42 Results for:RSA
- Sort by:
RSA algorithm (Rivest-Shamir-Adleman)
The RSA algorithm (Rivest-Shamir-Adleman) is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is... Read Full Definition
Associated Glossaries
elliptical curve cryptography (ECC)
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys. Read Full Definition
Associated Glossaries
Public-Key Cryptography Standards (PKCS)
Public-Key Cryptography Standards (PKCS) are a set of standard protocols, numbered from 1 to 15. Read Full Definition
Associated Glossaries
asymmetric cryptography
Asymmetric cryptography, also known as public key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from ... Read Full Definition
Associated Glossaries
Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified information. Read Full Definition
Associated Glossaries
Encrypting File System (EFS)
Encrypting File System (EFS) provides an added layer of protection by encrypting files or folders on various versions of the Microsoft Windows OS. Read Full Definition
Associated Glossaries
post-quantum cryptography
Post-quantum cryptography, also known as quantum encryption, is the development of cryptographic systems for classical computers that can prevent attacks launched by quantum computers. Read Full Definition
Associated Glossaries
Trusted Platform Module (TPM)
A Trusted Platform Module (TPM) is a specialized chip on a device designed to secure hardware with cryptographic keys. Read Full Definition
Associated Glossaries
LEAP (Lightweight Extensible Authentication Protocol)
LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections. LEAP is designed to provide more ... Read Full Definition
Dell EMC
Dell EMC is an American multinational technology company that offers products and services across all areas of computing, networking and storage. Read Full Definition
Associated Glossaries