private-key encryption algorithms 私钥加密算法
private key encryption 钥加密 ; 专用键加密 ; 钥加密法
Because this is using asymmetric encryption, where each side has its own certificate and private key, it should be somewhat simpler to handle than the Listing 5 symmetric-encryption example.
因为这是使用非对象加密技术,而每一端有自己的证书和私有密钥,比起清单5对称加密技术示例,它处理起来更为简单。
A similar request is needed to upload the encryption key, which is private.
需要用一个类似的请求上传私有的加密密匙。
In the grown-up world, you solve these problems through the use of public key-private key encryption.
在成年人的世界里,可以通过使用公钥—私钥加密来解决此类问题。
应用推荐