DictionaryForumContacts

   Arabic
Terms for subject Microsoft containing تشفير | all forms | exact matches only
ArabicEnglish
برنامج تشفيرencryption provider (Software that provides encryption for sensitive data, such as passwords, in applications)
تشفير الأجهزةDevice Encryption (The out-of-the-box encryption capabilities that are automatically included on PCs running Windows RT.)
تشفير البياناتdata encryption (The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party)
تشفير الرسالةmessage digest (A fixed-size result that is obtained by applying a one-way mathematical function (sometimes called a hash algorithm) to an arbitrary amount of data. If there is a change in the input data, the hash changes. The hash can be used in many operations, including authentication and digital signing)
تشفير المحركات باستخدام BitLockerBitLocker Drive Encryption (A hardware-based security feature that prevents unauthorized access to a computer by providing full-volume encryption and integrity checking of boot components)
تشفير بالمفتاح السريsecret key encryption (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
تشفير عن طريق بوابة الملقمServer Gated Cryptography (An extension of the Secure Sockets Layer (SSL) that allows financial institutions with export versions of Microsoft Windows 2000 Server to use 128-bit encryption. Although SGC capabilities are built into Windows 2000 Server, a special SGC certificate is required to use SGC)
تشفير غير متماثلasymmetric encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
تشفير مبني على القطع الناقصelliptic curve cryptography (An approach to public key cryptography based on properties of elliptic curves. The primary advantage of ECC is efficiency, which becomes important as devices get smaller and security requirements get more demanding. For example, ECC keys between 163 bits and 512 bits are one-sixth to one-thirtieth the size of equivalent security-level RSA keys. As key size increases the relative efficiency of ECC increases)
تشفير متماثلsymmetric encryption (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
تشفير مجموعة بياناتbulk encryption (A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm)
تشفير مفتاح عامpublic key encryption (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
تشفير من نوع 40 بت40-bit encryption (A low level of encryption that uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
تشفير من نوع 128 بت128-bit encryption (A high level of encryption that uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key)
تشفير وحدة التخزين بالكاملfull volume encryption (The process of converting volumes into a coded form so they cannot be read without first authenticating to Windows; or, if on different hardware, without an escrowed recovery key)
مجموعة تشفيرcrypto set (A specific group of cryptography settings)
مجموعة إعدادات تشفيرcryptographic set (A specific group of cryptography settings)
مفتاح تشفير أصليPairwise Master Key (A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process)
مفتاح تشفير البياناتdata encryption key (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
مقاييس تشفير البيانات الثلاثيةTriple Data Encryption Standard (An encryption algorithm based on the Data Encryption Standard (DES))
مقاييس تشفير المفتاح العموميPublic Key Cryptography Standards (A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc)
مقياس تشفير البياناتData Encryption Standard (An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key)
نظام تشفير الملفاتEncrypting File System (A Microsoft file-based encryption technology that enables users to encrypt files and folders on NTFS volumes. EFS helps protect the confidentiality of data by ensuring that only authorized users can decrypt the encrypted files or folders)
نوع تشفير المفتاح المماثلsymmetric-key cryptography (A type of cryptography that uses symmetric keys to provide confidentiality)
واجهة تشفير برمجة التطبيقاتCryptography Application Programming Interface (An (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as (CSPs))