encryption key

collocation in English

meaningsofencryptionandkey

These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withkey.
encryption
noun[U]
uk
/ɪnˈkrip.ʃən/
us
/ɪnˈkrip.ʃən/
the process of changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use without ...
See more atencryption
key
noun[C]
uk
/kiː/
us
/kiː/
a piece of metal that has been cut into a special shape and is used for opening or closing a lock, starting a car ...
See more atkey

(Definition ofencryptionandkeyfrom theCambridge English Dictionary© Cambridge University Press)

Examplesofencryption key

These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
The password allows the individual to access the information, but theencryptionkeyis never seen.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
What is described in the first limb seems to be anencryptionkey.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
It is generated by theencryptionkey.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Theencryptionkeyis based on this password.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
However, the hackers have no control of theencryptionkey.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
If the person refuses to hand over theencryptionkey, there is a maximum two-year sentence.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
The length and strength of theencryptionkeyis also an important consideration.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Signature is designed so that theencryptionkeyis stored randomly in the flash memory.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Once they have obtained thatencryptionkey, they can decrypt encrypted data at rest.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Anencryptionkeymay not be exported and used to decrypt the ciphertext which is encrypted.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Passphrases are particularly applicable to systems that use the passphrase as anencryptionkey.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Theencryptionkey(public key) need not be kept secret and can be published.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
This often involves the use of anencryptionkeyas well.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
No one can be required to deposit anyencryptionkey—that protects the confidentiality of their information—with a third party.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
What will happen to all those innocent business men and women who have encrypted material with anencryptionkeyinvolving letters and figures, but who cannot remember it?
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
He had been required, under this act, to provide his 50-characterencryptionkeybut had not complied.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
For technical reasons, an encryption scheme usually uses a pseudo-randomencryptionkeygenerated by an algorithm.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The hidden volume has its own separate file system, password, andencryptionkeydistinct from the container volume.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
When a secretencryptionkeyis pseudorandomly generated, having the seed will allow one to obtain the key.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
If anencryptionkeyis lost, a backup or key escrow should be utilized to continue viewing encrypted content.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
In such a cryptosystem, theencryptionkeyis public and differs from the decryption key which is kept secret.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
This allows the sender to have plausible deniability if compelled to give up his or herencryptionkey.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Clause 49 makes it an offence punishable by two years' imprisonment to fail to comply with a notice that requires the production of a key to coded information—anencryptionkey.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofencryption
Go to the definition ofkey
See other collocations withkey