Examples of using Encryption and decryption in English and their translations into Korean
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Encryption and decryption.
Option 1: Native encryption and decryption.
The encryption and decryption of data only happens on your browser.
Encrypted email, with seamless encryption and decryption;
Encryption and decryption of data always happens locally on your device upon login.
ㆍ Easy to Use Encryption and Decryption(AES256).
You can chose 128, 192 or 256-bit long key size for encryption and decryption.
The private key is used for encryption and decryption along with the certificate.
Only administrators with encryption privileges can perform encryption and decryption tasks.
The encryption and decryption operations are scheduled on background threads by SQL Server.
Either key can be used for encryption and decryption.
Encryption and decryption is done on the drive, with no trace left on the host system,and the drive locks down and reformats after 10 invalid attempts to protect against brute force attacks.
Because of the symmetry of the XOR operation, encryption and decryption are exactly the same.
Intel® AES New Instructions(Intel® AES-NI) are a set of instructions that enable fast and secure data encryption and decryption.
The same key is used for encryption and decryption, and the decryption key is stored in the file.
This is the‘one way function' at the heart of ElGamal's encryption and decryption algorithms.
A good example of this is encryption and decryption of data for secure transmission- this happens at Layer 6.
These two keys, or"key pair" as they are called, are used together in encryption and decryption operations.
AESCryptoServiceProvider Performs symmetric encryption and decryption using the Cryptographic Application Programming Interfaces(CAPI) implementation of the Advanced Encryption Standard(AES) algorithm.
A symmetric key is one key that is used for both encryption and decryption.
The TS-853 Pro's fast encryption and decryption performance provides transfer speeds of up to 70MB/s with AES-256 bit volume encryption, boosting system performance& security while ensuring the safety of sensitive business data stored in the TS-853 Pro.
It performs real-time, automatic I/O encryption and decryption of the data and log files.
In contrast"symmetric" key schemes utilize the same key(or trivially transformed keys) for both encryption and decryption.
There is an option to use FIPS 140-2 validated libraries for the protection(encryption and decryption) of the local data that is stored by JSONStore and for the HTTPS communication to the MobileFirst Server.
Walkthrough: Creating a Cryptographic Application Demonstrates basic encryption and decryption tasks.
The TS-851's fast encryption and decryption performance provides transfer speeds of up to 68MB/s with AES-256 bit volume encryption, boosting system performance& security while ensuring the safety of sensitive personal data stored in the TS-851. When installed with the latest dual-band 2.4GHz/5GHz 802.11ac Wi-Fi network card, the TS-851 can offer remarkably high speeds for transferring large amount of files and streaming bandwidth-consuming multimedia.
A hash of the passphrase, stored in the server file system, is used to retrieve the keys during the encryption and decryption of data.
At-rest" database encryption helps protect against the threat of malicious activity by performing real-time encryption and decryption of the database, associated backups, and transaction log files at rest without requiring changes to the application.
Rather than using the same key to both encrypt and decrypt the data, the RSA system uses a matched pair of encryption and decryption keys.
However, to fully shield these channels from tampering and also to provide the processing speed needed for real-time encryption and decryption, electronic solutions such as secure elements and microcontrollers with built-in security modules are required.