DictionaryForumContacts

Terms containing kryptering | all forms | exact matches only
SubjectDanishEnglish
commun., ITasymmetrisk krypteringasymmetric encryption
commun., ITasymmetrisk krypteringpublic key encryption
comp., MSasymmetrisk krypteringasymmetric encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
comp., MS40-bit kryptering40-bit encryption (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
comp., MS128-bit kryptering128-bit encryption (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
comp., MS128-bit SSL-kryptering128-bit SSL encryption (An encryption level used for SSL. The number refers to the length of the key, so the higher the number, the more difficult the encryption is to break)
gen.Den Europæiske Arbejdsgruppe vedrørende KrypteringEuropean Encryption Working Group
commun., ITflydende krypteringstream cypher
comp., MSfuld kryptering af diskenhedfull volume encryption (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key)
IThurtig co-processor til krypteringfast accelerator for modular exponentiation
IT, dat.proc.kryptering af kommandofilcommand file encryption
comp., MSkryptering ved hjælp af hemmelig nøglesecret key encryption (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
comp., MSkryptering ved hjælp af offentlig nøglepublic key encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
commun., IToffentlig nøgle-krypteringpublic key cryptography
IT"point-to point" krypteringpoint-to-point encryption
commun., ITpublic key-krypteringpublic key cryptography
comp., MSRSA-krypteringRSA encryption (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based)
comp., MSRSA-krypteringRivest-Shamir-Adleman encryption (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based)
commun., ITsymmetrisk krypteringsymmetric encryption
comp., MSsymmetrisk krypteringsymmetric encryption (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
comp., MSTLS-krypteringTransport Layer Security encryption (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP))
comp., MSTLS-krypteringTLS encryption (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP))
ITX.25 krypteringX.25 encryption

Get short URL