Subject | Arabic | English |
comp., MS | برنامج تشفير | encryption provider (Software that provides encryption for sensitive data, such as passwords, in applications) |
radio | ترميز -تشفير في التلفاز الملون | coding in colour television |
comp., MS | تشفير الأجهزة | Device Encryption (The out-of-the-box encryption capabilities that are automatically included on PCs running Windows RT.) |
comp., MS | تشفير البيانات | data encryption (The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party) |
pwr.lines. | تشفير الخط | line encoding |
comp., MS | تشفير الرسالة | message digest (A fixed-size result that is obtained by applying a one-way mathematical function (sometimes called a hash algorithm) to an arbitrary amount of data. If there is a change in the input data, the hash changes. The hash can be used in many operations, including authentication and digital signing) |
snd.rec. | تشفير القناة | channel coding |
snd.rec. | تشفير القناة | channel encoding |
comp., MS | تشفير المحركات باستخدام BitLocker | BitLocker Drive Encryption (A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components) |
stat. | تشفير المعطيات | data coding |
comp., MS | تشفير بالمفتاح السري | secret key encryption (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
snd.rec. | تشفير رئيسى | main code |
rem.sens. | تشفير شرائط مِكشاف طيفية | sensor-band identification |
comp., MS | تشفير عن طريق بوابة الملقم | Server Gated Cryptography (An extension of the Secure Sockets Layer (SSL) that allows financial institutions with export versions of Microsoft Windows 2000 Server to use 128-bit encryption. Although SGC capabilities are built into Windows 2000 Server, a special SGC certificate is required to use SGC) |
comp., MS | تشفير غير متماثل | asymmetric encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
snd.rec. | تشفير للأصناف | category code in the DAT system |
comp., MS | تشفير مبني على القطع الناقص | elliptic curve cryptography (An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases) |
comp., MS | تشفير متماثل | symmetric encryption (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
comp., MS | تشفير مجموعة بيانات | bulk encryption (A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm) |
comp., MS | تشفير مفتاح عام | public key encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
comp., MS | تشفير من نوع 40 بت | 40-bit encryption (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
comp., MS | تشفير من نوع 128 بت | 128-bit encryption (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key) |
comp., MS | تشفير وحدة التخزين بالكامل | full volume encryption (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key) |
pwr.lines. | جهاز تشفير و فكّ رموز التشفير | PCM encoder-decoder |
pwr.lines. | جهاز تشفير و فكّ رموز التشفير | PCM codec |
el. | كلمة تشفير | code combination |
el. | كلمة تشفير | code word |
comp., MS | مجموعة تشفير | crypto set (A specific group of cryptography settings) |
comp., MS | مجموعة إعدادات تشفير | cryptographic set (A specific group of cryptography settings) |
comp., MS | مفتاح تشفير أصلي | Pairwise Master Key (A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process) |
comp., MS | مفتاح تشفير البيانات | data encryption key (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
comp., MS | مقاييس تشفير البيانات الثلاثية | Triple Data Encryption Standard (An encryption algorithm based on the Data Encryption Standard (DES)) |
comp., MS | مقاييس تشفير المفتاح العمومي | Public Key Cryptography Standards (A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc) |
comp., MS | مقياس تشفير البيانات | Data Encryption Standard (An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key) |
comp., MS | نظام تشفير الملفات | Encrypting File System (A Microsoft file-based encryption technology that enables users to encrypt files and folders on NTFS volumes. EFS helps protect the confidentiality of data by ensuring that only authorized users can decrypt the encrypted files or folders) |
comp., MS | نوع تشفير المفتاح المماثل | symmetric-key cryptography (A type of cryptography that uses symmetric keys to provide confidentiality) |
comp., MS | واجهة تشفير برمجة التطبيقات | Cryptography Application Programming Interface (An (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as (CSPs)) |