encryption key
collocation in Englishmeaningsofencryptionandkey
These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withkey.
encryption
noun[U]
uk/ɪnˈkrip.ʃən/us/ɪnˈkrip.ʃən/
the process of changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use without ...
See more atencryption
key
noun[C]
uk/kiː/us/kiː/
a piece of metal that has been cut into a special shape and is used for opening or closing a lock, starting a car ...
See more atkey
(Definition ofencryptionandkeyfrom theCambridge English Dictionary© Cambridge University Press)
Examplesofencryption key
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
The password allows the individual to access the information, but theencryptionkeyis never seen.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
What is described in the first limb seems to be anencryptionkey.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
It is generated by theencryptionkey.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Theencryptionkeyis based on this password.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
However, the hackers have no control of theencryptionkey.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
If the person refuses to hand over theencryptionkey, there is a maximum two-year sentence.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
The length and strength of theencryptionkeyis also an important consideration.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Signature is designed so that theencryptionkeyis stored randomly in the flash memory.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Once they have obtained thatencryptionkey, they can decrypt encrypted data at rest.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Anencryptionkeymay not be exported and used to decrypt the ciphertext which is encrypted.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Passphrases are particularly applicable to systems that use the passphrase as anencryptionkey.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Theencryptionkey(public key) need not be kept secret and can be published.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
This often involves the use of anencryptionkeyas well.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
No one can be required to deposit anyencryptionkey—that protects the confidentiality of their information—with a third party.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
What will happen to all those innocent business men and women who have encrypted material with anencryptionkeyinvolving letters and figures, but who cannot remember it?
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
He had been required, under this act, to provide his 50-characterencryptionkeybut had not complied.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
For technical reasons, an encryption scheme usually uses a pseudo-randomencryptionkeygenerated by an algorithm.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The hidden volume has its own separate file system, password, andencryptionkeydistinct from the container volume.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
When a secretencryptionkeyis pseudorandomly generated, having the seed will allow one to obtain the key.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
If anencryptionkeyis lost, a backup or key escrow should be utilized to continue viewing encrypted content.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
In such a cryptosystem, theencryptionkeyis public and differs from the decryption key which is kept secret.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
This allows the sender to have plausible deniability if compelled to give up his or herencryptionkey.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Clause 49 makes it an offence punishable by two years' imprisonment to fail to comply with a notice that requires the production of a key to coded information—anencryptionkey.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofencryption
Go to the definition ofkey
See other collocations withkey