link encryption


link encryption
The application of online crypto-operation to a link of a communications system so that all information passing over the link is encrypted in its entirety.

Military dictionary. 2000.

Look at other dictionaries:

  • Link encryption — is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a teleprinter circuit or the line between two network switches). It contrasts with end to end encryption where messages… …   Wikipedia

  • Link Encryption — Online Verschlüsselung …   Acronyms

  • Link Encryption — Online Verschlüsselung …   Acronyms von A bis Z

  • Encryption Control Protocol — Das Protokoll ECP (Encryption Control Protocol) ist ein Begriff aus der Informatik. ECP ermöglicht bei einer PPP (Point to Point Protocol) eine Verschlüsselung. Beispielsweise wird mittels 3DESE (Triple DES Encryption Protocol Extension) eine… …   Deutsch Wikipedia

  • NSA encryption systems — The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA approved systems are still classified, but much more about its early systems has become …   Wikipedia

  • End-to-end encryption — Description End to end encryption (E2EE) encrypts clear (red) data at source with knowledge of the intended recipient, allowing the encrypted (black) data to travel safely through vulnerable channels (eg. public networks) to its recipient where… …   Wikipedia

  • Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering …   Wikipedia

  • AACS encryption key controversy — A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing demand letters[1] to websites… …   Wikipedia

  • Proxy re-encryption — schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so that it may be decrypted by another. Examples of UseBob could designate a proxy to re encrypt one of his messages that… …   Wikipedia

  • Homomorphic encryption — is a form of encryption where one can perform a specific algebraic operation on the plaintext by performing a (possibly different) algebraic operation on the ciphertext. Depending on one s viewpoint, this can be seen as a positive or negative… …   Wikipedia


Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.