-
1 encrypt in key
Англо-русский словарь по компьютерной безопасности > encrypt in key
-
2 encrypt only key
ключ (только для) зашифрованияАнгло-русский словарь по компьютерной безопасности > encrypt only key
-
3 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
4 encrypt a message with a secret key
шифровать сообщение с помощью секретного ключа
—
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > encrypt a message with a secret key
-
5 key
"In IP security (IPSec), a value used in combination with an algorithm to encrypt or decrypt data. Key settings for IPSec are configurable to provide greater security." -
6 key
"In encryption, authentication, and digital signatures, a value used in combination with an algorithm to encrypt or decrypt information." -
7 public key algorithm
"An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message." -
8 public key encryption
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
9 asymmetric key algorithm
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
10 (to) encrypt
(to) encrypt /ɪnˈkrɪpt/ (tel.)v. t.criptare; cifrare; crittografareencrypteda.criptato; cifrato; crittografatoencryptionn.1 (il) criptare; criptaggio; cifratura -
11 (to) encrypt
(to) encrypt /ɪnˈkrɪpt/ (tel.)v. t.criptare; cifrare; crittografareencrypteda.criptato; cifrato; crittografatoencryptionn.1 (il) criptare; criptaggio; cifratura -
12 secret key encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
13 content key
The cryptographic key used to both encrypt and decrypt protected content during publishing and consumption. -
14 BitLocker recovery key
A special key that you can create when you turn on Bitlocker Drive Encryption for the first time on each drive that you encrypt. -
15 encryption key
A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data. -
16 data encryption key
A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data. -
17 code
-
18 asymmetric encryption
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
19 AE
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it."AE -
20 program
Англо-русский словарь по компьютерной безопасности > program
- 1
- 2
См. также в других словарях:
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia
Key generation — is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Modern cryptographic systems include symmetric key algorithms (such as DES and AES) and public key algorithms… … Wikipedia
encrypt — v. t. to convert ordinary language into code; to hide the meaning of a message by converting it into a form that cannot be interpreted without knowing the secret method for interpretation, called the key. Syn: encode, code, encipher, cipher,… … The Collaborative International Dictionary of English
encrypt — en‧crypt [ɪnˈkrɪpt] verb [transitive] COMPUTING to write information in the form of code, especially to prevent certain people from being able to use it: • The program encrypts your password when you use the software for the first time.… … Financial and business terms
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Key derivation function — KDF redirects here. For the Nazi organization, see Kraft durch Freude In cryptography, a key derivation function (or KDF) is a function which derives one or more secret keys from a secret value and/or other known information such as a password or … Wikipedia
key, cryptographic — Secret value used by a computer together with a complex algorithm to encrypt and decrypt messages. Since confidential messages might be intercepted during transmission or travel over public networks, they require encryption so that they will be… … Universalium
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Symmetric-key algorithm — Symmetric key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.The encryption key is trivially related to the decryption key, in that they may … Wikipedia
List of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA) . For classification of keys according to their usage see… … Wikipedia