非对称密钥解决了这个问题。
用于交换秘钥的非对称密钥。
生成随机会话对称密钥。
必须有对称密钥才能解密,而且密钥必须单独管理。
You need a symmetric key to do the encryption, and the key must be managed independently.
如何:将非对称密钥存储在密钥容器中。
对称密钥是加密和解密都使用的一个密钥。
A symmetric key is one key that is used for both encryption and decryption.
担保的方式来存储对称密钥的AES是什么?
如果匹配成功,则创建允许可逆加密的对称密钥。
If the match succeeds, a symmetric key is created that permits reversible encryption.
实现时,将获取一个值,该值指示令牌是否具有非对称密钥。
When implemented, gets a value that indicates whether the token supports client authentication.
当确信现有对称密钥的安全受到威胁时,应重新创建对称密钥。
Re-create the symmetric key when you believe the existing symmetric key is compromised.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
SPKM是一种GSS - API机制,其基于公钥而非对称密钥基础设施。
SPKM is a GSS-API mechanism which is based on a public key rather than a symmetric key infrastructure.
在这个路由上的数据流是通过各结点之间协商的对称密钥才能解开的。
Traffic flowing down the circuit is unwrapped by a symmetric key at each node, which reveals the downstream node.
对称密钥(公钥)算法用于交换在对称算法中使用的加密密钥,以及用于数字签名。
An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.
数据块使用一个对称密钥算法进行加密,它使用一个密钥来实现对数据的加密和解密。
The bulk of the data is encrypted using a symmetric key algorithm that encrypts and decrypts data using a single secure key.
介绍如何用新版本替换对称密钥以及在无法验证对称密钥时如何重新开始。
Explains how you can replace a symmetric key with a new version, and how to start over if symmetric keys cannot be validated.
xml加密允许应用程序使用对预先约定的对称密钥的引用来加密部分或全部XML文档。
XML encryption allows applications to encrypt part or all of an XML document using references to pre-agreed symmetric keys.
密钥管理是对称密钥加密体制的核心,而密钥产生方法则是密钥管理的基础。
Key management is the core of the symmetric cryptographic communication, and the key generation method is the foundation of the key management.
同样,也可以将SignedObject用于数据验证,并且对称密钥也必须单独管理。
Likewise, you can use SignedObject for data verification, and again the symmetric key must be managed independently.
这个SunJCE提供程序不适合生成非对称密钥,因为它没有包含rsa算法类型的实现。
The SunJCE provider is not suitable for generating asymmetric keys, as it does not contain the RSA algorithm type implementation.
由于所有应用程序数据通过对称密钥技术进行加密后才进行交换,因此没有提供不可否认特性。
There is no provision for non-repudiation as all application data that is exchanged has been encrypted using symmetric key technology.
作为现在流行的采用密钥加密解密的算法,无非分为对称密钥和非对称密钥两种类型。
As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.
换言之,可以同时使用多个证书、密码、对称密钥以及非对称密钥对单个对称密钥进行加密。
In other words, a single symmetric key can be encrypted by using multiple certificates, passwords, symmetric keys, and asymmetric keys at the same time.
在应用服务器收到消息时,WS - Security使用了非对称密钥验证数字签名并对消息解密。
When the message was received at the application server, WS-Security used the asymmetric keys to verify the digital signature and decrypt the message.
非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关的一个公钥和一个私钥。
Asymmetric keys are used in public-key cryptography, which USES two keys, a public key and a private key, which are related mathematically.
尽管对称密钥有自身的缺陷(主要是如何在互信的双方之间传递),它们最大的优点是加密解密的速度快。
Though symmetric keys have their disadvantages (primary among them being how to pass them among the trusted parties), the major advantage they offer is speed of encryption and decryption.
非对称密钥的一个缺点是加密消息要比对称密钥花费更长的时间,而且加密时间直接与消息的长短成正比。
One disadvantage of asymmetric keys is that they take much longer to encrypt a message than do symmetric keys, and the encryption time is directly proportional to the size of the message.
从客户端将消息发送到网络之前,WS-Security使用了非对称密钥对消息进行数字签名和加密。
Prior to the message being sent onto the wire from the client, WS-Security used asymmetric keys to digitally sign and encrypt the message.
陌生的双方在建立信任关系时,仅仅交换一次信任书,随后多次交换对称密钥,直到协商完成或者失败。
When a trust was established between strangers, their credentials were exchanged only once, and two parties exchanged the secret keys iteratively until the trust negotiation succeeded or failed.
陌生的双方在建立信任关系时,仅仅交换一次信任书,随后多次交换对称密钥,直到协商完成或者失败。
When a trust was established between strangers, their credentials were exchanged only once, and two parties exchanged the secret keys iteratively until the trust negotiation succeeded or failed.
应用推荐