DictionaryForumContacts

Terms for subject Microsoft containing Encryption | all forms | exact matches only
EnglishGerman
Advanced Encryption Standarderweiterter Verschlüsselungsstandard (A cryptographic algorithm specified by the National Institute of Standards and Technology (NIST) to protect sensitive information)
asymmetric encryptionasymmetrische Verschlüsselung (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
128-bit encryption128-Bit-Verschlüsselung (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
40-bit encryption40-Bit-Verschlüsselung (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
128-bit SSL encryption128-Bit-SSL-Verschlüsselung (An encryption level used for SSL. The number refers to the length of the key, so the higher the number, the more difficult the encryption is to break)
BitLocker Drive EncryptionBitLocker-Laufwerkverschlüsselung (A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components)
BitLocker on-write encryptionBitLocker-Verschlüsselung bei Schreibvorgängen (A BitLocker feature that incrementally encrypts the hard drive as free space is used)
bulk encryptionMassenverschlüsselung (A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm)
bulk encryption keyMassenverschlüsselungsschlüssel (A session key derived from a master key. Bulk encryption keys are used in SChannel encryption)
data encryptionDatenverschlüsselung (The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party)
data encryption keyDatenverschlüsselungsschlüssel (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
Data Encryption StandardDatenverschlüsselungssstandard (An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key)
Device EncryptionGeräteverschlüsselung (The out-of-the-box encryption capabilities that are automatically included on PCs running Windows RT.)
device encryptionGeräteverschlüsselung (The use of encryption to protect local device data from offline hardware attacks)
Encryption Control ProtocolEncryption Control-Protokoll (The Network Control Protocol for negotiating the use of encryption over PPP links. ECP is defined in RFC 1968)
encryption keySchlüssel (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
encryption keyVerschlüsselungsschlüssel (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
encryption providerVerschlüsselungsanbieter (Software that provides encryption for sensitive data, such as passwords, in applications)
encryption settingVerschlüsselungseinstellung (A configuration element that specifies a type of encryption, such as 128-, 56-, or 40-bit encryption)
full volume encryptionvollständige Volumeverschlüsselung (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key)
full volume encryption keySchlüssel für die vollständige Volumeverschlüsselung (The algorithm-specific key that is used to encrypt (and optionally, diffuse) data on disk sectors. Currently, this key can be either 128 bits or 256 bits advanced encryption standard (AES). The default encryption algorithm that BitLocker Drive Encryption uses is AES 128 bit with diffuser)
public key encryptionVerschlüsselung mit öffentlichem Schlüssel (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
Rivest-Shamir-Adleman encryptionRSA-Verschlüsselung (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based)
ROT13 encryptionROT13-Verschlüsselung (A simple encryption method in which each letter is replaced with the letter of the alphabet 13 letters after the original letter, so that A is replaced by N, and so forth; N, in turn, is replaced by A, and Z is replaced by M. ROT13 encryption is not used to protect messages against unauthorized readers; rather, it is used in newsgroups to encode messages that a user may not want to read, such as sexual jokes or spoilers. Some newsreaders can automatically perform ROT13 encryption and decryption at the touch of a key)
RSA encryptionRSA-Verschlüsselung (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based)
secret key encryptionVerschlüsselung mit geheimem Schlüssel (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
secret key encryptionsymmetrische Verschlüsselung (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
symmetric encryptionsymmetrische Verschlüsselung (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
TLS encryptionTLS-Verschlüsselung (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP))
Transport Layer Security encryptionTransport Layer Security-Verschlüsselung (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP))
Triple Data Encryption StandardDreifach-DES (An encryption algorithm based on the Data Encryption Standard (DES))

Get short URL