DictionaryForumContacts

   Russian
Terms for subject Microsoft containing шифрование | all forms | exact matches only
RussianEnglish
алгоритм асимметричного шифрованияasymmetric key algorithm (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
алгоритм шифрования RSARivest-Shamir-Adleman encryption (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based)
алгоритм шифрованияcryptographic algorithm (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both)
асимметричное шифрованиеasymmetric encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
асимметричное шифрованиеAE (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
базовый поставщик служб шифрования смарт-картBase Smart Card Cryptographic Service Provider (The basic software module for by smart cards that performs cryptography and includes algorithms for authentication, encoding, and encryption)
128-битовое шифрование128-bit encryption (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
128-битовое SSL-шифрование128-bit SSL encryption (An encryption level used for SSL. The number refers to the length of the key, so the higher the number, the more difficult the encryption is to break)
40-битовое шифрование40-bit encryption (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
диагностика API шифрования и работы с цифровой подписьюCrypto API Diagnostics (A utility that can only be enabled by an administrator and which logs events associated with an applications use of certificates)
ключ шифрованияnetwork key (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key)
ключ шифрования всего томаFVEK (Full Volume Encryption Key oszone.net bojana)
ключ шифрования всего томаFull Volume Encryption Key (oszone.net bojana)
ключ шифрования данныхdata encryption key (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
массовое шифрованиеbulk encryption (A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm)
набор шифрованияcryptographic set (A specific group of cryptography settings)
набор шифрованияcrypto set (A specific group of cryptography settings)
параметр "Правило шифрования"Encrypt rule option (An option reached from the Rule Management area of the Policy Filter page for outbound mail. With this rule, e-mail messages that are sent by users in the organization can be encrypted automatically based on rule matching by subject and message keywords, regular expressions, sending and receiving e-mail address, and domains. Rori)
политика шифрованияencryption policy (stachel)
полный ключ шифрования томаfull volume encryption key (The algorithm-specific key that is used to encrypt (and optionally, diffuse) data on disk sectors. Currently, this key can be either 128 bits or 256 bits advanced encryption standard (AES). The default encryption algorithm that BitLocker Drive Encryption uses is AES 128 bit with diffuser)
поставщик служб шифрованияCSP (An independent software module that actually performs cryptography algorithms for authentication, encoding, and encryption)
поставщик служб шифрованияcryptographic service provider (An independent software module that actually performs cryptography algorithms for authentication, encoding, and encryption)
поставщик функций шифрованияencryption provider (Software that provides encryption for sensitive data, such as passwords, in applications)
привязка с шифрованиемcryptobinding (A procedure that creates an object which can later be authenticated)
привязка с шифрованиемcrypto-binding (A procedure that creates an object which can later be authenticated)
проверка подлинности без шифрованияplaintext authentication
прозрачное шифрование данныхtransparent data encryption (stachel)
размещённая служба шифрованияhosted encryption (microsoft.com bojana)
режим шифрованияcipher mode (The method used to encrypt data. The stream cipher mode encodes data one bit at a time. The block cipher mode encodes data one block at a time. Although it tends to execute more slowly than stream cipher, block cipher is more secure)
симметричное шифрованиеsymmetric encryption (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
стойкое шифрованиеstrong encryption (Encryption using a longer key (e.g. 128 bit))
установка с шифрованием BitLockerBitLocker encrypted installation (A feature of BitLocker that enables IT pros to encrypt a disk before a user begins to use it)
шифрование всего томаfull volume encryption (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key)
шифрование диска BitLockerBitLocker Drive Encryption (A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components)
шифрование ключаkey encipherment (The creation of a randomly-generated symmetric key to encrypt file data)
шифрование на основе эллиптических кривыхelliptic curve cryptography (An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases)
шифрование BitLocker при записиBitLocker on-write encryption (A BitLocker feature that incrementally encrypts the hard drive as free space is used)
шифрование с открытым ключомpublic key encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
шифрование устройстваDevice Encryption (The out-of-the-box encryption capabilities that are automatically included on PCs running Windows RT.)
шифрование устройстваdevice encryption (The use of encryption to protect local device data from offline hardware attacks)