You have to get the private key associated with your instance.
必须获得与您实例相关联的私有密钥。
The server receives the encrypted exchange key and decrypts it with its private key.
服务器接接收加密交换密匙并使用其私有密匙进行解密。
The pair consists of the private key and the public key (private, public).
这对加密密钥由私有密钥和公有密钥(私有,公共)组成的。
Local private key files are identified.
找到本地私有密钥文件。
Entering the passphrase for the private key "unlocks" it.
输入私有密钥的密码以“解锁”它。
Data encrypted using the private key can be decrypted using the corresponding public key.
使用私有密匙加密的数据可以使用对应的公共密匙解密。
Check with the vendor on the private key management.
询问供应商私有密匙的管理问题。
In practice, more is involved in signing messages than just encrypting with your private key.
在实际中,消息签名的过程不仅仅是使用私有密匙加密消息。
Key authentication is tried for each private key type found locally.
对于在本地找到的每个私有密钥类型,尝试执行密钥身份验证。
You generate a key pair, which is composed of a public key and a private key.
您生成了一个密匙对,它由一个公共密匙和一个私有密匙组成。
The private key is, well, private.
私钥自然是私有的。
What you can infer from this is that the key store used to hold a private key for use with SSL should contain only one private key (it can contain other public key certificates).
从这里您可以看出,使用SSL 的用于包含私钥的密钥存储应该只包含一个私钥(它可以包含其他的公钥证书)。
To protect your environment, you should create your own private key and certificate for communication.
要保护您的环境,您应该为通信创建自己的私钥和证书。
Listing 5 demonstrates how you can decrypt the encrypted data if you have the right private key.
清单5示范了当您有正确的私钥时,如何对加密的数据进行解密。
When opened, you can create, modify, and delete private key and trusted certificate entries.
在打开时,您可以创建、修改和删除私钥和受信任证书项。
The user must copy and paste the private key information into a file.
用户必须复制并粘贴私有密匙到一个文件中。
If this reply message is also to be signed, you do this using a private key.
如果此应答消息也要进行签名,则您将使用私钥来进行此签名。
Also, fields can be encrypted with a private key.
同样,可以使用私钥对字段进行加密。
SSL parties then use fast private key algorithms to encrypt and decrypt communication data.
于是,SSL通信各方使用快速的私钥算法来加密和解密通信数据。
When this happens, it makes sense to have the private key generated at the server and have the service provider keep the private key.
当出现这种情况时,让私钥在服务器上生成并让服务提供程序保留该私钥是明智的。
The intended recipient then decrypts the message with the corresponding private key and reads it.
预期的接收者使用相应的私钥解密消息并阅读消息。
This process makes use of the client and server public and private key pairs.
这个过程将使用客户端和服务器的公钥和私钥对。
That data can only be decrypted using the private key.
这些数据只能使用私钥进行解密。
Possessing the private key is proof of identity.
持有私钥就是身份的证明。
Provide a password to protect your private key file.
提供密码以保护您的私钥文件。
That is, you must always protect that private key.
也就是说,您必须始终保护私钥。
The public and private key scheme is interesting because data encrypted with a public key can only be decrypted with the associated private key.
公钥与私钥方案非常有趣,因为使用公钥加密的数据只能由相关私钥进行解密。
The sender encrypts the message digest under her private key.
发送方用自己的私钥加密消息摘要。
You end up with something that contains a public certificate and a private key.
您最终将获得包含公开证书和私钥的密钥存储库。
The private key is kept with the XKMS service in case the client loses its private key.
在客户机丢失了私钥的情况下,私钥就与XKMS服务保持一致。
应用推荐