Subject | English | Danish |
comp., MS | public key | offentlig nøgle (The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key) |
comp., MS | public key algorithm | algoritme til offentlig nøgle (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
commun., IT | public key algorithm | offentlig nøglealgoritme |
comp., MS | public key algorithm | asymetrisk algoritme (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
IT | public key cryptography | asymmetrisk system |
IT | public key cryptography | to-nøgle system |
commun., IT | public key cryptography | public key-krypteringssystem |
commun., IT | public key cryptography | public key-kryptering |
commun., IT | public key cryptography | offentlig nøgle-kryptering |
IT | public key cryptography | kryptografi,der benytter offentlig nøgle |
IT | public key cryptography | kryptosystem med offentlig nøgle |
IT | public key cryptography | public key system |
IT | public key cryptography | asymmetrisk kryptosystem |
IT | public key cryptosystem | "Public key" kodesystem |
gen. | public key data confidentiality | datafortrolighed ved hjælp af offentlig nøgle |
IT | public key encipherment | kryptografi,der benytter offentlig nøgle |
IT | public key encipherment | kryptosystem med offentlig nøgle |
IT | public key encipherment | public key system |
IT | public key encipherment | asymmetrisk system |
IT | public key encipherment | to-nøgle system |
IT | public key encipherment | asymmetrisk kryptosystem |
commun., IT | public key encryption | asymmetrisk kryptering |
comp., MS | public key encryption | kryptering ved hjælp af offentlig nøgle (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
comp., MS | public key infrastructure | PKI public key infrastructure, infrastruktur for offentlige nøgler (The laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce) |
comp., MS | Public Key Infrastructure certificate A system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction | Public Key Infrastructure-certifikat (PKI-certifikat) |
construct., IT | Public sector information: a key resource for Europe - Green Paper on public sector information in the information society | Information i den offentlige sektor: en vigtig ressource for Europa - grønbog om information i den offentlige sektor i informationssamfundet |
IT | Rivest, Shamir and Adleman public-key encryption algorithm | Rivest, Shamir og Adleman |
IT | RSA public-key encryption algorithm | Rivest, Shamir og Adleman |