key encryption key

key encryption key
raktų šifravimo raktas statusas T sritis informatika apibrėžtis ↑Raktas (3), naudojamas kitiems raktams apsaugoti. Tai dažniausiai ↑simetrinis raktas, kuriuo šifruojami ↑individualieji, ↑grupiniai, ↑seanso ar kt. raktai. atitikmenys: angl. key encryption key; key-encryption key; KEK ryšiai: dar žiūrėkgrupinis raktas dar žiūrėkindividualusis raktas dar žiūrėkraktas dar žiūrėkseansas dar žiūrėksimetrinis raktas

Enciklopedinis kompiuterijos žodynas . . 2008.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • Encryption software — is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Contents 1 Security 2… …   Wikipedia

  • Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… …   Wikipedia

  • Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and …   Wikipedia

  • encryption — n. the process of converting messages in ordinary language, or other information into a secret coded form that cannot be interpreted without knowing the secret method for interpretation, called the key. Note: Encryption is used commonly to allow… …   The Collaborative International Dictionary of English

  • encryption — n. The practice of converting information into code that can only be deciphered with a key. The Essential Law Dictionary. Sphinx Publishing, An imprint of Sourcebooks, Inc. Amy Hackney Blackwell. 2008. encryption …   Law dictionary

  • Key generation — is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Modern cryptographic systems include symmetric key algorithms (such as DES and AES) and public key algorithms… …   Wikipedia

  • Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… …   Wikipedia

  • Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… …   Wikipedia

  • Encryption Key —   [engl.], Schlüssel …   Universal-Lexikon

  • Key encapsulation — mechanisms (KEMs) are a form of encryption algorithm designed to secure cryptographic key material. Key encapsulation constructions are typically asymmetric (public key) algorithms, although an equivalent symmetric notion is referred to as Key… …   Wikipedia

  • Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”