Subject | English | Norwegian Bokmål |
comp., MS | asymmetric key algorithm | asymmetrisk nøkkelalgoritme (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
comp., MS | Authority Key Identifier | nøkkelidentifikator for instans (A certificate extension used by the certificate chaining engine to determine what certificate was used to sign a presented certificate. The AKI can contain the issuer name, serial number, public key information, or no information at all. By matching the information in a certificate's AKI extension to a CA certificate's Subject Key Identifier (SKI) extension, a certificate chain can be built) |
comp., MS | class key member | medlem av klassenøkkel, klassenøkkelmedlem (One of the members of a multi-valued class key) |
comp., MS | enhanced key usage | utvidet nøkkelbruk (An extended property value that specifies the uses for which a certificate is valid) |
comp., MS | key action | tastehandling (Term used to describe program behavior when a certain key is pressed on the keyboard. Key actions are associated with items within a source document) |
comp., MS | key combination | tastekombinasjon (Any combination of keys that must be pressed simultaneously) |
comp., MS | key derivation function | nøkkelavledningsfunksjon (A cryptographic function that generates key material from a secret value) |
comp., MS | Key Distribution Center | nøkkeldistribusjonssenter (A network service that supplies session tickets and temporary session keys to users and computers within an Active Directory domain. The KDC runs on each domain controller as part of Active Directory Domain Services (AD DS)) |
comp., MS | key encipherment | nøkkelchiffrering (The creation of a randomly-generated symmetric key to encrypt file data) |
comp., MS | key exchange | nøkkelutveksling (Confidential exchange of secret keys online, which is commonly done with public key cryptography) |
comp., MS | key filter | nøkkelfilter (A metadata column or field in a Key Filters control) |
comp., MS | Key Filters | Nøkkelfiltre (A metadata navigation control that enables users to limit the items displayed in a list or library to those that match selected values) |
comp., MS | key frame | nøkkelbilde (A video frame in which starting and ending positions of an object are given, and all frames in between are interpolated by a computer to produce smooth automated animation. Most ray-traced computer animation is created using this technique) |
comp., MS | key ID | nøkkel-ID (A value that identifies the key for a packaged Windows Media file) |
comp., MS | Key lock | Tastelås (An option that locks the keypad to avoid accidental key presses) |
comp., MS | key logger | tastelogger (A type of malware that sends key strokes or screen shots to an attacker) |
comp., MS | Key Management Server | nøkkelbehandlingsserver (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group) |
comp., MS | Key Management Service | tjeneste for nøkkelbehandling (An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures) |
comp., MS | key pair | nøkkelpar (A private key and its related public key) |
comp., MS | Key press | Tastetrykk (" An option in "ringtones & sounds" settings. When this option is selected, the phone makes a sound when buttons on the on-screen keypad or keyboard are tapped.") |
gen. | key rate | styringsrente |
comp., MS | key sequence | tastesekvens (Any combination of keys that must be pressed sequentially) |
comp., MS | key-value pair | nøkkelverdipar (A set of data items that contains a unique identifier, called a key, and a value that is the actual data for the key) |
gen. | key word | nøkkelord |
comp., MS | license key seed | lisensnøkkelkode (A shared secret value that is used to generate keys to encrypt Windows Media files) |
comp., MS | public key algorithm | fellesnøkkelalgoritme (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
comp., MS | public key encryption | kryptering med fellesnøkkel (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
comp., MS | public key infrastructure | infrastruktur for fellesnøkkel (The laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce) |
comp., MS | Public Key Infrastructure certificate | Public Key Infrastructure-sertifikat (A system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction) |
comp., MS | secret key encryption | kryptering med hemmelig nøkkel (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
comp., MS | symmetric-key cryptography | innholdsnøkkelkryptografi (A type of cryptography that uses symmetric keys to provide confidentiality) |
comp., MS | virtual key code | kode for virtuell tast (A symbolic constant name, hexadecimal value, or mouse or keyboard equivalent that provides a hardware and language-independent method of identifying keyboard keys. Each virtual key code represents a unique keyboard key and also identifies the purpose of that key. The keyboard driver must provide one or more keyboard layouts that maps keyboard scan codes to the appropriate virtual key codes) |