encryption

(redirected from Cipher algorithm)
Also found in: Dictionary, Thesaurus, Medical, Encyclopedia.
Related to Cipher algorithm: ciphered

Encryption

The coding of sensitive information for transfer online or otherwise electronically. One may encrypt data to prevent anyone other than the intended recipient from accessing it. For example, if one buys a product online and enters credit card information into an electronic form, that information is usually encrypted so hackers and potential identity thieves cannot use it for illicit purposes.

encryption

The manipulation of data to prevent accurate interpretation by all but those for whom the data is intended. Financial institutions use encryption to increase the security of data transmitted via the Internet.
Mentioned in ?
References in periodicals archive ?
Key schedule algorithm is an important part of any block cipher algorithm and its strength directly affects the security of the cipher.
In practice cipher algorithms are publically known so the security of entire cryptosystem depends on the concealment of the secret or primary key.
MISTY was among 6 other types from 4 different countries to be adopted as a cipher algorithm standard.
Keyparc protected files have contents encrypted by strong cipher algorithms where in a worst case scenario if the contents are exposed to unauthorized parties, the secret contents remain private and safe.
These are the first international standard cipher algorithms selected by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC).
Good gigabit solutions for the mid-range enterprise requires that the security processor off-load the computationally intensive cipher algorithms from the NPU or CPU, thereby reducing both total system power consumption and cost," said Eric Mantion, senior analyst at In Stat/MDR.
Navaho Lock uses symmetric (secret key) encryption, and will be followed by Navaho Lock Enterprise Edition with added features such as Administrative Controls, File Authorization, Public Key (for asymmetric key transmission), full Intranet and Extranet functionality, and additional cipher algorithms.