encryption


Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Acronyms, Wikipedia.

encryption

[en′krip·shən]
(computer science)
The coding of a clear text message by a transmitting unit so as to prevent unauthorized eavesdropping along the transmission line; the receiving unit uses the same algorithm as the transmitting unit to decode the incoming message.

encryption

(algorithm, cryptography)
Any procedure used in cryptography to convert plaintext into ciphertext (encrypted message) in order to prevent any but the intended recipient from reading that data.

Schematically, there are two classes of encryption primitives: public-key cryptography and private-key cryptography; they are generally used complementarily. Public-key encryption algorithms include RSA; private-key algorithms include the obsolescent Data Encryption Standard, the Advanced Encryption Standard, as well as RC4.

The Unix command crypt performs a weak form of encryption. Stronger encryption programs include Pretty Good Privacy and the GNU Privacy Guard.

Other closely related aspects of cryptograph include message digests.

encryption

The reversible transformation of data from the original (plaintext) to a difficult-to-interpret format (ciphertext) as a mechanism for protecting its confidentiality, integrity and sometimes its authenticity. Encryption uses an encryption algorithm and one or more encryption keys. See encryption algorithm and cryptography.
References in periodicals archive ?
The global Encryption Software Market has been segmented on the basis of deployment, service, organization size, application and vertical.
What these governments are asking for would likely require tech companies to weaken the encryption algorithm to make it easy for law enforcement to break, or weaken how that encryption algorithm is implemented to make it easy for law enforcement to bypass.
Limits to encryption must be necessary, legal, legitimate and proportional, the report said.
Like BitLocker and FileVault, VeraCrypt is designed as a complete drive or partition encryption tool and not for the encryption of individual files or folders.
Other key findings include: encryption use in the Middle East over the past 12 months has seen the most significant growth for private cloud infrastructure (up 17 per cent), docker containers and backups/archives both up by eight per cent; 37 per cent of organisations are currently using or planning to use HSMs for public cloud encryption including Bring Your Own Key (BYOK), followed by application level encryption (35 per cent) and database encryption (32 per cent)
* The majority of organisations (51 per cent) will only use keys for data-at-rest encryption that they control
To protect stored data, Jetico's BestCrypt (https://www.jetico.com/data-encryption/encrypt-files-bestcrypt-container-encryption) delivers compliant data encryption software for whole disks, virtual drives and selected files or folders.
Privacy advocates should brace themselves for another round of demands for an end to powerful encryption in the hands of private citizens.
This exceptionally long distance was intentionally chosen to test the audio and call quality, with and without encryption, in a high latency environment.
"It impacts investigations across the board -- narcotics, human trafficking, counterterrorism, counterintelligence, gangs, organized crime, child exploitation," Wray said while acknowledging "encryption that frustrates forensic investigations will be a fact of life from now on for law enforcement agencies."
The report, issued in conjunction with the Ponemon Institute, investigates the encryption deployment plans of Middle East businesses, the decision makers responsible for setting encryption strategy, and the use of encryption to secure data within enterprise and cloud applications.