Data Encryption Key


Also found in: Acronyms.

Data Encryption Key

(DEK) Used for the encryption of message text and for the computation of message integrity checks (signatures).

See cryptography.
Mentioned in ?
References in periodicals archive ?
As the integrity of the credentials may be at risk following such a process, it should be noted that a key rotation of the data encryption key must then occur, as well as a change of the credentials.
Data encryption keys should be stored in encrypted format in a separate data server along with other policy information, optionally on the security administration system repository, or on the local database where the enforcement agent is installed.
In addition, Intralinks announced a new service that gives organizations exclusive control over their data encryption keys, further strengthening security and data privacy by ensuring that only the key holders can access files in a readable format.
Many Cylink customers consider the ability to recover data encryption keys critical to successful business management," Sarrat said.
In addition, data encryption keys can be managed remotely as part of the device management service.
TriCipher's unique approach is particularly well suited for payment processors because it combines management of data encryption keys for PCI compliance with strong authentication access to those keys.
Data encryption keys are not stored on the computer but are generated by a stringent authentication process based on fixed or dynamic passwords.

Full browser ?