-
1 symmetric encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
2 secret key encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
3 40-bit encryption
A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key. -
4 128-bit encryption
A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key. -
5 public key algorithm
"An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message." -
6 FTPS
An extension to the File Transfer Protocol (FTP) that supplies secure data communication through data encryption and decryption. -
7 FTP over SSL
An extension to the File Transfer Protocol (FTP) that supplies secure data communication through data encryption and decryption.
См. также в других словарях:
Encryption software — is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Contents 1 Security 2… … Wikipedia
encryption — n. The practice of converting information into code that can only be deciphered with a key. The Essential Law Dictionary. Sphinx Publishing, An imprint of Sourcebooks, Inc. Amy Hackney Blackwell. 2008. encryption … Law dictionary
Encryption — Encrypt redirects here. For the film, see Encrypt (film). This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography. In cryptography, encryption is the process of… … Wikipedia
encryption — encrypt en‧crypt [ɪnˈkrɪpt] verb [transitive] COMPUTING to write information in the form of code, especially to prevent certain people from being able to use it: • The program encrypts your password when you use the software for the first time.… … Financial and business terms
decryption — decrypt de‧crypt [diː krɪpt] verb [transitive] COMPUTING to change a message or information that was written in computer code back into a form that can be read and understood by everyone: • Only key employees will be allowed to decrypt sensitive… … Financial and business terms
Encryption layer in storage stack — There is a plurality of terms that are used to describe implementations of disk encryption: on the fly encryption (OTFE); full disk encryption (FDE), whole disk encryption; filesystem level encryption, encrypted filesystem, cryptographic… … Wikipedia
encryption — The process of encoding information in an attempt to make it secure from unauthorized access, particularly during transmission. There verse of this process is known as decryption. Two main encryption schemes are in common use: • Private… … Dictionary of networking
decryption — noun The process reversing an encryption, i.e. the process which converts encrypted data into its original form. Ant: encryption See Also: decrypt … Wiktionary
decryption — The process of converting encrypted data back into its original form. See also encryption … Dictionary of networking
Pirate decryption — most often refers to the reception of compromised pay TV or pay radio signals without authorization from the original broadcaster. The term pirate in this case is used in the sense of copyright infringement and has little or nothing to do with… … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia