说明如何进行对称和非对称加密。
对称和非对称加密间的差异
因为涉及到一对密钥,所以它也称为非对称加密。
Since a pair of keys is involved, it is also called an asymmetric cryptography.
在派生类中重写时,获取指定的非对称加密算法。
When overridden in a derived class, gets the specified asymmetric cryptographic algorithm.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
AsymmBinding:需要非对称加密,使用双重证书。
AsymmBinding: Require asymmetric encryption using dual certificates.
清单6中的示例使用非对称加密技术签署所有消息,提供图书信息。
The Listing 6 example USES asymmetric encryption to sign all the messages providing book information.
当使用非对称加密对很多消息签名时,大多数处理时间花在签名上。
When you're signing a large number of small messages with asymmetric encryption, most of your processing time is spent on the signature step.
非对称加密技术是一种新的加密技术,数字签名是其最重要的应用。
A symmetric cryptography is a new cryptography. Digital signature is the most important application of asymmetric cryptography.
密钥的RC4加密后生成的初始密钥交换中的RSA非对称加密使用。
The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
对于非对称加密算法,您可以使用RSA1024、RSA2048或RSA4096。
For asymmetric encryption algorithms, you can use RSA1024, RSA2048, or RSA4096.
WS - Security之所以常常伴随性能损失主要是因为大量使用了非对称加密。
A major part of the WS-Security performance cost comes from the wide use of asymmetric encryption.
若要与远端的一方沟通对称金钥和IV,通常会使用非对称加密来加密对称金钥和IV。
To communicate a symmetric key and IV to a remote party, you would usually encrypt the symmetric key and IV using asymmetric encryption.
SSL协议采用了对称加密、非对称加密、信息摘要、数字签名、数字证书等密码学技术。
SSL protocol USES symmetric encryption, asymmetric encryption, message digest, digital signature, digital certificate and other cryptographic techniques.
文章基于非对称加密系统中的RSA算法和MD 5报文摘要算法,提出了一种数字签名的实现方案。
Based on RSA algorithm of unsymmetrical cryptographic system and MD5message-digest algorithm, the paper presents an application scheme of digital signature.
当谈到非对称加密时,经常说,由于某些原因,你不应该不对称地加密整个消息,例如。性能注意事项。
When talking about asymmetric encryption it is often said that due to some reasons you should not encrypt your entire message asymmetrically, e. g. performance considerations.
MD 5算法用来实现身份认证过程,DES算法结合非对称加密和数字签名技术来保证信息的安全传输。
MD5 algorithm is used to implement the authentication process. DES algorithm combined with asymmetric encryption and digital signature to ensure the safety of information transmission.
在基于非对称加密系统中的RSA算法和MD 5报文摘要算法上,提出了一种基于IC卡的数字签名方案。
Based on RSA algorithm of unsymmetrical cryptographic system and MD5 message-digest algorithm, the paper presents a digital signature scheme based on IC card.
同其它非对称加密体制相比,ECC被认为能提供更高的加密强度,并具有更快的执行速度和更小的密钥长度。
Compared with other asymmetric cryptography, ECC provides higher strength per bit, makes faster computation and requires shorter key length.
WS -SecureConversation的一个优势是使用对称加密比使用非对称加密更能取得性能收益。
One advantage of WS-SecureConversation is supposed to be a performance gain from using symmetric encryption rather than asymmetric encryption.
能够使用非对称加密处理同类型的事情就太好了,其中客户端有自己的证书(特别是当您想要签署发送者证书消息时)。
It'd be great to be able to do the same type of thing using asymmetric encryption, where the client has its own certificate (especially when you want to sign messages for sender verification).
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
正如在“Axis2WS - Security签名和加密”一文中讨论的,非对称加密由于可处理密匙对,因此是一种很有用的工具。
As discussed in "Axis2 WS-Security signing and encryption," asymmetric encryption is a useful tool because it works with key pairs.
RDP协议的使用对称加密算法rc4多达128位钥匙。rc4加密后所产生的一个初步的交流,其中的关键是使用RSA的非对称加密。
The RDP protocol USES the RC4 symmetric encryption algorithm with up to 128 bit keys. The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
非对称密钥的一个缺点是加密消息要比对称密钥花费更长的时间,而且加密时间直接与消息的长短成正比。
One disadvantage of asymmetric keys is that they take much longer to encrypt a message than do symmetric keys, and the encryption time is directly proportional to the size of the message.
用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509证书相关联的公钥的非对称算法进行加密的。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.
关键的问题是这些密钥是非对称的——使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric — information encrypted with one key can be decrypted using the other key.
关键的问题是这些密钥是非对称的;使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric; information encrypted with one key can be decrypted using the other key.
算法类型定义加加密算法是对称的、非对称的还是消息摘要。
Algorithm Type defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest.
应用推荐