非对称密钥解决了这个问题。
用于交换秘钥的非对称密钥。
如何:将非对称密钥存储在密钥容器中。
实现时,将获取一个值,该值指示令牌是否具有非对称密钥。
When implemented, gets a value that indicates whether the token supports client authentication.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
SPKM是一种GSS - API机制,其基于公钥而非对称密钥基础设施。
SPKM is a GSS-API mechanism which is based on a public key rather than a symmetric key infrastructure.
作为现在流行的采用密钥加密解密的算法,无非分为对称密钥和非对称密钥两种类型。
As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.
这个SunJCE提供程序不适合生成非对称密钥,因为它没有包含rsa算法类型的实现。
The SunJCE provider is not suitable for generating asymmetric keys, as it does not contain the RSA algorithm type implementation.
换言之,可以同时使用多个证书、密码、对称密钥以及非对称密钥对单个对称密钥进行加密。
In other words, a single symmetric key can be encrypted by using multiple certificates, passwords, symmetric keys, and asymmetric keys at the same time.
非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关的一个公钥和一个私钥。
Asymmetric keys are used in public-key cryptography, which USES two keys, a public key and a private key, which are related mathematically.
在应用服务器收到消息时,WS - Security使用了非对称密钥验证数字签名并对消息解密。
When the message was received at the application server, WS-Security used the asymmetric keys to verify the digital signature and decrypt the message.
非对称密钥的一个缺点是加密消息要比对称密钥花费更长的时间,而且加密时间直接与消息的长短成正比。
One disadvantage of asymmetric keys is that they take much longer to encrypt a message than do symmetric keys, and the encryption time is directly proportional to the size of the message.
从客户端将消息发送到网络之前,WS-Security使用了非对称密钥对消息进行数字签名和加密。
Prior to the message being sent onto the wire from the client, WS-Security used asymmetric keys to digitally sign and encrypt the message.
对称密钥系统较之非对称密钥系统具有惊人的速度优势,但是管理对称密钥系统的密钥却是需要解决的一个难题。
The symmetric key systems compared with asymmetric key systems have astounding speed benefits, but managing their keys has always been difficult problem to be solved.
文中讨论了怎样在非对称密钥体制下集成一个网络加密系统及相关的密钥管理算法,并结合银行的网络系统的结构进行了一些探讨。
This paper describes how to integrate a networks cryptographic system based on the non-symmetric cryptographic system, and the correlative key-management method.
公钥-私钥组合是公共密钥基础设施的核心,建立在非对称密码的基础上。
Public-private key combination is at the heart of Public key Infrastructure (PKI), and is based on asymmetric cypher.
关键的问题是这些密钥是非对称的——使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric — information encrypted with one key can be decrypted using the other key.
关键的问题是这些密钥是非对称的;使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric; information encrypted with one key can be decrypted using the other key.
因为涉及到一对密钥,所以它也称为非对称加密。
Since a pair of keys is involved, it is also called an asymmetric cryptography.
非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.
非对称算法用于生成成对的密钥。
Asymmetric algorithms are used to generate keys that exist in pairs.
用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509证书相关联的公钥的非对称算法进行加密的。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
公开密钥基础设施PKI是一种利用非对称密码技术为电子商务、电子政务和电子事务的开展提供一整套安全保护的基础平台。
Public Key Infrastructure (PKI) utilizes the asymmetrical cryptography technology to lay the security foundation for the electronic commerce, the electronic government and the electronic business.
公钥和非对称公钥密码学使用一对密钥,其中的一个定义为私钥并加密存放,另外一个被称为公钥,通常无须加密。
Public Key and Asymmetric - Public-key cryptography uses a pair of keys, one that is designated the private key and kept secret, the other key is called the public key and is generally made available.
密钥的RC4加密后生成的初始密钥交换中的RSA非对称加密使用。
The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
而许多实际的应用都要求非对称的数字水印方案,即水印嵌入时使用私人密钥,水印检测时只需要一个公开密钥。
However, in many applications it needs an asymmetric scheme, where a private key is used for watermark embedding, and a public key is used for watermark detection.
同其它非对称加密体制相比,ECC被认为能提供更高的加密强度,并具有更快的执行速度和更小的密钥长度。
Compared with other asymmetric cryptography, ECC provides higher strength per bit, makes faster computation and requires shorter key length.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
目前,对抗共谋密钥攻击的叛徒追踪方案主要有对称追踪方案、非对称追踪方案、门限追踪方案;
At present, there are three kinds of traitor tracing schemes against collusion key attack, which are symmetrical traitor tracing schemes and dissymmetrical traitor tracing schemes;
目前,对抗共谋密钥攻击的叛徒追踪方案主要有对称追踪方案、非对称追踪方案、门限追踪方案;
At present, there are three kinds of traitor tracing schemes against collusion key attack, which are symmetrical traitor tracing schemes and dissymmetrical traitor tracing schemes;
应用推荐