-
1 public key algorithm
"An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message." -
2 secret key encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
3 40-bit encryption
A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key. -
4 128-bit encryption
A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key. -
5 symmetric encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data."
См. также в других словарях:
decryption — decrypt de‧crypt [diː krɪpt] verb [transitive] COMPUTING to change a message or information that was written in computer code back into a form that can be read and understood by everyone: • Only key employees will be allowed to decrypt sensitive… … Financial and business terms
Key generator — A key generator is used in many cryptographic protocols to generate a sequence with many pseudo random characteristics. This sequence is used as an encryption key at one end of communication, and as a decryption key at the other.Examples: linear… … Wikipedia
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
decryption — noun the activity of making clear or converting from code into plain text a secret key or password is required for decryption • Syn: ↑decoding, ↑decipherment • Derivationally related forms: ↑decipher (for: ↑decipherment), ↑ … Useful english dictionary
decryption — n. act of decoding data with the aid of a secret key or password (Computers) … English contemporary dictionary
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
AACS encryption key controversy — A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing demand letters[1] to websites… … Wikipedia
Symmetric-key algorithm — Symmetric key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.The encryption key is trivially related to the decryption key, in that they may … Wikipedia
Pirate decryption — most often refers to the reception of compromised pay TV or pay radio signals without authorization from the original broadcaster. The term pirate in this case is used in the sense of copyright infringement and has little or nothing to do with… … Wikipedia
Media Key Block — The Media Key Block (MKB) is one of the keys that are included inside the copying protection system (DRM) AACS. This system is used to protect Blu ray and HD DVD formats from being copied. The system has been developed by big companies from the… … Wikipedia