Subject | English | Dutch |
commun., IT | asymmetric encryption | asymmetrische encryptie |
commun., IT | asymmetric encryption | public-keyencryptie |
comp., MS | asymmetric encryption | asymmetrische versleuteling (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
IT | asymmetric encryption system | asymmetrisch encryptiesysteem |
comp., MS | 128-bit encryption | 128 bitsversleuteling (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
comp., MS | 40-bit encryption | 40 bitsversleuteling (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
comp., MS | 128-bit SSL encryption | 128 bits-SSL-versleuteling (An encryption level used for SSL. The number refers to the length of the key, so the higher the number, the more difficult the encryption is to break) |
comp., MS | BitLocker Drive Encryption | BitLocker-stationsversleuteling (A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components) |
comp., MS | BitLocker on-write encryption | BitLocker-versleuteling tijdens schrijven (A BitLocker feature that incrementally encrypts the hard drive as free space is used) |
comp., MS | bulk encryption | bulkversleuteling (A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm) |
IT, dat.proc. | command file encryption | versleuteling van een opdrachtenbestand |
IT, dat.proc. | command file encryption | versleuteling van een commandobestand |
IT, dat.proc. | command file encryption | crypto-coderen van een opdrachtenbestand |
IT, dat.proc. | command file encryption | crypto-coderen van een commandobestand |
IT | cross-border encryption service | grensoverschrijdende encryptiedienst |
comp., MS | data encryption | gegevensversleuteling (The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party) |
comp., MS | data encryption key | gegevensversleutelingssleutel (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
commun., IT | data encryption standard | gegevenencryptiestandaard |
commun., IT, engl. | Data Encryption Standard | Data Encryption Standard |
commun., IT | data encryption standard | data-encryptie standaard |
IT | Data Encryption Standard | Kryptographische methode |
IT | data encryption standard algorithm | gegevensencryptiestandaardalgoritme |
comp., MS | Device Encryption | Apparaatversleuteling (The out-of-the-box encryption capabilities that are automatically included on PCs running Windows RT.) |
comp., MS | device encryption | apparaatversleuteling (The use of encryption to protect local device data from offline hardware attacks) |
gen. | digital encryption | digitaal vercijferen |
gen. | digital encryption | digitaal coderen |
IT | encryption algorithm | coderingsalgoritme |
commun., IT | encryption algorithm | encryptie-algoritme |
IT | encryption algorithm | cryptografisch algoritme |
commun., IT | encryption box | versleutelingsvoorziening |
commun., IT | encryption box | versleutelingsapparatuur |
commun., IT | encryption box | encryptieapparatuur |
IT | encryption-decryption device | cryptografische apparatuur |
gen. | encryption-decryption in data transfer | versluiering/ontsluitering van berichten |
gen. | encryption-decryption in data transfer | vercijfering/ontcijfering |
gen. | encryption-decryption in data transfer | encryptie/decryptie |
commun., IT | encryption device | encryptieapparatuur |
commun., IT | encryption device | versleutelingsapparatuur |
commun., IT | encryption device | versleutelingsvoorziening |
IT | encryption key | vercijfersleutel |
comp., MS | encryption key | encryptiesleutel (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
IT | encryption key | codesleutel |
comp., MS | encryption key | versleutelingssleutel (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
IT, dat.proc. | encryption procedure | vercijferprocedure |
IT, dat.proc. | encryption procedure | encryptie-procedure |
comp., MS | encryption provider | versleutelingsprovider (Software that provides encryption for sensitive data, such as passwords, in applications) |
comp., MS | encryption setting | versleutelingsinstelling (A configuration element that specifies a type of encryption, such as 128-, 56-, or 40-bit encryption) |
IT | encryption software | versleutelingssoftware |
IT | encryption software | encryptiesoftware |
IT | encryption software | encryptieprogrammatuur |
commun. | encryption system | coderingssysteem |
IT | encryption technology | coderingstechnologie |
commun., IT | encryption unit | versleutelingsapparatuur |
commun., IT | encryption unit | encryptieapparatuur |
commun., IT | encryption unit | versleutelingsvoorziening |
commun., IT | Eurocrypt encryption system | Eurocrypt |
gen. | European Encryption Working Group | Europese werkgroep encryptie |
IT | European framework for digital signatures and encryption | Europees kader voor digitale handtekeningen en encryptie |
IT | fast encryption algorithm | snel encryptiealgoritme |
comp., MS | full volume encryption | volledige versleuteling voor volumes (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key) |
comp., MS | full volume encryption key | versleutelingscode voor volledig volume (The algorithm-specific key that is used to encrypt (and optionally, diffuse) data on disk sectors. Currently, this key can be either 128 bits or 256 bits advanced encryption standard (AES). The default encryption algorithm that BitLocker Drive Encryption uses is AES 128 bit with diffuser) |
commun., IT | Irdeto encryption system | Irdeto |
law, IT | lawful access to encryption keys | wettelijk toegestane toegang tot encryptiesleutels |
commun., IT | Luxcrypt encryption system | Luxcrypt |
commun., IT | message encryption | berichtencryptie |
commun., IT | message encryption | berichtversleuteling |
IT, dat.proc. | method of encryption | encryptie-procedure |
IT, dat.proc. | method of encryption | vercijferprocedure |
IT | point-to-point encryption | punt-tot-puntencryptie |
commun., IT | public key encryption | asymmetrische encryptie |
commun., IT | public key encryption | public-keyencryptie |
comp., MS | public key encryption | openbare-sleutelversleuteling (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
IT | Rivest, Shamir and Adleman public-key encryption algorithm | Rivest, Shamir en Adleman |
comp., MS | Rivest-Shamir-Adleman encryption | Rivest-Shamir-Adleman-versleuteling (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based) |
comp., MS | RSA encryption | RSA-versleuteling (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based) |
IT | RSA public-key encryption algorithm | Rivest, Shamir en Adleman |
comp., MS | secret key encryption | versleuteling met geheime sleutel (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
IT | smart encryption device | intelligente codeerinrichting |
commun., IT | speech encryption | spraakversleuteling |
commun., IT | symmetric encryption | symmetrische encryptie |
comp., MS | symmetric encryption | symmetrische versleuteling (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
IT | symmetric encryption system | symmetrisch encryptiesysteem |
commun., IT | Syster/Nagravision encryption system | Syster/Nagravision |
comp., MS | TLS encryption | TLS-versleuteling (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP)) |
comp., MS | Transport Layer Security encryption | Transport Layer Security-versleuteling (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP)) |
commun., IT | videocrypt encryption system | Videocrypt |
IT | X.25 encryption | X.25-encryptie |