decryption - significado y definición. Qué es decryption
Diclib.com
Diccionario ChatGPT
Ingrese una palabra o frase en cualquier idioma 👆
Idioma:

Traducción y análisis de palabras por inteligencia artificial ChatGPT

En esta página puede obtener un análisis detallado de una palabra o frase, producido utilizando la mejor tecnología de inteligencia artificial hasta la fecha:

  • cómo se usa la palabra
  • frecuencia de uso
  • se utiliza con más frecuencia en el habla oral o escrita
  • opciones de traducción
  • ejemplos de uso (varias frases con traducción)
  • etimología

Qué (quién) es decryption - definición

PROCESS OF ENCODING INFORMATION, WHICH IS CONVERSION OF THE ORIGINAL REPRESENTATION OF THE INFORMATION, KNOWN AS PLAINTEXT, INTO AN ALTERNATIVE FORM KNOWN AS CIPHERTEXT
CipheR; Decrypt; Decryption; Decrypting; Data encryption; Encryption algorithm; Encrypt; Encrypting; Ciphertexts; Data encryption software; Decrypter; List of ciphers; Cipher algorithm; Encrypted; Encryptional wired system; Network encryption; Encryption algorithms; Decryption key; Encryption and decryption; Cryptographic algorithm; Encrypts; Cryptography algorithm; Draft:Encrytpion Algorithms
  • A simple illustration of [[public-key cryptography]], one of the most widely used forms of encryption

decryption         
<cryptography> Any procedure used in cryptography to convert ciphertext (encrypted data) into plaintext. (1995-05-10)
encrypt         
(encrypts, encrypting, encrypted)
If a document or piece of information is encrypted, it is written in a special code, so that only certain people can read it.
Account details are encrypted to protect privacy.
...a program that will encrypt the information before sending.
...encrypted signals.
VERB: be V-ed, V n, V-ed
encryption
It is currently illegal to export this encryption technology from the US.
N-UNCOUNT: oft N n
encryption         
<algorithm, cryptography> Any procedure used in cryptography to convert plaintext into ciphertext (encrypted message) in order to prevent any but the intended recipient from reading that data. Schematically, there are two classes of encryption primitives: public-key cryptography and private-key cryptography; they are generally used complementarily. Public-key encryption algorithms include RSA; private-key algorithms include the obsolescent {Data Encryption Standard}, the Advanced Encryption Standard, as well as RC4. The Unix command crypt performs a weak form of encryption. Stronger encryption programs include Pretty Good Privacy and the GNU Privacy Guard. Other closely related aspects of cryptograph include message digests. (2003-04-12)

Wikipedia

Encryption

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.

For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users.

Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often used in military messaging. Since then, new techniques have emerged and become commonplace in all areas of modern computing. Modern encryption schemes use the concepts of public-key and symmetric-key. Modern encryption techniques ensure security because modern computers are inefficient at cracking the encryption.

Ejemplos de uso de decryption
1. PGP, like all encryption algorithms, requires a password for decryption.
2. To use the US military GPS signal, US and allied forces must use special decryption software.
3. "There are other ways of getting at the conversation than brute–force decryption of the hacking," Bannerman said.
4. Decryption Verso‘s Bannerman notes that Skype calls are decrypted if they enter the traditional telephone network to communicate with regular phones, so a conversation could be intercepted there.
5. Behind its fortified walls is a major nerve centre in the Bin Laden hunt – some of the world‘s most sophisticated decryption and eavesdropping equipment.