encryption

(redirected from Encryption algorithm)
Also found in: Thesaurus, Medical, Legal, Financial, Encyclopedia.

en·cryp·tion

 (ĕn-krĭp′shən)
n. Computers
1. The process or result of encrypting data.
2. Cryptography.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.encryption - the activity of converting data or information into codeencryption - the activity of converting data or information into code
coding, steganography, cryptography, secret writing - act of writing in code or cipher
compression - encoding information while reducing the bandwidth or bits required
data encryption - (computer science) the encryption of data for security purposes
Translations

encryption

[ɪnˈkrɪpʃən] Ncodificación f

encryption

[ɪnˈkrɪpʃən]
n [data, message] → cryptage m
modif [technology, software, program] → de cryptage; [code] → de cryptage

encryption

n (Comput, Telec, TV) → Verschlüsselung f; encryption program/systemVerschlüsselungsprogramm nt/-system nt
References in periodicals archive ?
(2) In order to ensure the safety of the students' information, the fingerprint characteristic value is encrypted and transmitted, using the improved AES encryption algorithm [4], which has the same security guarantee with traditional AES algorithm but reduces the required time for encryption.
In recent years, combined with the dual advantage of the DNA molecule and chaotic systems, an image encryption algorithm based on DNA molecules and chaotic systems is presented.
In paper [9], to evaluate the performance of the encryption algorithm for text files, it uses AES, DES and RSA algorithm and the parameters such as computation time, memory usage, and output bytes are considered.
This shows that the correlation between the encrypted image after the adoption of this encryption algorithm and the original image is very low.
In this paper, along the chaos-based pipeline, we propose an image encryption algorithm based on the cross diffusion of two chaotic maps, namely the Logistic map and the Chebyshev map.
The fourth type of encryption algorithm is called blow fish, which is being used very commonly and introduced by Bruce Shenier (Schneier, 1993; Kazys, 2015).
What these governments are asking for would likely require tech companies to weaken the encryption algorithm to make it easy for law enforcement to break, or weaken how that encryption algorithm is implemented to make it easy for law enforcement to bypass.
The Advanced Encryption Standard (AES) is a symmetric encryption algorithm and one of the most secure.
In addition, the vulnerabilities proved on AES encryption algorithm or that liked to error propagation caused by CBC mode make its security in the critical situation.
Multifarious chaos-based image encryption algorithms have been developed up to now, such as in [1-6]; however a few of them have referred to the image encryption algorithm based on fractional discrete chaotic map accompanied with Elliptic Curve Cryptography (ECC).
Therefore, traditional methods such as advanced encryption standard (AES), data encryption standard (DES), or international data encryption algorithm (IDEA) are not effective options for image encryption [3, 4].