DictionaryForumContacts

   English
Terms for subject Microsoft containing Encryption | all forms | exact matches only
EnglishDanish
asymmetric encryptionasymmetrisk kryptering (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
128-bit encryption128-bit kryptering (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
40-bit encryption40-bit kryptering (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
128-bit SSL encryption128-bit SSL-kryptering (An encryption level used for SSL. The number refers to the length of the key, so the higher the number, the more difficult the encryption is to break)
BitLocker Drive EncryptionBitLocker-drevkryptering (A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components)
bulk encryptionmassekryptering (A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm)
data encryptiondatakryptering (The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party)
data encryption keydatakrypteringsnøgle (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
Device EncryptionEnhedskryptering (The out-of-the-box encryption capabilities that are automatically included on PCs running Windows RT.)
encryption keykrypteringsnøgle (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
encryption providerkrypteringsprovider (Software that provides encryption for sensitive data, such as passwords, in applications)
encryption settingkrypteringsindstilling (A configuration element that specifies a type of encryption, such as 128-, 56-, or 40-bit encryption)
full volume encryptionfuld kryptering af diskenhed (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key)
public key encryptionkryptering ved hjælp af offentlig nøgle (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
Rivest-Shamir-Adleman encryptionRSA-kryptering (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based)
RSA encryptionRSA-kryptering (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based)
secret key encryptionkryptering ved hjælp af hemmelig nøgle (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
symmetric encryptionsymmetrisk kryptering (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
TLS encryptionTLS-kryptering (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP))
Transport Layer Security encryptionTLS-kryptering (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP))