• Novell Storage Services on Novell NetWare and Linux NTFS with Encrypting File System (EFS) for Microsoft Windows ZFS since Pool Version 30 Ext4, added in...
    8 KB (517 words) - 04:16, 19 July 2024
  • also the list of cryptographic file systems. When an operating system is running on a system without file encryption, access to files normally goes through...
    25 KB (3,061 words) - 03:56, 8 April 2024
  • enforced through the use of public-key cryptography, and the fact that cryptographic keys are only held in memory while the file that is decrypted by them...
    4 KB (493 words) - 02:23, 21 October 2024
  • about those files, such as their names, folder structure, sizes, and cryptographic hash values for verifying file integrity. The torrent system has been...
    18 KB (2,303 words) - 11:05, 18 October 2024
  • information on file systems. Many older operating systems support only their one "native" file system, which does not bear any name apart from the name of the operating...
    51 KB (4,794 words) - 21:25, 20 December 2024
  • Thumbnail for Cryptographic hash function
    authenticated by HTTPS. Using a cryptographic hash and a chain of trust detects malicious changes to the file. Non-cryptographic error-detecting codes such...
    48 KB (6,237 words) - 18:02, 5 December 2024
  • broadly used in cybersecurity, from Unix system credentials to Internet security. Salts are related to cryptographic nonces. Without a salt, identical passwords...
    13 KB (1,533 words) - 23:19, 23 October 2024
  • Interface • Cryptographic hash function • Cryptographic key types • Cryptographic Message Syntax • Cryptographic primitive • Cryptographic protocol • Cryptographic...
    67 KB (2,933 words) - 12:41, 17 October 2024
  • Thumbnail for Cryptography
    thought worth the effort. Cryptographic hash functions are a third type of cryptographic algorithm. They take a message of any length as input, and output...
    99 KB (10,936 words) - 03:34, 14 December 2024
  • StegFS (category Disk file systems)
    Filesystem-level encryption List of cryptographic file systems Anderson, Ross; Needham, Roger; Shamir, Adi (1998). The Steganographic File System (PDF). Lecture Notes...
    4 KB (312 words) - 16:25, 22 May 2024
  • change in the file is not detected by a hash comparison. In cryptography, this attack is called a preimage attack. For this purpose, cryptographic hash functions...
    6 KB (668 words) - 14:44, 6 June 2024
  • Build systems and operating systems may use manifest files to understand how to set up, execute, or integrate a computer program into an existing system. Furthermore...
    7 KB (836 words) - 17:36, 12 December 2024
  • clustering, most of which do not employ a clustered file system (only direct attached storage for each node). Clustered file systems can provide features...
    16 KB (1,744 words) - 12:21, 28 August 2024
  • key. In cryptography, rubber-hose cryptanalysis is a euphemism for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from...
    24 KB (2,832 words) - 16:35, 5 September 2024
  • of storage reserved for a file in a file system, represented as a range of block numbers, or tracks on count key data devices. A file can consist of zero...
    6 KB (738 words) - 16:27, 18 December 2024
  • maximum file size. Typical uses include storing the author of a document, the character encoding of a plain-text document, or a checksum, cryptographic hash...
    15 KB (1,741 words) - 20:46, 10 December 2024
  • Thumbnail for Merkle tree
    Merkle tree (category Cryptographic hash functions)
    In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" node is labelled with the cryptographic hash of a data...
    15 KB (1,788 words) - 20:42, 10 September 2024
  • Mail (PEM) is a de facto file format for storing and sending cryptographic keys, certificates, and other data, based on a set of 1993 IETF standards defining...
    5 KB (591 words) - 12:55, 17 December 2023
  • attack Comparison of encrypted external drives Disk encryption software Disk encryption theory List of cryptographic file systems "Jetico Mission". Jetico...
    70 KB (2,834 words) - 03:57, 22 December 2024
  • Thumbnail for InterPlanetary File System
    IPFS uniquely identifies each file in a global namespace that connects IPFS hosts, creating a resilient system of file storage and sharing. IPFS allows...
    22 KB (1,827 words) - 14:00, 10 December 2024
  • time taken to calculate cryptographic hashes such as MD5 or SHA-1. SFV uses a plain text file containing one line for each file and its checksum in the...
    7 KB (685 words) - 07:55, 12 November 2023
  • EncFS (category Free special-purpose file systems)
    portal Disk encryption Filesystem-level encryption List of cryptographic file systems List of file systems "Releases - vgough/encfs". Retrieved 11 June 2018...
    13 KB (1,536 words) - 14:19, 4 October 2024
  • Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
    22 KB (2,846 words) - 07:57, 27 March 2024
  • Thumbnail for Checksum
    functions List of hash functions Luhn algorithm Parity bit Rolling checksum Verhoeff algorithm File systems ZFS – a file system that performs automatic file integrity...
    10 KB (1,195 words) - 18:05, 10 December 2024
  • operating systems that lets non-privileged users create their own file systems without editing kernel code. This is achieved by running file system code in...
    15 KB (1,534 words) - 16:32, 24 July 2024
  • "Modules In Process List - Cryptographic Module Validation Program | CSRC | CSRC". CSRC | NIST. Retrieved 2024-11-22. "Cryptographic Module Validation Program...
    43 KB (1,526 words) - 20:52, 26 November 2024
  • Al-Kindi wrote a book on cryptography entitled Risalah fi Istikhraj al-Mu'amma (Manuscript for the Deciphering Cryptographic Messages), in which he described...
    51 KB (6,711 words) - 01:56, 19 December 2024
  • verifiable (E2E) systems are voting systems with stringent integrity properties and strong tamper resistance. E2E systems use cryptographic techniques to...
    23 KB (2,626 words) - 04:51, 29 October 2024
  • systems, a device file, device node, or special file is an interface to a device driver that appears in a file system as if it were an ordinary file....
    36 KB (3,365 words) - 08:59, 1 November 2024
  • CAS systems work by passing the content of the file through a cryptographic hash function to generate a unique key, the "content address". The file system's...
    23 KB (3,217 words) - 22:26, 12 March 2024