DictionaryForumContacts

Terms containing Encryption | all forms | exact matches only
SubjectEnglishFrench
ITAdvanced Encryption Standardnorme de chiffrement avancé
commun.air interface encryption algorithmalgorithme de chiffrement de l'interface air
commun.air interface encryption signalling algorithmalgorithme de signalisation de chiffrement de l'interface air
commun., ITasymmetric encryptionchiffrement asymétrique
comp., MSasymmetric encryptionchiffrement asymétrique (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
ITasymmetric encryption systemsystème de chiffrement asymétrique
comp., MS128-bit encryptionchiffrement 128 bits (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
comp., MS40-bit encryptionchiffrement 40 bits (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
comp., MS128-bit SSL encryptionchiffrement SSL 128 bits (An encryption level used for SSL. The number refers to the length of the key, so the higher the number, the more difficult the encryption is to break)
comp., MSBitLocker Drive EncryptionChiffrement de lecteur BitLocker (A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components)
comp., MSBitLocker on-write encryptionchiffrement BitLocker sur écriture (A BitLocker feature that incrementally encrypts the hard drive as free space is used)
ITBody Part Encryption IndicationIndication de cryptage d'un élément du corps du message
comp., MSbulk encryptionchiffrement en bloc (A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm)
ITcode encryption softwarelogiciel de chiffrement des codes
IT, dat.proc.command file encryptionencryptage d'un fichier de commandes
IT, dat.proc.command file encryptioncryptage d'un fichier de commandes
ITcommunications link encryptionchiffrage à chaîne
ITcommunications link encryptionchiffrage de voie de transmission
ITcross-border encryption serviceservice de chiffrement transfrontalier
comp.data encryptionchiffrage de données
comp.data encryptioncryptage de données
comp., MSdata encryptionchiffrement de données (The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party)
comp.data encryptioncodage de données
ITData Encryption Standardstandard de cryptage des données
commun., ITdata encryption standardnorme de chiffrage des données
commun., ITData Encryption Standardnorme de chiffrement de données
comp.data encryption standardstandard de cryptage de données
comp., MSdevice encryptionchiffrement de l'appareil (The use of encryption to protect local device data from offline hardware attacks)
gen.digital encryptionchiffrement numérique
ITencryption algorithmalgorithme cryptographique
ITencryption algorithmalgorithme de codification
ITencryption algorithmalgorithme de chiffrage
commun., ITencryption algorithmalgorithme de cryptage
ITencryption algorithmalgorithme de chiffrement
commun., ITencryption boxdispositif de chiffrement
commun., ITencryption boxboîtier de chiffrement
commun., ITencryption boxcrypteur
commun., ITencryption boxappareil de chiffrage
comp.encryption circuitrycircuit de chiffrage
comp., MSEncryption Control Protocolprotocole ECP (The Network Control Protocol for negotiating the use of encryption over PPP links. ECP is defined in RFC 1968)
ITencryption-decryption deviceappareil de chiffrage-déchiffrage
ITencryption-decryption deviceappareil cryptographique
gen.encryption-decryption in data transferencodage/décodage pour le transfert de données
gen.encryption-decryption in data transferchiffrement/déchiffrement
commun., ITencryption devicedispositif de chiffrement
commun., ITencryption devicecrypteur
commun., ITencryption deviceboîtier de chiffrement
commun., ITencryption deviceappareil de chiffrage
ITencryption keyclé de chiffrement
comp., MSencryption keyclé de chiffrement (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
mil., logist.encryption levelniveau de chiffrement
IT, dat.proc.encryption procedureméthode de chiffrement
IT, dat.proc.encryption procedureméthode de chiffrage
ITencryption programprogramme de chiffrement
comp., MSencryption providerfournisseur de chiffrement (Software that provides encryption for sensitive data, such as passwords, in applications)
comp., MSencryption settingparamètre de chiffrement (A configuration element that specifies a type of encryption, such as 128-, 56-, or 40-bit encryption)
ITencryption softwarelogiciel de cryptage
