数据块使用一个对称密钥算法进行加密,它使用一个密钥来实现对数据的加密和解密。
The bulk of the data is encrypted using a symmetric key algorithm that encrypts and decrypts data using a single secure key.
对称算法非常有效,并且可以与用于加密和解密计算的单一密钥一起使用。
Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.
用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509证书相关联的公钥的非对称算法进行加密的。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.
对称密钥(公钥)算法用于交换在对称算法中使用的加密密钥,以及用于数字签名。
An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.
非对称算法用于生成成对的密钥。
Asymmetric algorithms are used to generate keys that exist in pairs.
这个SunJCE提供程序不适合生成非对称密钥,因为它没有包含rsa算法类型的实现。
The SunJCE provider is not suitable for generating asymmetric keys, as it does not contain the RSA algorithm type implementation.
不对称加密算法(也称为公钥算法)要求每个实体都维护一对相关密钥:私钥和公钥。
Asymmetric cryptographic algorithms, also known as public-key algorithms, require that each entity maintains a pair of related keys: a private key and a public key.
表示不对称算法所用密钥模块的大小(以位为单位)。
Represents the size, in bits, of the key modulus used by the asymmetric algorithm.
确定对称加密算法的有效密钥大小设置。
Determines the set of valid key sizes for the symmetric cryptographic algorithms.
文中讨论了怎样在非对称密钥体制下集成一个网络加密系统及相关的密钥管理算法,并结合银行的网络系统的结构进行了一些探讨。
This paper describes how to integrate a networks cryptographic system based on the non-symmetric cryptographic system, and the correlative key-management method.
作为现在流行的采用密钥加密解密的算法,无非分为对称密钥和非对称密钥两种类型。
As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.
本节描述如何为对称算法和不对称算法生成和管理密钥。
This section describes how to generate and manage keys for both symmetric and asymmetric algorithms.
该协议采用的技术包括,对称密钥加密、公共密钥加密、哈希算法、数字签名技术以及公共密钥授权机制等。
The protocol USES such technologies as symmetrical key encryption, public key encryption, Hasche algorithm, digital signature as well as public key authorization mechanism and so on.
使用该类可方便地在VB应用程序中实现对称密钥、公开密钥和数字签名算法,并且不受中英文编码方式的限制。
This class can be flexibly used in VB to implement such cryptography algorithms as Symmetric Key, Public Key and Digital Signature.
公开钥匙算法则是不对称的,采用不同的密钥,一个公开的钥匙和一个秘密的钥匙,用于加密和解密。
Public-key algorithms, on the other hand, are asymmetrical, using different keys, a public key, and a secret key, for encryption and decryption.
获取不对称算法支持的密钥大小。
Gets the key sizes that are supported by the asymmetric algorithm.
指定不对称算法支持的密钥大小。
Specifies the key sizes that are supported by the asymmetric algorithm.
综合运用对称加密算法和公钥算法,既保证敏感信息的存储安全又为密钥提供安全高效的管理。
This scheme used of symmetry encryption and public key encryption which provided secured storage for sensitive data and effective key management.
与TCG的密码方案相比,可信密码模块(TCM)引入了对称算法,并采用ECC作为签名算法,在减少密钥存储空间的同时,提高了密码算法的运算速率。
Compared with TCG's design, TCM reduces the storage space of keys and speeds up cryptography's work by adding symmetrical arithmetic and ECC arithmetic.
该机制通过非对称加密算法、随机密钥加密用户备份信息,以及“一次一密”加密数据库等手段有效解决传统密钥恢复机制在密钥产生、存储、备份、恢复过程中的安全问题。
In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
获取对称算法支持的密钥大小(以位为单位)。
Gets or sets the feedback size, in bits, of the cryptographic operation.
获取对称算法支持的密钥大小(以位为单位)。
Gets or sets the feedback size, in bits, of the cryptographic operation.
应用推荐