-
21 digital signature
"Data that binds a sender's identity to the information being sent. A digital signature may be bundled with any message, file, or other digitally encoded information, or transmitted separately. Digital signatures are used in public key environments and provide authentication and integrity services." -
22 signature
"Data that binds a sender's identity to the information being sent. A digital signature may be bundled with any message, file, or other digitally encoded information, or transmitted separately. Digital signatures are used in public key environments and provide authentication and integrity services." -
23 SRK
"On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive." -
24 asymmetric encryption
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
25 AE
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it."AE -
26 40-bit encryption
A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key. -
27 128-bit encryption
A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key. -
28 authenticator
"A data structure used by one party to prove that another party knows a secret key. In the Kerberos authentication protocol, authenticators include timestamps, to prevent replay attacks, and are encrypted with the session key issued by the Key Distribution Center (KDC)."مصدّق -
29 Secure Sockets Layer
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
30 SSL
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
31 hash algorithm
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1." -
32 hash function
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1." -
33 legend keys
Symbols in legends that show the patterns and colors assigned to the data series (or categories) in a chart. Legend keys appear to the left of legend entries. Formatting a legend key also formats the data marker that's associated with it. -
34 event
"An action or occurrence to which a program might respond. Examples include state changes, data transfers, key presses, and mouse movements." -
35 recovery agent
A person who is issued a public key certificate for the purpose of recovering user data that is encrypted with Encrypting File System (EFS). -
36 RSA
"A public-key encryption standard for Internet security. It is the default cryptographic service provider (CSP) for Microsoft Windows. It was patented by RSA Data Security, Inc. in 1977. This acronym derives from the last names of the inventors of the technology: Rivest, Shamir, and Adleman." -
37 symmetric encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
38 content header
"Part of the file structure of a Windows Media file that contains information necessary for a client computer to decompress and render the content data. In a packaged file, an additional content header exists and contains the key ID, content ID, and license acquisition URL. This content header can also include a required individualization version number and attributes defined by the content provider." -
39 bulk encryption
"A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm." -
40 Digital Signature Standard
A standard that uses the Digital Signature Algorithm (DSA) for its signature algorithm and Secure Hash Algorithm (SHA-1) as its message hash algorithm. DSA is a public-key cipher that is used only to generate digital signatures and cannot be used for data encryption.English-Arabic terms dictionary > Digital Signature Standard
См. также в других словарях:
Count Key Data — (CKD) is a disk data architecture. Each physical disk record consists of a count field, an optional key field, and a ( user ) data field with error correction/detection information appended to each field and gaps separating each field [1].… … Wikipedia
Data.gov.uk — is a UK Government project to open up almost all non personal data acquired for official purposes for free re use. Sir Tim Berners Lee and Professor Nigel Shadbolt are the two key figures behind the project.[1] Homepage of data.gov.uk … Wikipedia
Data profiling — is the process of examining the data available in an existing data source (e.g. a database or a file) and collecting statistics and information about that data. The purpose of these statistics may be to: Find out whether existing data can easily… … Wikipedia
Data Vault Modeling — is a database modeling method that is designed to provide historical storage of data coming in from multiple operational systems. It is also a method of looking at historical data that, apart from the modeling aspect, deals with issues such as… … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Data Intensive Computing — is a class of parallel computing applications which use a data parallel approach to processing large volumes of data typically terabytes or petabytes in size and typically referred to as Big Data. Computing applications which devote most of their … Wikipedia
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
Data integrity — in its broadest meaning refers to the trustworthiness of system resources over their entire life cycle. In more analytic terms, it is the representational faithfulness of information to the true state of the object that the information represents … Wikipedia
Key generation — is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Modern cryptographic systems include symmetric key algorithms (such as DES and AES) and public key algorithms… … Wikipedia
Data remanence — is the residual representation of data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that… … Wikipedia
Key performance indicator — Key Performance Indicators (KPI) are financial and non financial metrics used to help an organization define and measure progress toward organizational goals [ [http://management.about.com/cs/generalmanagement/a/keyperfindic.htm Key Performance… … Wikipedia