ITencryption softwarelogiciel de chiffrement
commun.encryption systemsystème de cryptage
comp.encryption techniquetechnique de cryptage
commun., ITencryption unitappareil de chiffrage
commun., ITencryption unitcrypteur
commun., ITencryption unitboîtier de chiffrement
commun., ITencryption unitdispositif de chiffrement
ITend-to-end encryptionchiffrement de bout en bout
comp.end-to-end encryptionencryption entière
commun., ITEurocrypt encryption systemsystème de cryptage Eurocrypt
ITEuropean framework for digital signatures and encryptionCadre européen pour les signatures numériques et le chiffrement
ITfast encryption algorithmalgorithme de chiffrement rapide
comp., MSfull volume encryptionchiffrement de volume complet (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key)
comp., MSfull volume encryption keyclé de chiffrement de volume complet (The algorithm-specific key that is used to encrypt (and optionally, diffuse) data on disk sectors. Currently, this key can be either 128 bits or 256 bits advanced encryption standard (AES). The default encryption algorithm that BitLocker Drive Encryption uses is AES 128 bit with diffuser)
ITIP encryptioncryptage IP
commun., ITIrdeto encryption systemsystème de cryptage Irdeto
comp., MSkey encryptionchiffrement à clé (The creation of a randomly-generated symmetric key to encrypt file data)
law, ITlawful access to encryption keysaccès légal aux clés de chiffrement
ITlink encryptionchiffrage de voie de transmission
ITlink encryptionchiffrage à chaîne
mil., logist.link encryptionchiffrement de jonction ou d’artère
commun., ITLuxcrypt encryption systemsystème de cryptage Luxcrypt
ITmedia encryptionchiffrement support
commun., ITmessage encryptionencryptage d'un message
commun., ITmessage encryptioncryptage d'un message
IT, dat.proc.method of encryptionméthode de chiffrage
IT, dat.proc.method of encryptionméthode de chiffrement
ITpoint-to-point encryptionchiffrage point à point
commun., ITpublic key encryptionchiffrement asymétrique
comp., MSpublic key encryptionchiffrement à clé publique (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
commun., ITpublic-key encryptionencryptage à clé publique
law, commun.right to free encryptionliberté de crypter
law, commun.right to free encryptionliberté de cryptage
ITRivest, Shamir and Adleman public-key encryption algorithmalgorithme Rivest-Shamir-Adleman
ITRivest, Shamir and Adleman public-key encryption algorithmRivest, Shamir et Adleman
ITRivest, Shamir and Adleman public-key encryption algorithmalgorithme RSA
comp., MSRivest-Shamir-Adleman encryptionchiffrement RSA (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based)
comp., MSRSA encryptionchiffrement RSA (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based)
ITRSA public-key encryption algorithmRivest, Shamir et Adleman
ITRSA public-key encryption algorithmalgorithme Rivest-Shamir-Adleman
ITRSA public-key encryption algorithmalgorithme RSA
comp., MSsecret key encryptionchiffrement à clé secrète (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
ITSecure and Fast Encryption Routineroutine de chiffrement rapide et sécurisée
ITsmart encryption devicedispositif de chiffrement intelligentde sécurité
comp.speech encryptionchiffrage de la parole
commun., ITspeech encryptioncryptage de la parole
comp.speech encryptioncodage de la parole
comp., MSstrong encryptionchiffrement renforcé (Encryption using a longer key (e.g. 128 bit))
ITsymmetric encryptionchiffrement symétrique
comp., MSsymmetric encryptionchiffrement symétrique (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
ITsymmetric encryption systemsystème de chiffrement symétrique
commun., ITSyster/Nagravision encryption systemsystème de cryptage Syster/Nagravision
comp., MSTLS encryptionchiffrement TLS (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP))
comp., MSTransport Layer Security encryption A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP)chiffrement TLS (Transport Layer Security)
comp., MSTriple Data Encryption Standard An encryption algorithm based on the Data Encryption Standard (DES)3DES (Triple Data Encryption Standard)
commun., ITvideocrypt encryption systemsystème de cryptage Videocrypt
comp.voice encryptionchiffrage de la parole
comp.voice encryptioncodage de la parole
ITX.25 encryptionchiffrage X.25

Get short URL