Lines Matching refs:encryption
14 encryption
26 Cryptographic operations where encryption and decryption use the same
31 Cryptographic operations where encryption and decryption use different
32 keys. There are separate encryption and decryption keys. Typically
33 encryption is performed using a :term:`public key`, and it can then be
55 individual (or program). Like encryption, authentication can be either
57 encryption.
60 This is a property of encryption systems whereby two encrypted messages
61 aren't distinguishable without knowing the encryption key. This is
62 considered a basic, necessary property for a working encryption system.
78 operations such as encryption, decryption, signing, and verification,