slovo | definícia |
encryption (mass) | encryption
- šifrovanie |
encryption (encz) | encryption,šifrování jk |
encryption (encz) | encryption,zašifrování n: Zdeněk Brož |
encryption (gcide) | encryption \encryption\ n.
the process of converting messages in ordinary language, or
other information into a secret coded form that cannot be
interpreted without knowing the secret method for
interpretation, called the key.
Note: Encryption is used commonly to allow messages to be
transmitted between parties at a distance without
permitting others to read and understand the message.
It is also used to make data more secure from possible
discovery and uninterpretable by unauthorized people
accessing the data. In order to read an encrypted
message, a party normally requires knowledge of both
the method of encryption and the secret key, which may
be a single word or more complex sequence of
characters. Until recently, transmission of such secret
messages required that the key be transmitted secretly
by some seecure and reliable method to the party
receiving the message. More recently, a mathematical
method was discovered to allow a party to publish an
encoding key (the public key) which allows anyone to
encode a message, but the message thus encoded can only
be decoded by the person possessing a corresponding
key, called the private key. This two-key system is
called the public-key encryption method.
Syn: encoding, coding, enciphering, ciphering, cyphering,
writing in code.
[WordNet 1.5] |
encryption (wn) | encryption
n 1: the activity of converting data or information into code
[syn: encoding, encryption] |
encryption (foldoc) | encryption
Any procedure used in cryptography
to convert plaintext into ciphertext (encrypted message)
in order to prevent any but the intended recipient from
reading that data.
Schematically, there are two classes of encryption primitives:
public-key cryptography and private-key cryptography; they
are generally used complementarily.
Public-key encryption algorithms include RSA;
private-key algorithms include the obsolescent {Data Encryption
Standard}, the Advanced Encryption Standard, as well as
RC4.
The Unix command crypt performs a weak form of encryption.
Stronger encryption programs include Pretty Good Privacy and
the GNU Privacy Guard.
Other closely related aspects of cryptograph include
message digests.
(2003-04-12)
|
| podobné slovo | definícia |
data encryption (encz) | data encryption, n: |
public-key encryption (gcide) | encryption \encryption\ n.
the process of converting messages in ordinary language, or
other information into a secret coded form that cannot be
interpreted without knowing the secret method for
interpretation, called the key.
Note: Encryption is used commonly to allow messages to be
transmitted between parties at a distance without
permitting others to read and understand the message.
It is also used to make data more secure from possible
discovery and uninterpretable by unauthorized people
accessing the data. In order to read an encrypted
message, a party normally requires knowledge of both
the method of encryption and the secret key, which may
be a single word or more complex sequence of
characters. Until recently, transmission of such secret
messages required that the key be transmitted secretly
by some seecure and reliable method to the party
receiving the message. More recently, a mathematical
method was discovered to allow a party to publish an
encoding key (the public key) which allows anyone to
encode a message, but the message thus encoded can only
be decoded by the person possessing a corresponding
key, called the private key. This two-key system is
called the public-key encryption method.
Syn: encoding, coding, enciphering, ciphering, cyphering,
writing in code.
[WordNet 1.5] |
data encryption (wn) | data encryption
n 1: (computer science) the encryption of data for security
purposes |
advanced encryption standard (foldoc) | Advanced Encryption Standard
Rijndael
(AES) The NIST's replacement for
the Data Encryption Standard (DES). The Rijndael
/rayn-dahl/ symmetric block cipher, designed by Joan Daemen
and Vincent Rijmen, was chosen by a NIST contest to be AES.
AES is Federal Information Processing Standard FIPS-197.
AES currently supports 128, 192 and 256-bit keys and
encryption blocks, but may be extended in multiples of 32
bits.
(http://csrc.nist.gov/CryptoToolkit/aes/).
{Rijndael home page
(http://esat.kuleuven.ac.be/~rijmen/rijndael/)}.
(2003-07-04)
|
data encryption algorithm (foldoc) | Data Encryption Algorithm
DEA
(DEA) An ANSI standard defined in ANSI X3.92-1981. It is
identical to the Data Encryption Standard (DES).
(1994-12-06)
|
data encryption key (foldoc) | Data Encryption Key
DEK
(DEK) Used for the encryption of message text and for the
computation of message integrity checks (signatures).
See cryptography.
(1994-12-06)
|
data encryption standard (foldoc) | Data Encryption Standard
DES
(DES) The NBS's popular, standard encryption algorithm.
