Russian | English |
алгоритм асимметричного шифрования | asymmetric key algorithm (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
алгоритм шифрования RSA | Rivest-Shamir-Adleman encryption (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based) |
алгоритм шифрования | cryptographic algorithm (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both) |
асимметричное шифрование | asymmetric encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
асимметричное шифрование | AE (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
базовый поставщик служб шифрования смарт-карт | Base Smart Card Cryptographic Service Provider (The basic software module for by smart cards that performs cryptography and includes algorithms for authentication, encoding, and encryption) |
128-битовое шифрование | 128-bit encryption (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
128-битовое SSL-шифрование | 128-bit SSL encryption (An encryption level used for SSL. The number refers to the length of the key, so the higher the number, the more difficult the encryption is to break) |
40-битовое шифрование | 40-bit encryption (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
диагностика API шифрования и работы с цифровой подписью | Crypto API Diagnostics (A utility that can only be enabled by an administrator and which logs events associated with an applications use of certificates) |
ключ шифрования | network key (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key) |
ключ шифрования всего тома | FVEK (Full Volume Encryption Key oszone.net bojana) |
ключ шифрования всего тома | Full Volume Encryption Key (oszone.net bojana) |
ключ шифрования данных | data encryption key (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
массовое шифрование | bulk encryption (A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm) |
набор шифрования | cryptographic set (A specific group of cryptography settings) |
набор шифрования | crypto set (A specific group of cryptography settings) |
параметр "Правило шифрования" | Encrypt rule option (An option reached from the Rule Management area of the Policy Filter page for outbound mail. With this rule, e-mail messages that are sent by users in the organization can be encrypted automatically based on rule matching by subject and message keywords, regular expressions, sending and receiving e-mail address, and domains. Rori) |
политика шифрования | encryption policy (stachel) |
полный ключ шифрования тома | full volume encryption key (The algorithm-specific key that is used to encrypt (and optionally, diffuse) data on disk sectors. Currently, this key can be either 128 bits or 256 bits advanced encryption standard (AES). The default encryption algorithm that BitLocker Drive Encryption uses is AES 128 bit with diffuser) |
поставщик служб шифрования | CSP (An independent software module that actually performs cryptography algorithms for authentication, encoding, and encryption) |
поставщик служб шифрования | cryptographic service provider (An independent software module that actually performs cryptography algorithms for authentication, encoding, and encryption) |
поставщик функций шифрования | encryption provider (Software that provides encryption for sensitive data, such as passwords, in applications) |
привязка с шифрованием | cryptobinding (A procedure that creates an object which can later be authenticated) |
привязка с шифрованием | crypto-binding (A procedure that creates an object which can later be authenticated) |
проверка подлинности без шифрования | plaintext authentication |
прозрачное шифрование данных | transparent data encryption (stachel) |
размещённая служба шифрования | hosted encryption (microsoft.com bojana) |
режим шифрования | cipher mode (The method used to encrypt data. The stream cipher mode encodes data one bit at a time. The block cipher mode encodes data one block at a time. Although it tends to execute more slowly than stream cipher, block cipher is more secure) |
симметричное шифрование | symmetric encryption (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
стойкое шифрование | strong encryption (Encryption using a longer key (e.g. 128 bit)) |
установка с шифрованием BitLocker | BitLocker encrypted installation (A feature of BitLocker that enables IT pros to encrypt a disk before a user begins to use it) |
шифрование всего тома | full volume encryption (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key) |
шифрование диска BitLocker | BitLocker Drive Encryption (A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components) |
шифрование ключа | key encipherment (The creation of a randomly-generated symmetric key to encrypt file data) |
шифрование на основе эллиптических кривых | elliptic curve cryptography (An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases) |
шифрование BitLocker при записи | BitLocker on-write encryption (A BitLocker feature that incrementally encrypts the hard drive as free space is used) |
шифрование с открытым ключом | public key encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
шифрование устройства | Device Encryption (The out-of-the-box encryption capabilities that are automatically included on PCs running Windows RT.) |
шифрование устройства | device encryption (The use of encryption to protect local device data from offline hardware attacks) |