DictionaryForumContacts

   Arabic
Terms containing تشفير | all forms | exact matches only
SubjectArabicEnglish
comp., MSبرنامج تشفيرencryption provider (Software that provides encryption for sensitive data, such as passwords, in applications)
radioترميز -تشفير في التلفاز الملونcoding in colour television
comp., MSتشفير الأجهزةDevice Encryption (The out-of-the-box encryption capabilities that are automatically included on PCs running Windows RT.)
comp., MSتشفير البياناتdata encryption (The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party)
pwr.lines.تشفير الخطline encoding
comp., MSتشفير الرسالةmessage digest (A fixed-size result that is obtained by applying a one-way mathematical function (sometimes called a hash algorithm) to an arbitrary amount of data. If there is a change in the input data, the hash changes. The hash can be used in many operations, including authentication and digital signing)
snd.rec.تشفير القناةchannel coding
snd.rec.تشفير القناةchannel encoding
comp., MSتشفير المحركات باستخدام BitLockerBitLocker Drive Encryption (A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components)
stat.تشفير المعطياتdata coding
comp., MSتشفير بالمفتاح السريsecret key encryption (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
snd.rec.تشفير رئيسىmain code
rem.sens.تشفير شرائط مِكشاف طيفيةsensor-band identification
comp., MSتشفير عن طريق بوابة الملقمServer Gated Cryptography (An extension of the Secure Sockets Layer (SSL) that allows financial institutions with export versions of Microsoft Windows 2000 Server to use 128-bit encryption. Although SGC capabilities are built into Windows 2000 Server, a special SGC certificate is required to use SGC)
comp., MSتشفير غير متماثلasymmetric encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
snd.rec.تشفير للأصنافcategory code in the DAT system
comp., MSتشفير مبني على القطع الناقصelliptic curve cryptography (An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases)
comp., MSتشفير متماثلsymmetric encryption (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
comp., MSتشفير مجموعة بياناتbulk encryption (A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm)
comp., MSتشفير مفتاح عامpublic key encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
comp., MSتشفير من نوع 40 بت40-bit encryption (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
comp., MSتشفير من نوع 128 بت128-bit encryption (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
comp., MSتشفير وحدة التخزين بالكاملfull volume encryption (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key)
pwr.lines.جهاز تشفير و فكّ رموز التشفيرPCM encoder-decoder
pwr.lines.جهاز تشفير و فكّ رموز التشفيرPCM codec
el.كلمة تشفيرcode combination
el.كلمة تشفيرcode word
comp., MSمجموعة تشفيرcrypto set (A specific group of cryptography settings)
comp., MSمجموعة إعدادات تشفيرcryptographic set (A specific group of cryptography settings)
comp., MSمفتاح تشفير أصليPairwise Master Key (A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process)
comp., MSمفتاح تشفير البياناتdata encryption key (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
comp., MSمقاييس تشفير البيانات الثلاثيةTriple Data Encryption Standard (An encryption algorithm based on the Data Encryption Standard (DES))
comp., MSمقاييس تشفير المفتاح العموميPublic Key Cryptography Standards (A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc)
comp., MSمقياس تشفير البياناتData Encryption Standard (An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key)
comp., MSنظام تشفير الملفاتEncrypting File System (A Microsoft file-based encryption technology that enables users to encrypt files and folders on NTFS volumes. EFS helps protect the confidentiality of data by ensuring that only authorized users can decrypt the encrypted files or folders)
comp., MSنوع تشفير المفتاح المماثلsymmetric-key cryptography (A type of cryptography that uses symmetric keys to provide confidentiality)
comp., MSواجهة تشفير برمجة التطبيقاتCryptography Application Programming Interface (An (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as (CSPs))