Best of email security 2013

Email Security Guidelines, Encryption and Appliances

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is an encryption algorithm for securing sensitive but unclassified material by U.S. Government agencies and, as a likely consequence, may eventually become the de facto encryption standard for commercial transac... 

  • Twofish

    Twofish is an encryption algorithm based on an earlier algorithm, Blowfish, and was a finalist for a NIST Advanced Encryption Standard (AES) algorithm to replace the DES algorithm. 

  • Defense Message System (DMS)

    The Defense Message System (DMS) is a secure X.400-based e-mail system developed by the United States government in conjunction with industry partners to ensure safety for critical operations. 

  • Internet Key Exchange (IKE)

    The Internet Key Exchange (IKE) is an IPsec (Internet Protocol Security) standard protocol used to ensure security for virtual private network (VPN) negotiation and remote host or network access. 

  • data encryption/decryption IC

    A data encryption/decryption IC is a specialized integrated circuit (IC) that can encrypt outgoing data and decrypt incoming data... 

  • asymmetric cryptography (public-key cryptography)

    Asymmetric cryptography is cryptography in which a pair of keys is used to encrypt and decrypt a message so that it arrives securely. Initially, a network user requests a public and private key pair. A user who wants to send an encrypted message can... 

  • Diffie-Hellman key exchange (exponential key exchange)

    Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code break... 

  • private key (secret key)

    In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. 

  • salt

    In password protection, salt is a random string of data used to modify a password hash. 

  • passphrase

    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a mes... 

  • See more Definitions on Email Security Guidelines, Encryption and Appliances
About Email Security Guidelines, Encryption and Appliances

Build an email security strategy and policy and get tips on security guidelines. Learn about email encryption (SMIME and PGP), appliances, authentication, software, filtering and antispam and antivirus.