On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method.
在研究基于RS A密钥算法智能卡认证技术的基础上,提出了基于散列函数的智能卡访问认证方法。
Another popular secret-key cryptosystem is the International Data Encryption Algorithm (IDEA).
另一个流行的秘密密钥加密系统是国际数据加密算法(IDEA)。
Kerberos defines an algorithm for processing a user's password to produce a secret key. The Kerberos client will use this key for decryption during the process of getting the TGT.
Kerberos定义了一种对用户密码进行处理以生成一个密钥的算法。
An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.
非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.
对称密钥(公钥)算法用于交换在对称算法中使用的加密密钥,以及用于数字签名。
I will now use the temporary secret key to encrypt the original padded byte array from Step 3 using the DES-CBC algorithm.
现在我要使用这个临时密钥以des -cbc算法加密第3步中得到的附加后的字节数组。
A symmetric algorithm requires that both the sender and receiver of the message use the same secret key; this is often referred to as secret key cryptography.
对称算法要求消息的发送方和接收方使用同一个秘钥;这通常被称作秘钥密码术。
Kerberos defines an algorithm to generate a secret key from the user's password.
Kerberos定义了一种利用用户的密码生成密钥的算法。
So far, I have discussed the low-level methods of the ASN1DataTypes class and implemented the algorithm for generating a secret key from the user's password.
到目前为止,我讨论了ASN1DataTypes类的底层方法并实现了利用用户的密码生成密钥的算法。
Time-based cache attacks analyzes the time difference in the execution of algorithm over a processor, and recovers the secret key.
基于时间的缓存攻击是指通过分析处理器中算法的不同执行时间来恢复密钥的攻击。
The advantages of this algorithm were, rapidity of encryption, carried out easily by computer, ampliative secret key space and so on.
该算法有加密速度快、易于计算机实现、密钥空间大等优点。
The secret key of next period is derived from the current secret key via key-update algorithm which is arranged in system after a period end.
每个周期结束时,利用该周期的私钥,由系统内设置好的更新算法产生下一个周期的私钥。
The secret key of next period is derived from the current secret key via key-update algorithm which is arranged in system after a period end.
每个周期结束时,利用该周期的私钥,由系统内设置好的更新算法产生下一个周期的私钥。
应用推荐