并用该测试软件对所设计的密钥系统进行测试。
And use the test tools to test the chaotic key system we designed.
文章对公开密钥系统中的常用的用户私钥存储技术进行了比较分析。
In this paper, we compare some common technologies of private key storage management.
如何保证公钥的产生不会影响私钥的性能,是水印密钥系统的关键问题。
How to generate public keys without weaken the performance of the private key is a key problem.
目前的密钥系统无论是单钥体制还是公钥体制都建立在计算安全的模型上。
Both the symmetric key systems and public key systems currently used are based on the model of computational security.
算法设计安全的生物密钥系统,由于泄漏,在侧信道攻击下任然是不安全的。
Even if the biometric cryptosystem is secure in algorithmic design, it may still be vulnerable to side-channel attack due to the physical leakage.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
为何不像其他一些Google产品创建应用密钥系统,借此可以关闭滥用者同时为“好孩子”继续提供服务。
Why not create an application key system like in some other Google products so that you can shut down the abusers while still providing services for the "good guys"?
尽管DCE目前基于秘密密钥系统,但在本文后面将介绍DCE如何利用并扩展这些技术,以提供一种更为安全的环境。
Although DCE is currently based on secret key system, further in the article we will come to know how DCE exploits these techniques and augments them to provide a much more secured environment.
对称密钥系统较之非对称密钥系统具有惊人的速度优势,但是管理对称密钥系统的密钥却是需要解决的一个难题。
The symmetric key systems compared with asymmetric key systems have astounding speed benefits, but managing their keys has always been difficult problem to be solved.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
秘密密钥加密是分布式系统安全机制中一种最重要的技术。
Secret key cryptography is one of the most important technologies in distributed systems security.
虽然听起来这并不是什么了不起的事,但分解并找到一个离散对数的困难形成了大部分公用密钥密码学系统的基础,如果不是全部的话。
While this doesn't sound like a big deal, the difficulty of factoring and finding a discrete logarithm forms the basis of most if not all public-key cryptography systems.
这种方法将帮助确保在使用了正确的加密密钥时系统只响应关闭命令。
This approach helps ensure that systems will only respond to the shutdown command if the correct encryption key is used.
双重密钥安全认证是用于验证跨不同系统访问的保护方法之一。
Double key secure authentication is one of the protection methods used to verify access across different systems.
按照惯例,当出现加密的时候,理解整个系统的出发点就是思考跟密钥有关的问题:有多少密钥,谁持有,如何使用。
As usual when crypto is involved, the starting point for understanding the system's design is to think about the secret keys: how many there are, who knows them, and how they are used.
此前用作电邮加密的系统,全都仰仗安全存储密钥的招数。
Past systems designed to encrypt e-mails all relied on ways of storing their keys safely.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
直接使用不同的操作系统用户ID、不同的加密密钥和不同的管理密码运行每个计算单元即可。
Simply run each cell with a different operating system user ID, different encryption keys, and different administrative passwords.
如果系统找到一个匹配文件保护的密钥,那么这个进程就可以对文件密钥和文件内容进行解密。
If the system finds a key matching the file protection, the process is able to decrypt the file key and file content.
由于任何加密密钥和密码系统都必须位于源代码中,因此同时还会将应用程序的源数据流公开出来。
Since any required encryption keys and cryptosystems have to be in the source code as well, you've also just opened up your source data stream to the world.
花几分钟的时间从逻辑上拟定系统,这些系统将通信并指示它们需要哪些密钥,这些密钥存储在哪些密钥存储中。
Take a few minutes to draw out logically the systems that will be communicating and indicate what keys they will need and in what key stores those keys will be stored.
系统会提示您提供关于新密钥的细节,包括密码、姓名以及位置等。
You'll be prompted to provide details about the new key including a password, your name, locality, etc.
当要安全地连接远程系统时,首先打开包含SSH密钥的秘密部分的PPK文件。
When you want to connect securely to a remote system, first open the PPK file that contains the secret part of the SSH key.
如果系统提示输入密码,那么在远程主机上安装公共密钥并再次尝试连接。
If you are prompted for a password, rectify the problem by installing your public key on the remote host and try again.
要生成此密钥,必须将密码与此ID关联,此ID应该不能登录到系统。
To generate this key, a password must be associated with this ID; however, this ID should not be able to log onto the system.
双重密钥安全表示用户必须通过两个系统的认证-应用程序服务器(位于主管服务供应商)和金融机构。
Double key secure means the user must authenticate two systems — the application server (at the hosting service provider) and the financial institution.
单击该消息以允许蓝牙连接之后,系统要求输入用于蓝牙设备的密钥,如图5所示。
After you click the message to allow the Bluetooth connection, you are asked to enter the passkey for the Bluetooth device; see figure 5.
另一个流行的秘密密钥加密系统是国际数据加密算法(IDEA)。
Another popular secret-key cryptosystem is the International Data Encryption Algorithm (IDEA).
在今后的文章中,我将要讨论安全性断言标记语言(Security Assertion Markup Language,SAML)和xml密钥管理系统(XML Key Management System,XKMS)。
In future articles, I will discuss Security Assertion Markup Language (SAML) and XML Key Management System (XKMS).
在您成功安装ActiveDirectory之后,确保Kerberos密钥分发中心系统服务在Services列表上得到正确配置。
After you have successfully installed Active Directory, make sure that the Kerberos key distribution center system services is configured correctly in the services list.
应用推荐