encryption

(redirected from Cipher algorithm)
Also found in: Thesaurus, Medical, Financial, Encyclopedia.
Related to Cipher algorithm: ciphered

en·cryp·tion

 (ĕn-krĭp′shən)
n. Computers
1. The process or result of encrypting data.
2. Cryptography.
American Heritage® Dictionary of the English Language, Fifth Edition. Copyright © 2016 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.encryption - the activity of converting data or information into codeencryption - the activity of converting data or information into code
coding, steganography, cryptography, secret writing - act of writing in code or cipher
compression - encoding information while reducing the bandwidth or bits required
data encryption - (computer science) the encryption of data for security purposes
Based on WordNet 3.0, Farlex clipart collection. © 2003-2012 Princeton University, Farlex Inc.
Translations

encryption

[ɪnˈkrɪpʃən] Ncodificación f
Collins Spanish Dictionary - Complete and Unabridged 8th Edition 2005 © William Collins Sons & Co. Ltd. 1971, 1988 © HarperCollins Publishers 1992, 1993, 1996, 1997, 2000, 2003, 2005

encryption

[ɪnˈkrɪpʃən]
n [data, message] → cryptage m
modif [technology, software, program] → de cryptage; [code] → de cryptage
Collins English/French Electronic Resource. © HarperCollins Publishers 2005

encryption

n (Comput, Telec, TV) → Verschlüsselung f; encryption program/systemVerschlüsselungsprogramm nt/-system nt
Collins German Dictionary – Complete and Unabridged 7th Edition 2005. © William Collins Sons & Co. Ltd. 1980 © HarperCollins Publishers 1991, 1997, 1999, 2004, 2005, 2007
References in periodicals archive ?
Blowfish is referred to as a robust general-purpose keyed symmetric block cipher algorithm that can be used as an informal replacement for DES or IDEA.
In this article, we highlight the wireless network security by tow strong cryptographic primitives: random stream cipher algorithm and dynamic integrity check code DCRCn(M,G).
For example, a block cipher algorithm involves cryptographic algorithms, KEYs, initial vectors, working modes, etc.
Zaizi, "A New Proposed Design of a Stream Cipher Algorithm: Modified Grain - 128, " vol.
Modern cryptography technique, in which block cipher algorithm is an important research direction, is an effective way to guarantee the safety of information, since then many researchers have developed a lot of block cipher algorithms.
This algorithm is one of the RC4 stream cipher algorithm which can reduce the correlation problem between the publicly known outputs of the internal state and, therefore, improves the speed of encryption and decryption.
Section 2 discusses the quantum shift register and how to generate a matrix code used in the Diffie-Hellman algorithm to match the key between Alice and Bob to be used later in the Hill cipher algorithm [1] and then generate another matrix code used as a one-time pad (OTP).
As a result, when a cipher algorithm is applied in field of data transmission from PHD to gateway, it takes approximately 0.078 seconds longer on average compared to before.
After that, it encrypts into a block cipher algorithm which is the same as AES or Blowfish by using a common secret key which the PHD and the gateway allocate in advance.
proposed a symmetric key block cipher algorithm which includes a step that simulates ideas from the processes of transcription (transfer from DNA to mRNA) and translation (from mRNA into amino acids) [13].
recently announced that CLEFIA, the block cipher algorithm it developed and presented as a state-of-the-art cryptography technique in 2007, has been adopted as one of the ISO/IEC 29192 International Standards in lightweight cryptography after the final approval of ISO (International Organization for Standardization)/IEC (International Electrotechnical Commission).