如果有一种安全的方法可以将公钥分发给受信任的群体,这就足够了。
If there was a secure way to distribute public keys to trusted parties, that would be enough.
要完成这种设置,有一种快速而简单的方法,即创建一个公钥。
A quick and simple way of setting this up is to create a public key.
常见的身份验证方法包括密码、公钥、键盘交互、GSSAPI、SecureID和PAM。
Common authentication methods include password, public key, keyboard-interactive, GSSAPI, SecureID, and PAM.
公钥基础设施(PKI)是将公钥与使用证书颁发机构(CA)的相应用户标识进行关联的一种方法。
A public key infrastructure (PKI) is a means for associating public keys with the respective user identities using a Certification Authority (ca).
从技术的角度来看,还可以使用各种加密方法来建立信任,包括加密密钥、私钥或公钥、数字签名,或者协议。
Trust is also established from a technology perspective using cryptographic methods, including encryption keys, private or public keys, digital signatures, or protocols.
对于PGP和其他公钥加密方法,不存在从公钥推断某人私钥的方法。
With PGP and other public-key encryption methods, there's no way to deduce someone's private key from the public key.
在开始讨论公钥私钥以及生成它们的基本原理之前,我想首先说明加密和数字签署XML数据的其他方法。
Before jumping into public and private keys and the nitty-gritty of generating them, I'd like to show you some other options for encrypting and digitally signing XML data.
为了保证本系统的安全性,本论文结合基于口令和公钥的认证模式,设计了一种新型的身份认证方法。
To guarantee the system safe, this thesis designed a new kind of Identity certification method based on the mode of keywords and public-key certification.
两个方法都接受布尔值,该值指示是只返回公钥信息还是同时返回公钥和私钥信息。
Both methods accept a Boolean value that indicates whether to return only the public key information or to return both the public-key and the private-key information.
根据素数的陈氏表示法改进RSA公钥密码体制中的安全素数寻找方法,以提高RSA算法的运行速度。
According to Chen's prime number representation method, this paper improves the method of calculating safety prime number to increase the speed of the RSA.
本文介绍了公钥体制中得到广泛应用的两种加密和解密方法,并举出了实例以帮助理解。
This paper introduce some methods of classic cryptography and modern cryptography, including the methods of encryption and decryption and illustrating to help comprehension.
进一步利用零知识的思想给出了抵抗公钥替换攻击的一般方法。
Furthermore, using zero knowledge idea, a general approach to withstanding the public key substitution attack is given.
并通过对RSA公钥密码算法的改进,给出一种新的组播加密方法,进而给出相应的密钥管理方案。
Through some improvement to the RSA public key system, a new method of multicast encryption is put forward and then corresponding key management model is given.
公钥证书提供了一种将公钥拥有者身份信息和公钥绑定在一起的方法。
A public key certificate provides a method for binding a public key and its owner's identity informations.
该方法兼有两类加密体制的优点:既有对称密码加密体制的加密速度快,强度高的优点,又拥有公钥密码体制在密钥分发与管理上的优势。
It has strongpoint of symmetry encryption scheme such as encryption speed and encrypt intensity, but also has advantage of public key encryption scheme on key distribution and key management.
基于高有效位的数字计算方法和误差估计方法,对目前已提出的基于切比雪夫映射的公钥加密方法进行了改进,得到一种密钥协商协议。
Based on high effective locations algorithm and error estimate, improvement of the public-key scheme based on Chebyshev maps proposed recently was presented and a key agreement protocol was given.
针对现有安全广播协议密钥分发效率较低的问题,提出了一种通过多接收者公钥加密实现安全广播的方法。
To improve the inefficiency of the existing key distribution protocols in the secure broadcasting, an ideal multi-recipient public key encryption scheme to achieve the secret broadcasting is proposed.
该方案依据PKI(公钥基础设施)的应用原理,采用PKI与SMIME相结合的方法,建立了基于PKI的安全邮件传输体系。
The solution, which makes use of the method of combining PKI with S/MIME, establishes a system of secure E-mail transfer, according to the application principle of Public Key Infrastructure(PKI).
详细分析了UMTS认证和密钥分配协议的过程以及协议的安全性,找出协议中存在的弱点和可能的攻击,提出了公钥加密协议的改进方法。
This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.
为了设计一种交叉域访问控制(XDAC)系统模型,采用了一种利用公钥证书鉴别用户的PK I方法。
In order to design a prototype for the cross-domain access control (XDAC) system, a PKI approach is used, in which users are identified by using public key certificates.
分析了病毒对文件完整性的破坏,对此提出了使用公钥密码体制进行数字签名来保护文件完整性的方法。
The destruction of the integrity of executable files by virus is discussed and the conceptof integrity information of executable files is proposed.
对无证书代理签名方案进行安全性分析,指出该方案对于公钥替换攻击是不安全的,并给出具体的攻击方法。
This paper analyzes the security of a certificateless proxy signature scheme and shows that it is insecure against the public key replacement attack in certificateless cryptosystems.
协议二没有采用NAXOS方法,即使用户临时公钥的离散对数泄漏,协议仍是安全的。
Protocol II, without using the NAXOS trick, is still secure even if the exponent of an ephemeral public key is leaked.
协议二没有采用NAXOS方法,即使用户临时公钥的离散对数泄漏,协议仍是安全的。
Protocol II, without using the NAXOS trick, is still secure even if the exponent of an ephemeral public key is leaked.
应用推荐