消息的发送方使用接收方的公钥加密消息。
The sender of the message USES the recipient's public key to encrypt the message.
另一方使用这个公钥加密其秘钥。
The second party USES this public key to encrypt its secret key.
用公钥加密的数据只能够被私钥解密。
Data that is encrypted with the public key can be decrypted only with the private key.
不对称加密:公钥加密(这两个术语是同义词)。
Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).
附录4:公钥加密术语。
协议的安全性基于其使用的公钥加密方案。
Accordingly, the protocol security is rested on the used underlying public cryptosystems.
这个非对称的特性使得公钥加密很有用。 。
This asymmetry is the property that makes public key cryptography so useful.
有了OpenPGP,我可以通过使用公钥加密内容。
消息的发送方使用接受方的公钥加密消息并发送。
The sender of the message USES the public key of the receiver to encrypt the message to be sent.
你的私钥可以解开任何用你的公钥加密过的信息。
Your private key lets you decrypt any message encrypted with your public key.
该文讨论的是基于有限自动机理论的公钥加密体制。
In this paper we discuss one public key cryptosystem which based on the theory of the finite automaton.
密钥和初始向量用用户的公钥加密以保护它的机密性;
The key and the initialization vector are encrypted with the public key of the user to protect its confidentiality.
在下列例子中包括甲和乙,公钥加密会轻松地校验身份。
In the following example involving Alice and Bob, public key cryptography is easily used to verify identity.
当你发送一个加密信息时,你必须用收件人的公钥加密该信息。
When you send a message that is encrypted, you must encrypt it using your intended recipient's public key.
公钥加密密钥的分布问题在秘钥系统中一直是一个薄弱环节。
Public-key encryption The key distribution problem has always been the weak link in the secret-key systems.
对于PGP和其他公钥加密方法,不存在从公钥推断某人私钥的方法。
With PGP and other public-key encryption methods, there's no way to deduce someone's private key from the public key.
使用强名称对程序集进行签名将向包含程序集清单的文件添加公钥加密。
Signing an assembly with a strong name adds a public key encryption to the file containing the assembly manifest.
基于公钥加密体制,本文提出了一种具有移动终端安全性的无线通讯协议。
Based on the public key cryptography, a mobile communication protocol providing end - to - end security is provided.
公钥与私钥方案非常有趣,因为使用公钥加密的数据只能由相关私钥进行解密。
The public and private key scheme is interesting because data encrypted with a public key can only be decrypted with the associated private key.
证书所有者可以使用私钥进行数字签名,或解密使用对应的公钥加密的信息。
The private key enables the owner to make a digital signature or decrypt information encrypted with the corresponding public key.
最好在客户端上生成密钥对,并将公钥发送到使用服务器公钥加密的服务器。
It is better to generate the key pair on the client and send the public key to the server encrypted with the public key of the server.
这样,如果使用实体的公钥加密消息,那么可以保证只有该实体能够解密此消息。
Thus, if one encrypts a message using the public key of an entity, then it is guaranteed that only the entity can decrypt the message.
很多应用程序平台都支持通过使用公钥加密相对容易地对消息进行加密、发送和解密。
Many application platforms allow the use of public key cryptography to encrypt, send, and decrypt messages with relative ease.
公钥可以对任何人公开,而私钥必须只为将要对用公钥加密的数据进行解密的一方知道。
The public key can be made public to anyone, while the private key must known only by the party who will decrypt the data encrypted with the public key.
文章阐述了数字签名技术原理,并介绍了数字签名中的关键技术:公钥加密体制和哈希算法。
In this paper, the principles of digital signature is given, Meanwhile the key technology of digital signature: public key cryptography and Hash algorithms is introduced.
非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关的一个公钥和一个私钥。
Asymmetric keys are used in public-key cryptography, which USES two keys, a public key and a private key, which are related mathematically.
作为环签名基础的公钥加密体制,存在着密钥泄露的问题,对于环签名的安全性来说是致命的。
It is a crux for security of ring signature that exposure of secret keys can be a devastating attack on cryptosystem which ring signature base on.
这是密码学领域一个有名的难题--它于20世纪70年代末由著名的RSA公钥加密方案的开发人员提出的。
The problem was a famous one in the field – it had been proposed in the late 1970s by developers of the famous RSA public key encryption scheme.
这就保证了任何人都能使用接收方的公钥加密消息,但只有接收方(拥有对应的私钥的一方)能够解密。
This ensures that anyone can encrypt the message using the receiver's public key but only the receiver (the one with the corresponding private key) can decrypt it.
这就保证了任何人都能使用接收方的公钥加密消息,但只有接收方(拥有对应的私钥的一方)能够解密。
This ensures that anyone can encrypt the message using the receiver's public key but only the receiver (the one with the corresponding private key) can decrypt it.
应用推荐