-
1 private key
"The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key." -
2 key pair
A private key and its related public key. -
3 Key Management Service
"An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures." -
4 public key algorithm
"An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message." -
5 public key
"The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key." -
6 public key encryption
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
7 asymmetric key algorithm
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
8 Public Key Cryptography Standards
"A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc."English-Arabic terms dictionary > Public Key Cryptography Standards
-
9 endorsement key
"A key pair, consisting of a public key and a private key, which is used to verify that a TPM is genuine." -
10 storage root key
"On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive." -
11 digital envelope
"Private messages encrypted using the recipient's public key. Enveloped messages can only be decrypted by using the recipient's private key, allowing only the recipient to understand the message." -
12 asymmetric encryption
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it." -
13 AE
"A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it."AE -
14 certificate
"A digital document that is commonly used for authentication and to help secure information on a network. A certificate binds a public key to an entity that holds the corresponding private key. Certificates are digitally signed by the certification authority that issues them, and they can be issued for a user, a computer, or a service." -
15 digital certificate
"A digital document that is commonly used for authentication and to help secure information on a network. A certificate binds a public key to an entity that holds the corresponding private key. Certificates are digitally signed by the certification authority that issues them, and they can be issued for a user, a computer, or a service." -
16 trust anchor
The public key of the public/private key pair that is used to sign a DNS zone. -
17 CA compromise
A situation in which it is known or suspected that the CA's private key or other aspects of the CA validated in the certificate have been revealed. -
18 CAPI
An (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as (CSPs). -
19 CryptoAPI
An (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as (CSPs). -
20 Cryptography Application Programming Interface
An (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as (CSPs).English-Arabic terms dictionary > Cryptography Application Programming Interface
- 1
- 2
См. также в других словарях:
private key — One of two keys used in public key encryption. The user keeps the private key secret and uses it to encrypt digital signatures on out going messages and to decrypt incoming messages. See also public key encryption … Dictionary of networking
Private Key — Entschlüsselung mit geheimem Schlüssel Unter einem geheimen Schlüssel (englisch secret key) versteht man in der Kryptologie Schlüssel, die nur ihren legitimen Inhabern bekannt sein dürfen, und diese in die Lage versetzen, einen Geheimtext in… … Deutsch Wikipedia
private key — privatusis raktas statusas T sritis informatika apibrėžtis Vienas raktas iš raktų poros, naudojamas ↑kriptografijoje viešuoju raktu. Privatusis raktas laikomas paslaptyje ir yra naudojamas iššifruoti duomenims, kurie buvo ↑užšifruoti su jį… … Enciklopedinis kompiuterijos žodynas
private key cryptography — UK US noun [uncountable] business, computing a way of keeping Internet messages secret in which a single key (=letter or number) changes the message into code and back again Thesaurus: codes and codificationhyponym communicating by email or text… … Useful english dictionary
private key — noun The unpublished key in a cryptographic system that uses two keys. See Also: public key, public key cryptography … Wiktionary
private key — secret code, key used to decode messages which were encrypted using a suitable public key … English contemporary dictionary
Private\ Key — Privater, geheimer Schlüssel für die asymmetrische Verschlüsselung, der vom Client erzeugt wird Digitale Signatur, Public Key, Verschlüsselung … Online-Wörterbuch Deutsch-Lexikon
private key cryptography — UK / US noun [uncountable] business, computing a way of keeping Internet messages secret in which a single key (= letter or number) changes the message into code and back again … English dictionary
PRIVATE KEY — 1. закрытый ключ, используемый для расшифровки сообщений, зашифрованных открытым ключом; … Словарь электронного бизнеса
private key — … Useful english dictionary
Offline private key protocol — The offline private key protocol (OPKP) is a cryptographic protocol to prevent unauthorized access to back up or archive data. The protocol results in a public key that can be used to encrypt data and an offline private key that can later be used … Wikipedia