Subject | English | Czech |
comp., MS | Advanced Encryption Standard A cryptographic algorithm specified by the National Institute of Standards and Technology (NIST) to protect sensitive information | standard AES (Advanced Encryption Standard) |
comp., MS | asymmetric encryption | asymetrické šifrování (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
comp., MS | 128-bit encryption | 128bitové šifrování (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
comp., MS | 40-bit encryption | 40bitové šifrování (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
comp., MS | BitLocker Drive Encryption | nástroj BitLocker Drive Encryption (A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components) |
comp., MS | BitLocker on-write encryption | postupné šifrování BitLocker při zapisování (A BitLocker feature that incrementally encrypts the hard drive as free space is used) |
comp., MS | bulk encryption | hromadné šifrování (A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm) |
comp., MS | data encryption | šifrování dat (The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party) |
comp., MS | Data Encryption Standard An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key | algoritmus DES (Data Encryption Standard) |
comp., MS | Device Encryption | Šifrování zařízení (The out-of-the-box encryption capabilities that are automatically included on PCs running Windows RT.) |
comp., MS | device encryption | šifrování zařízení (The use of encryption to protect local device data from offline hardware attacks) |
commun., IT | encryption box | šifrovací zařízení |
comp., MS | Encryption Control Protocol The Network Control Protocol for negotiating the use of encryption over PPP links. ECP is defined in RFC 1968 | protokol ECP (Encryption Control Protocol) |
commun., IT | encryption device | šifrovací zařízení |
comp., MS | encryption key | šifrovací klíč (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
comp., MS | encryption provider | zprostředkovatel šifrování (Software that provides encryption for sensitive data, such as passwords, in applications) |
commun., IT | encryption unit | šifrovací zařízení |
comp., MS | full volume encryption | úplné šifrování svazků (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key) |
comp., MS | full volume encryption key | šifrovací klíč celého svazku (The algorithm-specific key that is used to encrypt (and optionally, diffuse) data on disk sectors. Currently, this key can be either 128 bits or 256 bits advanced encryption standard (AES). The default encryption algorithm that BitLocker Drive Encryption uses is AES 128 bit with diffuser) |
comp., MS | public key encryption | šifrování s veřejným klíčem (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
comp., MS | Rivest-Shamir-Adleman encryption The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based | šifrování RSA (Rivest-Shamir-Adleman) |
comp., MS | RSA encryption | šifrování RSA (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based) |
comp., MS | secret key encryption | šifrování s tajným klíčem (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
comp., MS | symmetric encryption | symetrické šifrování (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
comp., MS | TLS encryption | šifrování TLS (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP)) |
comp., MS | Triple Data Encryption Standard An encryption algorithm based on the Data Encryption Standard (DES) | algoritmus 3DES (Triple Data Encryption Standard) |