived to = Anubis, Grand Cru related to = certification = AES… … Wikipedia
Format-preserving encryption — In cryptography, format preserving encryption (FPE) refers to encrypting in such a way that the output (the ciphertext) is in the same format as the input (the plaintext). The meaning of format varies. Typically only finite domains are discussed … Wikipedia