Subject | English | Thai |
comp., MS | Advanced Encryption Standard | มาตรฐานการเข้ารหัสลับขั้นสูง (A cryptographic algorithm specified by the National Institute of Standards and Technology (NIST) to protect sensitive information) |
comp., MS | asymmetric encryption | การเข้ารหัสลับแบบอสมมาตร (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
comp., MS | 128-bit encryption | การเข้ารหัสลับ 128 บิต (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
comp., MS | 40-bit encryption | การเข้ารหัสลับ 40 บิต (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
comp., MS | BitLocker Drive Encryption | การเข้ารหัสลับไดรฟ์ด้วย BitLocker (A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components) |
comp., MS | bulk encryption | การเข้ารหัสเป็นกลุ่มขนาดใหญ่ (A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm) |
comp., MS | data encryption key | คีย์การเข้ารหัสข้อมูล (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
comp., MS | Data Encryption Standard | มาตรฐานการเข้ารหัสลับข้อมูล (An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key) |
comp., MS | Device Encryption | การเข้ารหัสลับอุปกรณ์ (The out-of-the-box encryption capabilities that are automatically included on PCs running Windows RT.) |
comp., MS | encryption key | คีย์การเข้ารหัสลับ (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
comp., MS | encryption provider | ตัวเข้ารหัสลับ (Software that provides encryption for sensitive data, such as passwords, in applications) |
comp., MS | full volume encryption | การเข้ารหัสลับไดรฟ์ข้อมูลเต็มรูปแบบ (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key) |
comp., MS | public key encryption | การเข้ารหัสคีย์สาธารณะ (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
comp., MS | Rivest-Shamir-Adleman encryption | การเข้ารหัสลับแบบ Rivest-Shamir-Adleman (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based) |
comp., MS | secret key encryption | การเข้ารหัสโดยใช้คีย์เดียวกัน (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
comp., MS | symmetric encryption | การเข้ารหัสโดยใช้คีย์เดียวกัน (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |