-
1 encryption key
A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data. -
2 data encryption key
A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data. -
3 Key Management Service
"An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures." -
4 key
"In encryption, authentication, and digital signatures, a value used in combination with an algorithm to encrypt or decrypt information." -
5 secret key
"A symmetric encryption key shared by two entities, such as between a user and the domain controller (DC), with a long lifetime. A password is a common example of a secret key. When used in a context that implies Kerberos only, a principal's secret key." -
6 crypto escrow key
A secondary encryption key that provides the ability for an authorized IT Helpdesk administrator to open an encrypted document when the password is lost. -
7 secret key encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
8 public key encryption
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
9 asymmetric encryption
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
10 Public Key Cryptography Standards
"A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc."English-Arabic terms dictionary > Public Key Cryptography Standards
-
11 Data Encryption Standard
"An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key." -
12 symmetric encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
13 40-bit encryption
A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key. -
14 128-bit encryption
A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key. -
15 RSA encryption
"The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based." -
16 public key algorithm
"An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message." -
17 asymmetric key algorithm
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
18 BitLocker recovery key
A special key that you can create when you turn on Bitlocker Drive Encryption for the first time on each drive that you encrypt. -
19 bulk encryption
"A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm." -
20 full volume encryption
"The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key."
- 1
- 2
См. также в других словарях:
Encryption Key — [engl.], Schlüssel … Universal-Lexikon
key encryption key — raktų šifravimo raktas statusas T sritis informatika apibrėžtis ↑Raktas (3), naudojamas kitiems raktams apsaugoti. Tai dažniausiai ↑simetrinis raktas, kuriuo šifruojami ↑individualieji, ↑grupiniai, ↑seanso ar kt. raktai. atitikmenys: angl. key… … Enciklopedinis kompiuterijos žodynas
key-encryption key — raktų šifravimo raktas statusas T sritis informatika apibrėžtis ↑Raktas (3), naudojamas kitiems raktams apsaugoti. Tai dažniausiai ↑simetrinis raktas, kuriuo šifruojami ↑individualieji, ↑grupiniai, ↑seanso ar kt. raktai. atitikmenys: angl. key… … Enciklopedinis kompiuterijos žodynas
encryption key — A unique and secret number used to encrypt data to protect it from unauthorized access … Dictionary of networking
AACS encryption key controversy — A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing demand letters[1] to websites… … Wikipedia
Data Encryption Key — [dt. »Datenschlüssel«], Schlüssel, Datenverschlüsselung … Universal-Lexikon
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
encryption — The process of encoding information in an attempt to make it secure from unauthorized access, particularly during transmission. There verse of this process is known as decryption. Two main encryption schemes are in common use: • Private… … Dictionary of networking
encryption — encrypt en‧crypt [ɪnˈkrɪpt] verb [transitive] COMPUTING to write information in the form of code, especially to prevent certain people from being able to use it: • The program encrypts your password when you use the software for the first time.… … Financial and business terms
Key generator — A key generator is used in many cryptographic protocols to generate a sequence with many pseudo random characteristics. This sequence is used as an encryption key at one end of communication, and as a decryption key at the other.Examples: linear… … Wikipedia