-
1 cryptographic service provider
"An independent software module that actually performs cryptography algorithms for authentication, encoding, and encryption."English-Arabic terms dictionary > cryptographic service provider
-
2 cryptographic digest
The result of a one-way hash function that takes a variable-length input string and converts it to a fixed-length output string. This fixed-length output string is probabilistically unique for every different input string and thus can act as a fingerprint of a file. It can be used to determine whether a file was tampered with. -
3 cryptographic set
A specific group of cryptography settings. -
4 cryptographic agility
"The ability of software to support customer-preferred algorithms for encryption, hashing, entropy and digital signatures." -
5 Base Smart Card Cryptographic Service Provider
"The basic software module for by smart cards that performs cryptography and includes algorithms for authentication, encoding, and encryption."English-Arabic terms dictionary > Base Smart Card Cryptographic Service Provider
-
6 CAPI
An (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as (CSPs). -
7 CryptoAPI
An (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as (CSPs). -
8 Cryptography Application Programming Interface
An (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as (CSPs).English-Arabic terms dictionary > Cryptography Application Programming Interface
-
9 PKCS #7
"The Cryptographic Message Syntax Standard. It is a general syntax, developed and maintained by RSA Data Security, Inc., for data to which cryptography may be applied, such as digital signatures and encryption. It also provides a syntax for disseminating certificates or certificate revocation lists."PKCS#7 -
10 private key
"The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key." -
11 public key
"The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key." -
12 RSA
"A public-key encryption standard for Internet security. It is the default cryptographic service provider (CSP) for Microsoft Windows. It was patented by RSA Data Security, Inc. in 1977. This acronym derives from the last names of the inventors of the technology: Rivest, Shamir, and Adleman." -
13 content key
The cryptographic key used to both encrypt and decrypt protected content during publishing and consumption. -
14 Public Key Cryptography Standards
"A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc."English-Arabic terms dictionary > Public Key Cryptography Standards
-
15 crypto-accelerator board
A hardware device that speeds up cryptographic operations by offloading operations to a special processor on the board.لوحة مسرّعة للتشفير -
16 Data Protection API
"A set of routines, protocols, and tools that provides information confidentiality to user and system processes by applying password-based cryptographic protection at the local operating system level." -
17 X.509 certificate
A cryptographic certificate that contains a vendor's unique name and the public key.شهادة X.509 -
18 Advanced Encryption Standard
A cryptographic algorithm specified by the National Institute of Standards and Technology (NIST) to protect sensitive information.English-Arabic terms dictionary > Advanced Encryption Standard
-
19 AES
A cryptographic algorithm specified by the National Institute of Standards and Technology (NIST) to protect sensitive information. -
20 SRK
"On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive."
- 1
- 2
См. также в других словарях:
Cryptographic — Cryp to*graph ic (kr?p t? gr?f ?k), Cryptographical Cryp to*graph ic*al (kr?p t? gr?f ? kal), a. Relating to cryptography; written in secret characters or in cipher, or with sympathetic ink. [1913 Webster] … The Collaborative International Dictionary of English
cryptographic — adjective Relating to cryptography. The cryptographic community includes both cryptographers (those who make codes) and cryptanalysts (those who break codes) … Wiktionary
cryptographic — cryptography ► NOUN ▪ the art of writing or solving codes. DERIVATIVES cryptographer noun cryptographic adjective … English terms dictionary
Cryptographic primitive — Cryptographic primitives are well established, low level cryptographic algorithms that are frequently used to build computer security systems. These routines include, but are not limited to, one way hash functions and encryption functions.… … Wikipedia
Cryptographic engineering — is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic… … Wikipedia
Cryptographic Service Provider — (CSP) sind Komponenten (Software /Programmibliotheken) der Windows Betriebssysteme von Microsoft. Jeder CSP implementiert Funktionen der Microsoft Cryptographic API (MS CryptoAPI). Diese API bietet Programmen kryptografische Funktionen zum… … Deutsch Wikipedia
Cryptographic Test Correction — is a technique, published in 2008 by Eric Levieil and David Naccache [1] for shifting the burden of correcting Multiple Choice Questionnaires (MQC) to examinees. Because the corrector is only interested in the number of correct answers and not in … Wikipedia
Cryptographic Service Provider — (ou « CSP ») est une bibliothèque logicielle de fonctions fournie par Microsoft ou un éditeur tiers. Tout programme en C (ou C++) peut utiliser les fonctions cryptographiques fournies le CSP par l intermédiaire de l interface de… … Wikipédia en Français
Cryptographic log on — (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user s identification to a workstation and network. It replaces the username and passwords for identifying and… … Wikipedia
Cryptographic Message Syntax — (CMS) ist ein Standard vom IETF für gesicherte kryptographische Mitteilungen. CMS ist die Obermenge des PKCS #7 (Public Key Cryptography Standards #7) welche auf S/MIME aufsetzt. Der Version 2 lag der gleiche Standard zugrunde. Ab Version 3… … Deutsch Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia