一种选择是不对密钥加密。
数字签名依赖于公共密钥加密学。
整个TGT 使用身份验证服务的秘密密钥加密。
The entire TGT is encrypted with the secret key of authentication service.
使用同一个秘密密钥加密和解密在它们之间交换的消息。
Same secret key is used to encrypt and decrypt the messages exchanged among them.
公共密钥cookie是用用户公共密钥加密的密码。
A public key cookie is the passwd encrypted with users public key.
秘密密钥加密是分布式系统安全机制中一种最重要的技术。
Secret key cryptography is one of the most important technologies in distributed systems security.
整条消息使用PTGT会话密钥加密并发送回客户端。
The whole message is encrypted using the PTGT session key and is sent back to the client.
使用公司密钥加密很慢,而且直接与加密的数据大小成正比。
Encryption using a public-private key is slow and is directly proportional to the size of the data being encrypted.
可以通过将一个密码(希望不太弱)用作加密密钥来对密钥加密。
The key can be encrypted, using a password (hopefully not weak) as the encryption key.
相反,用秘密密钥加密的普通文本只能由公开密钥解密。
Conversely, plaintext encrypted with the private key can be decrypted only with the public key.
使用以前生成的密钥加密SOAP消息中的敏感数据(对称加密)。
Use the key that was previously generated to encrypt the sensitive data within the SOAP message (symmetric encryption).
另一个流行的秘密密钥加密系统是国际数据加密算法(IDEA)。
Another popular secret-key cryptosystem is the International Data Encryption Algorithm (IDEA).
Kerberos是根据秘密密钥加密并使用可信第三方身份验证而设计的。
Kerberos was designed based on secret key cryptography and using trusted third party authentication.
在应答中,服务器发送由对话密钥加密的客户端timestamp - 1。
In reply, the server sends client timestamp-1 encrypted by the conversation key.
要创建公钥或私钥,您需要使用ssh-keygen 来指定密钥加密的类型。
To create the public or private key, you need to use ssh-keygen, specifying the type of key encryption.
如果你没有密钥加密或解密信息,你可以设置你的加密工具以便自动搜索它。
If you don't have a key to unlock or encrypt a message, you can set your encryption tool to look it up automatically.
在身份验证之后,SSL将真正使用保密的密钥加密来保护通道,但其细节与本讨论无关。
After the authentication, SSL will actually use secret key encryption to secure the channel, but the details of that aren't relevant to this discussion.
它还会发送由对话密钥加密的时间戳(现在服务器和客户端都清楚了对话密钥)。
It also sends the timestamp encrypted by the conversation key (which now both server and client know).
如果您使用的是更先进的技术(如公共密钥加密)你可能会需要温习你的数学一点。
If you are using more advanced techniques (like public key encryption) you'll probably need to brush up on your math a little more.
用户密钥加密运算后生成的密文存入密钥存储表密钥字段,用输入的密钥解此密文。
The key file was generated with encrypted user key to store in the field of …
用户密钥加密运算后生成的密文存入密钥存储表密钥字段,用输入的密钥解此密文。
The key file was generated with encrypted user key to store in the field of key in key storage table, and the key file was decrypted with the inputted user key.
删除密钥容器可能导致拒绝服务攻击,因为它阻止使用通过密钥加密或签名过的文件。
Deleting a key container can constitute a denial of service attack because it prevents the use of files encrypted or signed with the key.
作为现在流行的采用密钥加密解密的算法,无非分为对称密钥和非对称密钥两种类型。
As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.
身份验证服务然后使用TGT会话密钥加密stkt和会话密钥的副本,再将消息发回给客户端。
The authentication service then encrypts the STkt and copy of the session key using the TGT session key and sends the message back to the client.
关键的问题是这些密钥是非对称的;使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric; information encrypted with one key can be decrypted using the other key.
关键的问题是这些密钥是非对称的——使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric — information encrypted with one key can be decrypted using the other key.
然后它会使用可搜索的加密模式对索引进行加密,用基于属性的加密模式以恰当的手段对唯一密钥加密。
It then encrypts the index using a searchable encryption scheme and encrypts the unique key with an attribute-based encryption scheme under an appropriate policy.
它的设计目的是,通过使用密钥加密技术,为客户端-服务器应用程序提供强大的身份验证和加密通信。
It is designed to provide strong authentication and encrypted communication for client-server applications by using secret-key cryptography.
它的设计目的是,通过使用密钥加密技术,为客户端-服务器应用程序提供强大的身份验证和加密通信。
It is designed to provide strong authentication and encrypted communication for client-server applications by using secret-key cryptography.
应用推荐