把SSH秘密密钥转换为putty格式。
使用同一个秘密密钥加密和解密在它们之间交换的消息。
Same secret key is used to encrypt and decrypt the messages exchanged among them.
它将访问密钥和秘密密钥视为String。
秘密密钥加密是分布式系统安全机制中一种最重要的技术。
Secret key cryptography is one of the most important technologies in distributed systems security.
身份验证服务获取PSTkt请求,使用其秘密密钥解密它。
The authentication service gets the PSTkt request and decrypts it using its secret key.
目标服务器接收PSTkt并使用自己的秘密密钥解密。
The target server receives the PSTkt and decrypts it using its own secret key.
服务器从客户端接收票证,然后使用自己的秘密密钥进行解密。
Receiving the ticket from the client, server then decrypts it using its own secret key.
客户端接收KDC的回复,然后使用自己的秘密密钥解密消息。
Receiving the reply from KDC, client then decrypts the message using its own secret key.
把SSH秘密密钥转换为putty格式(用于分发给团队成员)。
Convert SSH secret key to PuTTY format (for distribution to team members).
相反,用秘密密钥加密的普通文本只能由公开密钥解密。
Conversely, plaintext encrypted with the private key can be decrypted only with the public key.
当连接云实例时,ssvnc包向Pageant请求SSH秘密密钥。
Whenever you connect to a cloud instance, the SSVNC package requests the SSH secret key from Pageant.
Kerberos是根据秘密密钥加密并使用可信第三方身份验证而设计的。
Kerberos was designed based on secret key cryptography and using trusted third party authentication.
该方案具有很强的安全性,并且允许所有用户自主选择秘密密钥。
The scheme is of very strong security, and it allows all users to select their own secret keys.
网络部分包含获取票证和其他服务所需的信息(比如,它包含主体秘密密钥)。
Network part contains the information required to acquire tickets and other services (e.g. it includes the principals secret key).
您应该会收到一个或更多PuTTYSSH秘密密钥(PPK文件)。
You should have received one or more PuTTY SSH secret keys (PPK file).
如果它是来自客户端的有效请求,它使用服务器秘密密钥从STkt提取会话密钥。
If it is a valid request from client, it extracts the session key from the STkt using server secret key.
一旦安全服务器通过秘密密钥确认了用户的身份,用户登录到DCE的过程就完成了。
Once the security server confirms the identity of the user via secret key, the login process of the user into the DCE is completed.
密钥建立协议是为了以后的密码学应用而使一个秘密密钥对两方或更多方都可用的过程。
A key establishment protocol is a protocol whereby a Shared secret becomes available to two or more parties, for subsequent cryptographic applications.
对于新的云实例,要执行的最后一步是把OpenSSH秘密密钥转换为PuTTY可以使用的格式。
The last step to take for your new cloud instance is to convert the OpenSSH secret key to a format that can be used by PuTTY.
此协议实际上包含一系列消息,其中包含秘密密钥以及有助于客户端和服务器安全地相互验证的其他信息。
This protocol actually contains a series of messages containing secret keys and other information that help clients and servers identify each other securely.
接收者利用发送者的公开密钥和他们自己的秘密密钥的结合,解开该报文的秘密编码,并解密之。
Receivers use a combination of the sender's public key and their own private encryption key to unlock the secret code for that message and decipher it.
STkt然后使用目标服务器的秘密密钥加密,这样目标服务器就能够使用自己的秘密密钥解密stkt请求。
The STkt is then encrypted using the target server secret key. So target server can decrypt the STkt request using its secret key.
本文利用椭圆曲线上离散对数难解问题,提出了一种新的密钥认证方案,密钥由用户口令和秘密密钥组成。
A new key authentication scheme was proposed. This new scheme is based on the intractability of elliptic discrete logarithms. The key is combination of password and private key.
尽管DCE目前基于秘密密钥系统,但在本文后面将介绍DCE如何利用并扩展这些技术,以提供一种更为安全的环境。
Although DCE is currently based on secret key system, further in the article we will come to know how DCE exploits these techniques and augments them to provide a much more secured environment.
如果网站想访问我的网站的数据,他们已经登记我的开发者网站注册后,网站会,消费者的关键和秘密密钥。
If a website want to access my data from website, they have to register with my developer website, after the registration that website will generate Consumer key and Secret key.
论证表明新方案的加密变换几乎是不可被破译的,整个系统的工作不会因部分秘密密钥的泄露而受到任何破坏。
Even though some secret keys of the system may be known, the security of this system is unlikely to be broken and thus secure communication may continue even in this event.
该文研究双秘钥公开钥密码体制,它不同于一般的只有一个秘密密钥的公开钥密钥体制,而是使用两个秘密密钥。
This paper is researching the public-key cryptosystem based on two private keys, it's different from the generic PKC which USES only one private key.
该文研究双秘钥公开钥密码体制,它不同于一般的只有一个秘密密钥的公开钥密钥体制,而是使用两个秘密密钥。
This paper is researching the public-key cryptosystem based on two private keys, it's different from the generic PKC which USES only one private key.
应用推荐