Subject | English | German |
IT, engl. | Advanced Encryption Standard | Advanced Encryption Standard |
comp., MS | Advanced Encryption Standard | erweiterter Verschlüsselungsstandard (A cryptographic algorithm specified by the National Institute of Standards and Technology (NIST) to protect sensitive information) |
comp., MS | asymmetric encryption | asymmetrische Verschlüsselung (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
IT | asymmetric encryption algorithm | asymmetrischer Verschlüsselungsalgorithmus |
comp., MS | 128-bit encryption | 128-Bit-Verschlüsselung (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
comp., MS | 40-bit encryption | 40-Bit-Verschlüsselung (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
comp., MS | 128-bit SSL encryption | 128-Bit-SSL-Verschlüsselung (An encryption level used for SSL. The number refers to the length of the key, so the higher the number, the more difficult the encryption is to break) |
comp., MS | BitLocker Drive Encryption | BitLocker-Laufwerkverschlüsselung (A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components) |
comp., MS | BitLocker on-write encryption | BitLocker-Verschlüsselung bei Schreibvorgängen (A BitLocker feature that incrementally encrypts the hard drive as free space is used) |
comp., MS | bulk encryption | Massenverschlüsselung (A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm) |
comp., MS | bulk encryption key | Massenverschlüsselungsschlüssel (A session key derived from a master key. Bulk encryption keys are used in SChannel encryption) |
IT, dat.proc. | command file encryption | Verschlüsselung einer Befehlsdatei |
IT | communications link encryption | Leitungsverschlüsselung |
busin., IT | data encryption | Datenverschlüsselung |
comp., MS | data encryption | Datenverschlüsselung (The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party) |
comp. | data encryption | Datencodierung |
IT | data encryption key | Datenschlüssel |
comp., MS | data encryption key | Datenverschlüsselungsschlüssel (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
commun., IT, engl. | Data Encryption Standard | Data Encryption Standard |
gen. | Data Encryption Standard DES | Verschlüsselungsstandard |
busin., IT | data encryption standard | Datenverschlüsselungsnorm |
comp. | data encryption standard | Standard für Datenverschlüsselung |
gen. | Data Encryption Standard DES | Datenverschlüsselungsstandard |
comp., MS | Data Encryption Standard | Datenverschlüsselungssstandard (An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key) |
gen. | Data Encryption Standard DES | ein Datenverschlüsselungsstandard |
commun. | data encryption unit | Datenschlüsselgerät |
comp., MS | Device Encryption | Geräteverschlüsselung (The out-of-the-box encryption capabilities that are automatically included on PCs running Windows RT.) |
comp., MS | device encryption | Geräteverschlüsselung (The use of encryption to protect local device data from offline hardware attacks) |
gen. | digital encryption | digitale Verschlüsselung |
IT | encryption algorithm | Chiffrieralgorithmus |
tech. | encryption algorithm | Verschlüsselungsalgorithmus |
commun., IT | encryption box | Kryptogerät |
commun., IT | encryption box | Kryptiergerät |
commun., IT | encryption box | Verschlüsselungsbox |
commun., IT | encryption box | Verschlüsselungsgerät |
commun., IT | encryption box | Chiffriergerät |
comp. | encryption circuitry | Verschlüsselungsschaltung |
comp. | encryption circuitry | Chiffrierschaltung |
comp., MS | Encryption Control Protocol | Encryption Control-Protokoll (The Network Control Protocol for negotiating the use of encryption over PPP links. ECP is defined in RFC 1968) |
IT | encryption-decryption device | Verschlüsselungs-und Entschlüsselungsgerät |
IT | encryption-decryption device | Chiffrier-und Dechiffriergerät |
gen. | encryption-decryption in data transfer | verschlüsselte Datenübertragung |
gen. | encryption-decryption in data transfer | Verschlüsselung/Entschlüsselung |
commun., IT | encryption device | Chiffriergerät |
commun., IT | encryption device | Kryptiergerät |
commun., IT | encryption device | Verschlüsselungsbox |
commun., IT | encryption device | Kryptogerät |
commun., IT | encryption device | Verschlüsselungsgerät |
comp., MS | encryption key | Verschlüsselungsschlüssel (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
comp., MS | encryption key | Schlüssel (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
IT | encryption key | kryptographischer Schlüssel |
IT, dat.proc. | encryption procedure | Verschlüsselungsprozedur |
IT, dat.proc. | encryption procedure | Chiffrierungsverfahren |
IT, dat.proc. | encryption procedure | Verschlüsselungsvorgang |
IT | encryption program | Verschlüssellungsprogramm |
IT | encryption program | Chiffrierprogramm |
comp., MS | encryption provider | Verschlüsselungsanbieter (Software that provides encryption for sensitive data, such as passwords, in applications) |
comp., MS | encryption setting | Verschlüsselungseinstellung (A configuration element that specifies a type of encryption, such as 128-, 56-, or 40-bit encryption) |
IT | encryption software | Verschlüsselungssoftware |
commun. | encryption system | Verschlüsselungssystem |
comp. | encryption technique | Verschlüsselungstechnik |
comp. | encryption technique | Chiffriertechnik |
IT | encryption technology | Verschlüsselungstechnik |
commun., IT | encryption unit | Verschlüsselungsbox |
commun., IT | encryption unit | Chiffriergerät |
commun., IT | encryption unit | Kryptogerät |
