• Novell Storage Services on Novell NetWare and Linux NTFS with Encrypting File System (EFS) for Microsoft Windows ZFS since Pool Version 30 Ext4, added in...
    8 KB (520 words) - 00:41, 17 April 2025
  • also the list of cryptographic file systems. When an operating system is running on a system without file encryption, access to files normally goes through...
    25 KB (3,061 words) - 03:56, 8 April 2024
  • enforced through the use of public-key cryptography, and the fact that cryptographic keys are only held in memory while the file that is decrypted by them...
    4 KB (493 words) - 02:23, 21 October 2024
  • information on file systems. Many older operating systems support only their one "native" file system, which does not bear any name apart from the name of the operating...
    53 KB (4,974 words) - 19:18, 13 May 2025
  • broadly used in cybersecurity, from Unix system credentials to Internet security. Salts are related to cryptographic nonces. Without a salt, identical passwords...
    13 KB (1,533 words) - 12:18, 19 January 2025
  • Thumbnail for Cryptographic hash function
    authenticated by HTTPS. Using a cryptographic hash and a chain of trust detects malicious changes to the file. Non-cryptographic error-detecting codes such...
    49 KB (6,299 words) - 20:13, 4 May 2025
  • clustering, most of which do not employ a clustered file system (only direct attached storage for each node). Clustered file systems can provide features...
    16 KB (1,744 words) - 14:41, 26 February 2025
  • maximum file size. Typical uses include storing the author of a document, the character encoding of a plain-text document, or a checksum, cryptographic hash...
    15 KB (1,741 words) - 09:33, 2 March 2025
  • of storage reserved for a file in a file system, represented as a range of block numbers, or tracks on count key data devices. A file can consist of zero...
    6 KB (742 words) - 21:21, 7 January 2025
  • Interface • Cryptographic hash function • Cryptographic key types • Cryptographic Message Syntax • Cryptographic primitive • Cryptographic protocol • Cryptographic...
    67 KB (2,932 words) - 23:20, 16 May 2025
  • about those files, such as their names, folder structure, sizes, and cryptographic hash values for verifying file integrity. The torrent system has been...
    18 KB (2,303 words) - 02:41, 12 May 2025
  • Thumbnail for Cryptography
    thought worth the effort. Cryptographic hash functions are a third type of cryptographic algorithm. They take a message of any length as input, and output...
    99 KB (10,975 words) - 11:30, 14 May 2025
  • key. In cryptography, rubber-hose cryptanalysis is a euphemism for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from...
    25 KB (2,867 words) - 23:32, 12 May 2025
  • Al-Kindi wrote a book on cryptography entitled Risalah fi Istikhraj al-Mu'amma (Manuscript for the Deciphering Cryptographic Messages), in which he described...
    53 KB (6,893 words) - 19:25, 5 May 2025
  • systems, a device file, device node, or special file is an interface to a device driver that appears in a file system as if it were an ordinary file....
    36 KB (3,375 words) - 06:11, 3 March 2025
  • "Modules In Process List - Cryptographic Module Validation Program | CSRC | CSRC". CSRC | NIST. Retrieved 2024-11-22. "Cryptographic Module Validation Program...
    46 KB (1,565 words) - 13:42, 7 May 2025
  • Build systems and operating systems may use manifest files to understand how to set up, execute, or integrate a computer program into an existing system. Furthermore...
    7 KB (870 words) - 07:30, 4 April 2025
  • time taken to calculate cryptographic hashes such as MD5 or SHA-1. SFV uses a plain text file containing one line for each file and its checksum in the...
    7 KB (686 words) - 05:46, 5 May 2025
  • Soft updates (category Computer file systems)
    among updates to file system metadata. Soft updates are an alternative to the more commonly used approach of journaling file systems. Soft updates allow...
    6 KB (716 words) - 08:22, 12 March 2024
  • identifier embedded in an audio signal Visual cryptography – Cryptographic technique Security printing – Field of the printing industry for banknotes and other...
    52 KB (6,107 words) - 08:09, 29 April 2025
  • Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
    22 KB (2,846 words) - 19:45, 6 February 2025
  • Thumbnail for Merkle tree
    Merkle tree (category Cryptographic hash functions)
    In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" node is labelled with the cryptographic hash of a data...
    15 KB (1,790 words) - 06:31, 3 March 2025
  • Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself...
    24 KB (2,852 words) - 05:01, 2 May 2025
  • Ciphertext Encryption Decryption History of cryptography Alan Turing Cipher Cryptanalysis Cryptographic primitive Cryptographic Service Provider HMAC HMAC-based...
    18 KB (1,725 words) - 19:07, 26 March 2025
  • EncFS (category Free special-purpose file systems)
    portal Disk encryption Filesystem-level encryption List of cryptographic file systems List of file systems "Releases - vgough/encfs". Retrieved 11 June 2018...
    14 KB (1,555 words) - 19:41, 13 April 2025
  • Thumbnail for Checksum
    For cryptographic systems with these two specific design goals[clarification needed], see HMAC. Check digits and parity bits are special cases of checksums...
    10 KB (1,198 words) - 23:49, 17 May 2025
  • StegFS (category Disk file systems)
    Filesystem-level encryption List of cryptographic file systems Anderson, Ross; Needham, Roger; Shamir, Adi (1998). The Steganographic File System (PDF). Lecture Notes...
    4 KB (312 words) - 16:25, 22 May 2024
  • and derivatives, as of Solaris 10. OpenAES portable C cryptographic library LibTomCrypt is a modular and portable cryptographic toolkit that provides...
    12 KB (1,295 words) - 02:53, 21 December 2024
  • change in the file is not detected by a hash comparison. In cryptography, this attack is called a preimage attack. For this purpose, cryptographic hash functions...
    6 KB (668 words) - 14:44, 6 June 2024
  • file system is a file system designed for storing files on flash memory–based storage devices. While flash file systems are closely related to file systems...
    9 KB (1,001 words) - 16:29, 20 September 2024