然而,这个策略使用对称加密。
使用对称算法和非对称算法的两阶段过程。
A two-phase process using both symmetric and asymmetric algorithms.
对称:使用对称对象的时间节省技术。
然后由接收应用程序负责使用对称金钥解密讯息。
It is then the responsibility of the receiving application to decrypt the message using the symmetric key.
使用对称也可以提高映像技术和等价检测的有效性。
Symmetry can also improve the efficiency of technology of mapping and equivalence testing.
在使用对称或不对称做设计时,以下最佳案例可以用来参考。
When working with symmetry (or asymmetry) in design, there are several best practices you should keep in mind.
使用对称申请一次一个面部或角色两侧的皮肤颜色和纹身!
Use symmetry to apply skin color, tattoos and more to both sides of a face or character at once!
克服,你需要使用对称加密方案和需要的关键每一次你读/写文件。
To overcome that, you'd need to use a symmetric encryption scheme and require the key each times you read/write the file.
本文给出了等效电路的ASVG使用对称分量的方法的系统的故障条件。
This paper gives the equivalent circuit of an ASVG for system faulty conditions using the symmetry component method.
首先为其建立索引,并使用对称的加密模式(例如aes)以唯一的密钥对其进行加密。
Begins by indexing it and encrypting it with a symmetric encryption scheme (e.g., AES) under a unique key.
Kerberos是一种网络认证协议,最初由MIT开发,使用对称密匙实现相互认证。
Kerberos is a network authentication protocol originally developed by MIT that provides mutual authentication using symmetric keys.
但在下个月的专栏中,我们将首先讨论使用对称加密及常规WS - Security。
But first, in next month's installment, I'll discuss using symmetric encryption with regular WS-Security.
Metro甚至比直接使用对称加密实现WS - Security还要快一些,大约快30%。
Metro does even better with direct use of symmetric encryption with WS-Security, running about 30 percent faster.
另外一种方法是对称加密,但是使用对称加密时,您必须拥有只有参与消息交换各方才知道的密钥。
The alternative is symmetric encryption, but with symmetric encryption you must have a secret key known only to the parties involved in a message exchange.
以下情形中更趋向使用对称,如:需要更大稳定性的设计中,牢固的组织结构中,或是要传递传统的、令人信赖的信息时。
Designs that need more stability, a strong organizational structure, and a classic and trusting message, tend to use more symmetry in the design.
WS -SecureConversation的一个优势是使用对称加密比使用非对称加密更能取得性能收益。
One advantage of WS-SecureConversation is supposed to be a performance gain from using symmetric encryption rather than asymmetric encryption.
勘误表1 - - -信息技术- - -安全性技术- - -关键管理- - -第2部分:使用对称技术机制。
Corrigendum 1 - Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques.
勘误表1 - - -信息技术- - -安全性技术- - -关键管理- - -第2部分:使用对称技术机制。
1 - Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques.
EKE协议是基于弱口令的密钥交换协议,通过使用对称密钥加密体制和公钥加密体制,能够很好地抵抗离线字典攻击。
EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.
以下情形中更趋向使用对称,如:需要更大稳定性的设计中,牢固的组织结构中,或是要传送传统的、令人信赖的邪琚时。
Designs that need more stability a strong organizational structure and a classic and trusting message tend to use more symmetry in the design.
通过这两种安全性配置,客户端和服务之间的消息交换使用了对称加密。
With both security configurations, symmetric encryption is used for the messages exchanged between the client and the service.
xml加密允许应用程序使用对预先约定的对称密钥的引用来加密部分或全部XML文档。
XML encryption allows applications to encrypt part or all of an XML document using references to pre-agreed symmetric keys.
在加密算法列表框中可以选择对称算法,使用该算法可以加密 SOAP消息正文中包含的服务数据对象。
The encryption algorithm list box lets you choose the symmetric algorithm to be used to encrypt the service data object contained within the SOAP message's body.
关键的问题是这些密钥是非对称的——使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric — information encrypted with one key can be decrypted using the other key.
关键的问题是这些密钥是非对称的;使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric; information encrypted with one key can be decrypted using the other key.
如何在PK i中使用非对称算法类型?
数据块使用一个对称密钥算法进行加密,它使用一个密钥来实现对数据的加密和解密。
The bulk of the data is encrypted using a symmetric key algorithm that encrypts and decrypts data using a single secure key.
页面中大量使用了平移对称设计,相同大小的形状重复出现在不同的位置。
We can witness a lot of translation symmetry in this design, where the same-sized block shape is repeated in various locations.
当使用非对称加密对很多消息签名时,大多数处理时间花在签名上。
When you're signing a large number of small messages with asymmetric encryption, most of your processing time is spent on the signature step.
使用旋转对称传达动作和行为。
应用推荐