Subject | Danish | English |
commun., IT | asymmetrisk kryptering | asymmetric encryption |
commun., IT | asymmetrisk kryptering | public key encryption |
comp., MS | asymmetrisk kryptering | asymmetric encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
comp., MS | 40-bit kryptering | 40-bit encryption (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
comp., MS | 128-bit kryptering | 128-bit encryption (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
comp., MS | 128-bit SSL-kryptering | 128-bit SSL encryption (An encryption level used for SSL. The number refers to the length of the key, so the higher the number, the more difficult the encryption is to break) |
gen. | Den Europæiske Arbejdsgruppe vedrørende Kryptering | European Encryption Working Group |
commun., IT | flydende kryptering | stream cypher |
comp., MS | fuld kryptering af diskenhed | full volume encryption (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key) |
IT | hurtig co-processor til kryptering | fast accelerator for modular exponentiation |
IT, dat.proc. | kryptering af kommandofil | command file encryption |
comp., MS | kryptering ved hjælp af hemmelig nøgle | secret key encryption (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
comp., MS | kryptering ved hjælp af offentlig nøgle | public key encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
commun., IT | offentlig nøgle-kryptering | public key cryptography |
IT | "point-to point" kryptering | point-to-point encryption |
commun., IT | public key-kryptering | public key cryptography |
comp., MS | RSA-kryptering | RSA encryption (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based) |
comp., MS | RSA-kryptering | Rivest-Shamir-Adleman encryption (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based) |
commun., IT | symmetrisk kryptering | symmetric encryption |
comp., MS | symmetrisk kryptering | symmetric encryption (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
comp., MS | TLS-kryptering | Transport Layer Security encryption (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP)) |
comp., MS | TLS-kryptering | TLS encryption (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP)) |
IT | X.25 kryptering | X.25 encryption |