-
1 data encryption key
A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data. -
2 Data Encryption Standard
"An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key." -
3 encryption key
A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data. -
4 secret key encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
5 public key encryption
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
6 asymmetric encryption
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
7 Public Key Cryptography Standards
"A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc."English-Arabic terms dictionary > Public Key Cryptography Standards
-
8 40-bit encryption
A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key. -
9 128-bit encryption
A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key. -
10 symmetric encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
11 asymmetric key algorithm
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
12 bulk encryption
"A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm." -
13 Secure Sockets Layer
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
14 SSL
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
15 Digital Signature Standard
A standard that uses the Digital Signature Algorithm (DSA) for its signature algorithm and Secure Hash Algorithm (SHA-1) as its message hash algorithm. DSA is a public-key cipher that is used only to generate digital signatures and cannot be used for data encryption.English-Arabic terms dictionary > Digital Signature Standard
-
16 DSS
A standard that uses the Digital Signature Algorithm (DSA) for its signature algorithm and Secure Hash Algorithm (SHA-1) as its message hash algorithm. DSA is a public-key cipher that is used only to generate digital signatures and cannot be used for data encryption. -
17 AE
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it."AE -
18 RSA
"A public-key encryption standard for Internet security. It is the default cryptographic service provider (CSP) for Microsoft Windows. It was patented by RSA Data Security, Inc. in 1977. This acronym derives from the last names of the inventors of the technology: Rivest, Shamir, and Adleman."
См. также в других словарях:
Data Encryption Key — [dt. »Datenschlüssel«], Schlüssel, Datenverschlüsselung … Universal-Lexikon
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Data encryption standard — Pour les articles homonymes, voir DES. DES (Data Encryption Standard) … Wikipédia en Français
data encryption — Process of disguising information as ciphertext, or data that will be unintelligible to an unauthorized person. Decryption is the process of converting ciphertext back into its original format, sometimes called plaintext (see cryptography).… … Universalium
Data Encryption Standard — DES Eine Feistel Runde (F Funktion) Entwickler IBM Veröffentlicht 1975 Abgeleitet von … Deutsch Wikipedia
Data Encryption Algorithm — DES Eine Feistel Runde (F Funktion) Entwickler IBM Veröffentlicht 1975 Abgeleitet von Lucifer … Deutsch Wikipedia
Data Encryption Standard — Pour les articles homonymes, voir DES. DES (Data Encryption Standard) fonction F de DES … Wikipédia en Français
data encryption standard — (DES) Symmetric, single key encryption algorithm approved by the US National Bureau of Standards for encrypting and decrypting data. Used to protect highly sensitive data such as financial transactions and US government business. With… … IT glossary of terms, acronyms and abbreviations
Data Encryption Standard — (Computers) American standard for encoding data that uses a private key algorithm (encodes data in a manner that is extremely difficult to crack) … English contemporary dictionary
encryption key — A unique and secret number used to encrypt data to protect it from unauthorized access … Dictionary of networking
International Data Encryption Algorithm — IDEA An encryption round of IDEA General Designers Xuejia Lai and James Massey … Wikipedia