A method of encryption in which the same key is used for both encryption and decryption of the data.
A method of encryption in which two different keys are used: one for encrypting and one for decrypting the data (e.g., public-key encryption).
An algorithm that does not require a key and produces an irreversibly encrypted cipher-text. Other names for this algorithm are message digest, fingerprint, digital signature and compression function.
A. Restricted data which is encrypted and stored on Longwood-managed resources and/or systems should have:
B. Restricted data which is encrypted by Longwood-managed resources and/or systems for transmission should use:
Approved by the Chief Information Officer, April 1, 2005.
Revised and approved by the Chief Information Officer, September 15, 2006.
Revised and approved by the Chief Information Officer, July 29, 2008.
Revised and approved by the Chief Information Officer, October 21, 2008.
Revised and approved by the Chief Information Officer, February 24, 2011.