- public-key algorithm
- алгоритм шифрования открытым ключом (доступным группе пользователей)
Большой англо-русский и русско-английский словарь. 2001.
Большой англо-русский и русско-английский словарь. 2001.
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Public key certificate — Diagram of an example usage of digital certificate In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document which uses a digital signature to bind a public key with an… … Wikipedia
Public key infrastructure — In cryptography, a public key infrastructure (PKI) is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through … Wikipedia
Public-Key-Verschlüsselungsverfahren — Ein Public Key Verschlüsselungsverfahren ist ein asymmetrisches Verschlüsselungsverfahren, also ein kryptographisches Verfahren, um mit einem öffentlichen Schlüssel einen Klartext in einen Geheimtext umzuwandeln, aus dem der Klartext mit einem… … Deutsch Wikipedia
Symmetric-key algorithm — Symmetric key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.The encryption key is trivially related to the decryption key, in that they may … Wikipedia
public key system — (PKS) An asymmetrical, two key encryption algorithm that transforms data from plain text to cipher text with one key that is made public, and converts cipher text back to plain text with a different key that remains secret … IT glossary of terms, acronyms and abbreviations
public key cryptography — noun a method of encryption of electronic data sent from one person to another which relies on two authentication keys, one public and one private, the two keys being connected by an algorithm which makes the combination unique, neither key being …
Key generation — is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Modern cryptographic systems include symmetric key algorithms (such as DES and AES) and public key algorithms… … Wikipedia
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… … Wikipedia