It is a product cipher that operates on 64-bit blocks of
data, using a 56-bit key. It is defined in FIPS 46-1 (1988)
(which supersedes FIPS 46 (1977)). DES is identical to the
ANSI standard Data Encryption Algorithm (DEA) defined in
ANSI X3.92-1981.
DES has been implemented in VLSI. SunOS provides a des
command which can make use of DES hardware if fitted. Neither
the software nor the hardware are supposed to be distributed
outside the USA.
Unix manual pages: des(1), des(3), des(4).
(1994-12-06)
|
international data encryption algorithm (foldoc) | International Data Encryption Algorithm
(IDEA) A conventional encryption
algorithm, written by Xuejia Lai and James Massey, in 1992.
It is a block cipher, considered to be the best and most
secure available, and operates on 64-bit blocks with a 128 bit
key.
It is used by Pretty Good Privacy.
(1996-03-07)
|
microsoft point to point encryption (foldoc) | Microsoft Point to Point Encryption
MPPE
(MPPE) An encryption protocol that may be used
with PPTP to provide an encrypted connection.
(1998-09-24)
|
public-key encryption (foldoc) | public-key encryption
PKE
public-key cryptography
(PKE, Or "public-key cryptography") An
encryption scheme, introduced by Diffie and Hellman in 1976,
where each person gets a pair of keys, called the public key
and the private key. Each person's public key is published
while the private key is kept secret. Messages are encrypted
using the intended recipient's public key and can only be
decrypted using his private key. This is often used in
conjunction with a digital signature.
The need for sender and receiver to share secret information
(keys) via some secure channel is eliminated: all
communications involve only public keys, and no private key is
ever transmitted or shared.
Public-key encryption can be used for authentication,
confidentiality, integrity and non-repudiation.
RSA encryption is an example of a public-key cryptosystem.
{alt.security FAQ
(http://cis.ohio-state.edu/hypertext/faq/bngusenet/alt/security/top.html)}.
See also knapsack problem.
(1995-03-27)
|
rsa encryption (foldoc) | RSA encryption
A public-key cryptosystem for both
encryption and authentication, invented in 1977 by Ron
Rivest, Adi Shamir, and Leonard Adleman. Its name comes from
their initials.
The RSA algorithm works as follows. Take two large {prime
numbers}, p and q, and find their product n = pq; n is called
the modulus. Choose a number, e, less than n and {relatively
prime} to (p-1)(q-1), and find its reciprocal mod (p-1)(q-1),
and call this d. Thus ed = 1 mod (p-1)(q-1); e and d are
called the public and private exponents, respectively. The
public key is the pair (n, e); the private key is d. The
factors p and q must be kept secret, or destroyed. It is
difficult (presumably) to obtain the private key d from the
public key (n, e). If one could factor n into p and q,
however, then one could obtain the private key d. Thus the
entire security of RSA depends on the difficulty of factoring;
an easy method for factoring products of large prime numbers
would break RSA.
RSA FAQ (http://rsa.com/rsalabs/faq/faq_home.html).
(2004-07-14)
|
synchronous key encryption (foldoc) | synchronous key encryption
Data encryption using two
interlocking keys where enything encoded using one key may be
decoded using the other key. This means if someone makes one
of the two keys publicly available (as in {public-key
encryption}) and keeps the other private, then anyone may send
them a message or data that only they can decode, giving
privacy, and furthermore, the sender may also encrypt that
same message additionally with their own private key, making
it impossible to read without decoding first with *their*
__public__ key by the receiver, this gives authenticity.
It is a very powerful system. One cannot determine one key
from the other, nor can they crack the encryption by computing
all combinations, because, depending on the size of the keys
(sometimes as large as 1024 bytes, though having grown from
smaller versions in popular implementations of the software
which does this), the amount of computing power required to
crack the code is unavailable, even supercomputers would take
more than a hundred years to crack it.
PGP is a publicly availble software implementation written
by Phil Zimmermann.
(1994-10-10)
|
wireless encryption protocol (foldoc) | Wired Equivalent Privacy
WEP
Wireless Encryption Protocol
(WEP) IEEE 802.11:1999. A
cryptographic privacy algorithm, based on the RC4
encryption engine, used to provide confidentiality for
802.11 wireless networks. WEP is intended to provide
roughly the same level of confidentiality for wireless data as
a wired LAN (Ethernet), which is NOT protected by encryption.
WEP is often wrongly expanded as "Wireless Encryption
Protocol". WEP is a protocol that provides encryption
on wireless networks but that's not what it stands for.
(2017-07-05)
|
|