SSL客户机开始对话并发送诸如ssl版本之类的信息,同时还发送加密算法以及它所支持的散列函数。
The SSL Client initiates the conversation and sends information such as the SSL version, along with the encryption algorithms and hash functions it supports.
SSL服务器用加密算法以及要使用的散列函数来表示响应。
The SSL Server responds with the encryption algorithm and hash function to be used.
通过组合使用不同的密钥长度和散列算法,IBMNAS提供表1所示的加密类型。
With combination of different key lengths and different hashing algorithms, IBM NAS provides encryption types as shown in Table 1.
选择在IPSec隧道中加密数据所用的加密算法和散列算法。
Select Encryption algorithm and hashing algorithm you want to use in your IPSec tunnels to encrypt the data.
为了更多的利益,利用单向加密算法或散列,像MD 514或Blowfish,15将使密码的解密成为不可能。
For added benefit, using a one-way encryption algorithm or hash, like MD5 14 or Blowfish, 15 will make decrypting the password impossible.
为了使SSL会话中所使用的加密算法和散列函数的规范更容易,这些算法被分组到各个密码套件(CipherSuite)中。
To facilitate the specification of encryption algorithms and hash functions that are used during an SSL session, the algorithms are grouped into CipherSuites. A CipherSuite defines.
并且为了生成鼠标单击次数的加密散列,您需要mkpasswd程序。
And for generating encrypted hashes of the mouse-click times, you'll need the mkpasswd program.
PHP的内置crypt功能可实现单向加密或单向散列。
PHP's built-in crypt function implements one-way encryption or one-way hashing.
加密算法和散列函数被进一步分组到密码规范中。
The encryption algorithm and the hash function are further grouped into CipherSpecs.
任何接收此消息的人都可以对该消息使用相同的散列算法,然后使用您的公开密匙解密附带的已加密摘要,并比较两者的值。
Anyone receiving the message can use the same hash algorithm on that message, then decrypt the supplied encrypted digest using your public key and compare the two values.
其他特性还包括加密散列函数,加密转换库和加密硬件支持。
Other features include cryptographic hash functions, cryptographic transform libraries, and cryptographic hardware support.
加密散列是使用SHA- 256算法来计算的,数字签名是使用rsa算法来生成的。
The cryptographic hash is calculated using the SHA-256 algorithm and the digital signature is generated using the RSA algorithm.
为此,需要使用加密的散列值或者完善的文档数字签名。
To do so, you would want to have a cryptographic hash or full-blown digital signature of the document.
为了防止人们在该文件写入内容,苹果用校验和散列(checksum hash)函数对其进了加密。
To prevent people from writing to this file, Apple protects it with a checksum hash which has to be reverse-engineered.
加密散列碰撞是什么?
每个check属性组成了以下连接字符串的MD 5散列(一种通常用于生成加密散列的消息摘要算法)。
Each check attribute constitutes an MD5 hash (a message digest algorithm commonly used in generating cryptographic hashes) of the following concatenated string.
本文讨论散列算法中一种盐值的选取,并分析比较加与不加盐值所得到的不同的加密效果。
This paper discusses choosing a salt figure based on hashing algorithm, analyzes and compares the different encryption effects with salt figure or without salt figure.
要生成一个新的公钥和私钥对吗?加密服务提供程序、密钥长度和散列算法的设置都会被保留。
Do you want to generate a new public and private key pair? The cryptographic service provider, key length, and hash algorithm Settings will be preserved.
这次竞赛的目的是为了寻找一个强大的替代品,来取代现有的散列函数集。因为现有的散列函数集中有些已经显现出比当初设想的要差的加密性。
The contest seeks to find a strong replacement for the current family of hash functions, some of which have been shown to be cryptographically weaker than originally thought.
提出了一种利用加密算法并结合散列函数选择文本中嵌入水印的汉字序列的算法。
A text image watermarking algorithm using encryption and hashing function is presented to choose Chinese characters sequence which need to be embedded watermarking.
并且这些体系所使用散列算法在实质上都是串行的,因而待加密数据越长,加密运算时光越长。
Those hash algorithms are essentially serialized, so the longer the length of the source file is, the longer the hash operation takes.
MD 5是一个“加密”散列函数,因为生成一个具有特定给定散列值的信息块非常困难。
MD5 is a "cryptographic" hash function, because it's very difficult to produce a block of information that has a specific given hash value.
本文讨论散列算法中一种盐值的选取,并分析比较加与不加盐值所得到的不同的加密效果。
This article consists of five parts: search algorithm, flowchart, hash search function, heuristic search, and experimental results.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
应用推荐