DictionaryForumContacts

Terms for subject Microsoft containing Encryption | all forms | exact matches only
EnglishArabic
Advanced Encryption Standardمقاييس التشفير المتقدمة (A cryptographic algorithm specified by the National Institute of Standards and Technology (NIST) to protect sensitive information)
asymmetric encryptionتشفير غير متماثل (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
128-bit encryptionتشفير من نوع 128 بت (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
40-bit encryptionتشفير من نوع 40 بت (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
BitLocker Drive Encryptionتشفير المحركات باستخدام BitLocker (A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components)
BitLocker on-write encryptionالتشفير عند الاستخدام من BitLocker (A BitLocker feature that incrementally encrypts the hard drive as free space is used)
bulk encryptionتشفير مجموعة بيانات (A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm)
data encryptionتشفير البيانات (The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party)
data encryption keyمفتاح تشفير البيانات (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
Data Encryption Standardمقياس تشفير البيانات (An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key)
Device Encryptionتشفير الأجهزة (The out-of-the-box encryption capabilities that are automatically included on PCs running Windows RT.)
Encryption Control Protocolبروتوكول التحكم بالتشفير (The Network Control Protocol for negotiating the use of encryption over PPP links. ECP is defined in RFC 1968)
encryption keyمفتاح التشفير (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
encryption providerبرنامج تشفير (Software that provides encryption for sensitive data, such as passwords, in applications)
full volume encryptionتشفير وحدة التخزين بالكامل (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key)
public key encryptionتشفير مفتاح عام (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
RSA encryptionتشفير RSA (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based)
secret key encryptionتشفير بالمفتاح السري (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
symmetric encryptionتشفير متماثل (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
TLS encryptionتشفير TLS (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP))
Triple Data Encryption Standardمقاييس تشفير البيانات الثلاثية (An encryption algorithm based on the Data Encryption Standard (DES))

Get short URL