The “Encryption” category contains cipher-related terms including the description of different types of data encryption and general considerations about data security.

  • AES
    “AES, Short for Advanced Encryption Standard, is a symmetric 128-bit block data encryption technique developed by Belgian cryptographers Joan Daemen...”
  • Cipher
    “Cipher is the generic term used to describe a means of encrypting data. In addition, the term cipher can refer to the encrypted text itself...”
  • Cryptography
    “The subject of cryptography is primarily concerned with maintaining the privacy of communications, and modern methods use a number of techniques to...”
  • Decryption
    “Decryption is a process of decoding encrypted data back to its original form using the same encryption method and most likely the same application...”
  • DES
    “DES, Short for Data Encryption Standard, a popular symmetric-key encryption method developed in 1975 and standardized by ANSI in 1981 as ANSI X.3.92...”
  • Public-key encryption
    “Public-key encryption is a special encryption method, employing two passwords instead of one. One is password is given out to public - it is used to...”

Contact Us



+1 (707) 703-13-11

Term of the Day

Backup Software Glossary

Current glossary explains various terms that you may come across while working with Handy Backup or other backup software.

Handy Backup is a backup utility for Windows Servers and PCs that is famous for its flexibility and ease of use.

The glossary contains 216 terms. The current section Encryption contains 6 terms.

Most Viewed Terms

  • DVD replication
    “ The replication of DVD discs is a process that is different of copying DVD discs. DVD replication final product is a clone or replica of...”
  • End User License Agreement
    “    The End User License Agreement - or EULA - is a legally binding contract between the developer or publisher of a software program (...”
  • MySQL Clustering
    “MySQL clustering is a technology that allows distributing the MySQL database across multiple independent nodes, to eliminate every possibility of...”

Who uses our backup software?