commun., IT | encryption unit | Kryptiergerät |
commun., IT | encryption unit | Verschlüsselungsgerät |
comp. | end-to-end encryption | Übermittlungsverschlüsselung Verschlüsselung von Daten von Endstelle zu Endstelle |
IT | end-to-end encryption | Übermittlungsverschlüsselung |
IT | end-to-end encryption | Verschlüsseln der Daten von Endstelle zu Endstelle |
comp. | end-to-end encryption | Ende-zu-Ende-Verschlüsselung |
gen. | end-to-end line encryption device | Ende-zu-Ende-Leitungsverschlüsselungsgerät |
commun., IT | Eurocrypt encryption system | Eurocrypt-Verschlüsselungssystem |
commun. | European satellite TV MAC encryption standard | europäische Verschlüsselungsnorm |
comp., MS | full volume encryption | vollständige Volumeverschlüsselung (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key) |
comp., MS | full volume encryption key | Schlüssel für die vollständige Volumeverschlüsselung (The algorithm-specific key that is used to encrypt (and optionally, diffuse) data on disk sectors. Currently, this key can be either 128 bits or 256 bits advanced encryption standard (AES). The default encryption algorithm that BitLocker Drive Encryption uses is AES 128 bit with diffuser) |
commun., IT | Irdeto encryption system | Irdeto-Verschlüsselungssystem |
tech. | key encryption key | Verschlüsselungsschlüssel (KEK) |
busin., IT | link encryption | Verbindungs Verschlüsselung |
IT | link encryption | Leitungsverschlüsselung |
busin., IT | link encryption | Verbindungsverschlüsselung |
tech. | link encryption | on-line-Verschluesselung (fuer Richtverbindung) |
commun., IT | Luxcrypt encryption system | Luxcrypt-Verschlüsselungssystem |
IT | media encryption | Speicherverschlüsselung |
commun., IT | message encryption | Chiffrieren einer Nachricht |
commun., IT | message encryption | Verschlüsselung einer Nachricht |
microel. | message encryption device | Nachrichtenverschlüsselungsgerät |
IT, dat.proc. | method of encryption | Chiffrierungsverfahren |
IT, dat.proc. | method of encryption | Verschlüsselungsprozedur |
IT, dat.proc. | method of encryption | Verschlüsselungsvorgang |
IT | network encryption | Netzverschlüsselung |
IT | on-line encryption | speicherfreie Zeichenverschluesselung |
IT | on-line encryption | simultane Zeichenverschluesselung |
IT | on-line encryption | Zeichenverschluesselung ohne Zwischenspeicherung |
tech. | password encryption | Paßwortverschlüsselung |
tech. | password encryption | Kennwortverschlüsselung |
IT | point-to-point encryption | Point-to-Point-Verschlüsselung |
comp., MS | public key encryption | Verschlüsselung mit öffentlichem Schlüssel (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
commun., IT | public-key encryption | Public-Key-Verschlüsselung |
law, commun. | right to free encryption | Verschlüsselungsfreiheit |
IT | Rivest, Shamir and Adleman public-key encryption algorithm | RSA-Verfahren |
IT | Rivest, Shamir and Adleman public-key encryption algorithm | Rivest-Shamir-Adleman-Algorithmus |
gen. | Rivest, Shamir and Adleman public-key encryption algorithm | RSA-Algorithmus |
comp., MS | Rivest-Shamir-Adleman encryption | RSA-Verschlüsselung (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based) |
comp., MS | ROT13 encryption | ROT13-Verschlüsselung (A simple encryption method in which each letter is replaced with the letter of the alphabet 13 letters after the original letter, so that A is replaced by N, and so forth; N, in turn, is replaced by A, and Z is replaced by M. ROT13 encryption is not used to protect messages against unauthorized readers; rather, it is used in newsgroups to encode messages that a user may not want to read, such as sexual jokes or spoilers. Some newsreaders can automatically perform ROT13 encryption and decryption at the touch of a key) |
comp., MS | RSA encryption | RSA-Verschlüsselung (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based) |
IT | RSA public-key encryption algorithm | Rivest-Shamir-Adleman-Algorithmus |
IT | RSA public-key encryption algorithm | RSA-Verfahren |
gen. | RSA public-key encryption algorithm | RSA-Algorithmus |
comp., MS | secret key encryption | Verschlüsselung mit geheimem Schlüssel (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
comp., MS | secret key encryption | symmetrische Verschlüsselung (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
IT | smart encryption device | intelligentes Verschlüsselungsgerät |
commun., IT | speech encryption | Sprachverschlüsselung |
comp. | speech encryption | Sprachcodierung |
cryptogr. | super encryption | Zeichenverschluesselung durch Ueberlagerung |
comp., MS | symmetric encryption | symmetrische Verschlüsselung (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
IT | symmetric encryption algorithm | symmetrischer Verschlüsselungsalgorithmus |
commun., IT | Syster/Nagravision encryption system | Syster/Nagravision-Verschlüsselungssystem |
comp., MS | TLS encryption | TLS-Verschlüsselung (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP)) |
comp., MS | Transport Layer Security encryption | Transport Layer Security-Verschlüsselung (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP)) |
comp., MS | Triple Data Encryption Standard | Dreifach-DES (An encryption algorithm based on the Data Encryption Standard (DES)) |
IT | tunnel encryption mode | Tunnelmodus |
commun., IT | videocrypt encryption system | Videocrypt-Verschlüsselungssystem |
comp. | voice encryption | Sprachverschlüsselung |
comp. | voice encryption | Sprachcodierung |
IT | X.25 encryption | X.25-Verschlüsselung |