DictionaryForumContacts

   Dutch
Terms for subject Microsoft containing sleutel | all forms | exact matches only
DutchEnglish
afgeleide sleutelderived key (A cryptographic key created by a call to CryptDeriveKey. A derived key can be created from a password, or any other user data. Derived keys allow applications to create session keys as needed, eliminating the need to store a particular key)
algoritme van asymmetrische sleutelasymmetric key algorithm (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
algoritme van openbare sleutelpublic key algorithm (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
alternatieve sleutelalternate key (A candidate key that is not designated as the primary key and is used to uniquely identify records in a database table)
certificaat voor de infrastructuur van openbare sleutelsPublic Key Infrastructure certificate (A system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction)
cryptische sleutelcrypto key (A piece of data that is required to initialize a cryptographic algorithm)
cryptografische sleutelcryptographic key (A piece of data that is required to initialize a cryptographic algorithm)
escrow-sleutel voor versleutelingcrypto escrow key (A secondary encryption key that provides the ability for an authorized IT Helpdesk administrator to open an encrypted document when the password is lost)
externe sleutelexternal key (A file that contains information to access cryptographically locked data, which is stored away from the system, such as on a USB flash drive)
geheime sleutelsecret key (A symmetric encryption key shared by two entities, such as between a user and the domain controller (DC), with a long lifetime. A password is a common example of a secret key. When used in a context that implies Kerberos only, a principal's secret key)
lege sleutelclear key (The key that is stored unencrypted on the disk volume. This key is used to freely access the volume master key, and in turn, the full volume encryption key when BitLocker Drive Encryption protection is disabled but the disk volume remains encrypted)
natuurlijke sleutelnatural key (A primary key or alternate key whose values identify objects in the real world)
openbare sleutelpublic key (The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key)
openbare sleutelpublic key (The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key)
persoonlijke sleutelprivate key (The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key)
primaire sleutelprimary key (One or more fields that uniquely identify each record in a table. In the same way that a license plate number identifies a car, the primary key uniquely identifies a record)
refererende sleutelreferencing key (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.")
refererende sleutelforeign key (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.")
refererende sleutelFK (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.")
samengestelde sleutelcomposite key (A key whose definition consists of two or more fields in a file, columns in a table, or attributes in a relation)
sleutel-idkey ID (A value that identifies the key for a packaged Windows Media file)
sleutel-waardepaarkey-value pair (A set of data items that contains a unique identifier, called a key, and a value that is the actual data for the key)
symmetrische sleutelsymmetric key (The cryptographic key used to both encrypt and decrypt protected content during publishing and consumption)
vernieuwing op basis van sleutelskey-based renewal (A method of renewing a certificate using the existing key material as the sole form of authentication)
versleuteling met geheime sleutelsecret key encryption (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
Vooraf gedeelde sleutelPre-shared key (An option that allows the user to view the code that can be used to authenticate IPSec/L2TP connections (typically VPN connections))
vooraf gedefinieerde sleutelpredefined key (A key that represents one of the main divisions of the registry. Each predefined key is displayed in a separate Registry Editor window, with the key's name appearing in the window's title bar. For example, HKEY_CLASSES_ROOT is a predefined key)