Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

encryption

Abbreviation(s) and Synonym(s):

None

Definition(s):

  The cryptographic transformation of data to produce ciphertext.
Source(s):
CNSSI 4009-2015 ISO/IEC 7498-2
NIST SP 800-12 Rev. 1 under Encryption ISO 7498-2

  Cryptographic transformation of data (called “plaintext”) into a form (called “ciphertext”) that conceals the data’s original meaning to prevent it from being known or used. If the transformation is reversible, the corresponding reversal process is called “decryption,” which is a transformation that restores encrypted data to its original state.
Source(s):
NIST SP 800-82 Rev. 2 under Encryption RFC 4949

  Any procedure used in cryptography to convert plain text into cipher text to prevent anyone but the intended recipient from reading that data.
Source(s):
NIST SP 800-101 Rev. 1 under Encryption
NIST SP 800-72 under Encryption

  The process of changing plaintext into ciphertext using a cryptographic algorithm and key.
Source(s):
NIST SP 800-133 under Encryption
NIST SP 800-133 Rev.1 under Encryption
NIST SP 800-57 Part 1 Rev. 4 under Encryption
NIST SP 800-57 Part 2 under Encryption
NIST SP 800-57 Part 2 Rev.1 under Encryption
NIST SP 800-57 Part 1 Rev. 3 under Encryption [Superseded]

  The process of transforming plaintext into ciphertext.
Source(s):
NIST SP 800-20 under Encryption
NIST SP 800-67 Rev. 2 under Encryption
NIST SP 800-67 Rev. 1 under Encryption [Superseded]

  The process of a confidentiality mode that transforms usable data into an unreadable form.
Source(s):
NIST SP 800-38A under Encryption (Enciphering)

  The translation of data into a form that is unintelligible without a deciphering mechanism.
Source(s):
NIST SP 800-47 under Encryption

  The process of transforming plaintext into ciphertext using a cryptographic algorithm and key.
Source(s):
NIST SP 800-56B Rev. 2 under Encryption
NIST SP 800-56B Rev. 1 under Encryption [Superseded]

  The process of changing plaintext into ciphertext.
Source(s):
NISTIR 7621 Rev. 1 under Encryption CNSSI 4009-2015, ISO/IEC 7498-2