Перевод: со всех языков на арабский

с арабского на все языки

security+of+a+key+ru

  • 1 key

    "In IP security (IPSec), a value used in combination with an algorithm to encrypt or decrypt data. Key settings for IPSec are configurable to provide greater security."

    English-Arabic terms dictionary > key

  • 2 security support component

    "A hardware-based security facility that implements cryptosystems, random number generation, and key storage."

    English-Arabic terms dictionary > security support component

  • 3 network security key

    A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key.

    English-Arabic terms dictionary > network security key

  • 4 Public Key Cryptography Standards

    "A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc."

    English-Arabic terms dictionary > Public Key Cryptography Standards

  • 5 Internet Key Exchange

    A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec).

    English-Arabic terms dictionary > Internet Key Exchange

  • 6 Pairwise Master Key

    A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process.

    English-Arabic terms dictionary > Pairwise Master Key

  • 7 master secret

    A security key generated by the master secret server when an Enterprise Single Sign-On (SSO) Administrator requests it. This secret key is stored in the registry as a Local Security Authority (LSA) secret on the master secret server. Only SSO Administrators can access this secret key.

    English-Arabic terms dictionary > master secret

  • 8 ar-sa مسؤولية حالية

    "An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases."

    English-Arabic terms dictionary > ar-sa مسؤولية حالية

  • 9 elliptic curve cryptography

    "An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases."

    English-Arabic terms dictionary > elliptic curve cryptography

  • 10 RSA

    "A public-key encryption standard for Internet security. It is the default cryptographic service provider (CSP) for Microsoft Windows. It was patented by RSA Data Security, Inc. in 1977. This acronym derives from the last names of the inventors of the technology: Rivest, Shamir, and Adleman."

    English-Arabic terms dictionary > RSA

  • 11 health certificate

    "An X.509 certificate that asserts the health of a client computer. Client computers can use this certificate to prove their identities and health through security services and mechanisms such as Internet Protocol security (IPsec) and Internet Key Exchange (IKE), which recognize the X.509 standard."

    English-Arabic terms dictionary > health certificate

  • 12 Secure Sockets Layer

    "The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation."

    English-Arabic terms dictionary > Secure Sockets Layer

  • 13 SSL

    "The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation."

    English-Arabic terms dictionary > SSL

  • 14 dongle

    A security device connected to an input/output port to permit the use of a particular software package on that computer. The use of the hardware key hash permits backup copying of software but prevents its unlicensed use on additional computers.

    English-Arabic terms dictionary > dongle

  • 15 S/MIME

    An Internet e-mail security-oriented protocol that adds public key encryption and support for digital signatures to the widely used MIME e-mail protocol.
    S/MIME

    English-Arabic terms dictionary > S/MIME

  • 16 Secure/Multipurpose Internet Mail Extensions

    An Internet e-mail security-oriented protocol that adds public key encryption and support for digital signatures to the widely used MIME e-mail protocol.
    ملحقات بريد الإنترنت متعددة الأغراض/آمنة

    English-Arabic terms dictionary > Secure/Multipurpose Internet Mail Extensions

  • 17 Wired Equivalent Privacy

    "An encryption algorithm system included as part of the 802.11 standard, developed by the Institute of Electrical and Electronics Engineers as a security measure to protect wireless LANs from casual eavesdropping. WEP uses a shared secret key to encrypt packets before transmission between wireless LAN devices and monitors packets in transit to detect attempts at modification. WEP offers both 40-bit and 128-bit hardware-based encryption options."

    English-Arabic terms dictionary > Wired Equivalent Privacy

  • 18 WEP

    "An encryption algorithm system included as part of the 802.11 standard, developed by the Institute of Electrical and Electronics Engineers as a security measure to protect wireless LANs from casual eavesdropping. WEP uses a shared secret key to encrypt packets before transmission between wireless LAN devices and monitors packets in transit to detect attempts at modification. WEP offers both 40-bit and 128-bit hardware-based encryption options."

    English-Arabic terms dictionary > WEP

  • 19 PMK

    A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process.

    English-Arabic terms dictionary > PMK

  • 20 certificate issuance policy

    A set of rules that defines all the security-relevant requirements (such as key management and authentication levels) that must be met when certificates are issued to users.

    English-Arabic terms dictionary > certificate issuance policy

См. также в других словарях:

  • Internet Security Association and Key Management Protocol — ISAKMP (Internet Security Association and Key Management Protocol) is a protocol for establishing Security Associations (SA) and cryptographic keys in an Internet environment. The protocol is defined by RFC 2408. Overview ISAKMP defines the… …   Wikipedia

  • Internet Security Association and Key Management Protocol — ISAKMP im TCP/IP‑Protokollstapel: Anwendung ISAKMP Transport UDP TCP Internet IP (IPv4, IPv6) Netzzugang Ethernet …   Deutsch Wikipedia

  • Internet Security Association and Key Management Protocol — (ISAKMP) es un protocolo criptográfico que constituye la base del protocolo de intercambio de claves IKE. Está definido en el RFC 2408. ISAKMP define los procedimientos para la autenticación entre pares, creación y gestión de asociaciones de… …   Wikipedia Español

  • Security token — Several types of security tokens with a penny for scale …   Wikipedia

  • Security interest — A security interest is a property interest created by agreement or by operation of law over assets to secure the performance of an obligation, usually the payment of a debt.[1] It gives the beneficiary of the security interest certain… …   Wikipedia

  • Security Association — Eine Security Association (SA, dt. Sicherheitsverbindung) ist eine Vereinbarung zwischen zwei kommunizierenden Einheiten in Rechnernetzen. Sie beschreibt, wie die beiden Parteien Sicherheitsdienste anwenden werden, um sicher miteinander… …   Deutsch Wikipedia

  • Key money — is used differently in different parts of the world. It sometimes means money paid to an existing tenant who assigns a lease to a new tenant where the rent is below market. It sometimes means a bribe to a landlord. In other parts of the world it… …   Wikipedia

  • Key management — is a term used to describe two different fields; (1) cryptography, and (2) physical key management (or electronic key management) within building or campus access control.In cryptography, key management includes all of the provisions made in a… …   Wikipedia

  • Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… …   Wikipedia

  • KEY-Record — KEY Resource Records dienen der Propagierung öffentlicher Schlüssel durch DNS. KEY Records wurden im Rahmen von DNSSEC (DNS Security) verwendet, ab 2004 aber durch die nahezu identischen DNSKEY Resource Records ersetzt. Inhaltsverzeichnis 1… …   Deutsch Wikipedia

  • Security protocol notation — Security (engineering) protocol notation is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network. In the context of a formal model, it allows reasoning about the properties of such a… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»