您提供的次密钥太长或太短。
通过这样一填充,即使我们重用密钥,偷听者在网络上两次看到的数也是不一样的。
If we reused the key, the eavesdropper would likely see a different value placed on the network due to the random padding.
例如,不会在第一次使用时缺省创建变量和散列密钥。
For example, variables and hash keys won't be created on their first use by default.
步骤3中所示的示例(参见清单 3)发出第一次远程SSH调用(ls-d /tmp)到目标服务器,从而缓存您的服务器的 .ssh/known_hosts文件内的密钥。
The example shown for step 3 (see Listing 3) makes the first-time remote SSH call (ls -d /tmp) to the destination server, thereby caching the key within your server's .ssh/known_hosts file.
我们中的很多人尝试保存购买接受页面或者产品密钥,去发现当你再一次打开它的时候网页变得杂乱无章。
Many of us have tried to save a purchase receipt page or product key, only to find that the web page looks scrambled when you later open it.
当然,如果对于每个用户和每个实例使用不同的ssh密钥,Pageant只能为对每个实例的第二次和后续连接提供密钥,但这是实现更高的安全性要付出的代价。
Of course, if you use per-user and per-instance SSH keys, then Pageant can only provide the key for the second and subsequent connections to each instance - but that's the cost of tighter security.
此外,每隔一段时间修改一次安全密钥也是个好主意,也可以调度一个cron作业来提醒自己及时更改安全密钥。
In addition, it's a good idea to change security keys every once in a while, and you can schedule a cron job to remind you of that as well.
下一次,我将搭建一个KDC服务器、从该服务器中获取Kerberos票据、并用这些票据与电子银行的业务逻辑服务器交换密钥。
Next time, I'll set up a KDC server, fetch Kerberos tickets from that server, and use those tickets to exchange cryptographic keys with the e-bank's business logic server.
注意:记下密码;在下一次单点登录(SSO)任务——向LotusDomino服务器导入ltpa密钥时需要该密码。
Note: Make note of the password; you need it during the next single sign-on (SSO) task when the LTPA key is imported into the Lotus Domino server.
例如,创建密钥、安装密钥、通过. bash_profile执行ssh - agent的过程在每台机器只需要进行一次。
For example, the process of creating the keys, installing them, and getting ssh-agent to execute via a.bash_profile only has to be done once per machine.
如果相同的块加密两次使用相同的密钥,由此产生的密文块是相同的。
If the same block is encrypted twice with the same key, the resulting ciphertext blocks are the same.
密钥管理和密码同步是一次一密系统应用于实际的两个关键难题。
Key management and key synchronization are two important problem for realizing an one-time pad system.
该方案是基于椭圆曲线,采用一次一密签名构造的,具有安全性高,速度快,密钥量小,便于实现等优点。
This scheme that is constructed based on elliptic curve with one-time pair of keys has the merits of security, efficiency, smaller key and easy realization.
基于量子一次一密和量子密钥分配,提出了一种针对经典消息的高效量子签名协议。
An efficient quantum signature protocol of classical messages which was based on quantum one-time pad and quantum key distribution was presented.
陌生的双方在建立信任关系时,仅仅交换一次信任书,随后多次交换对称密钥,直到协商完成或者失败。
When a trust was established between strangers, their credentials were exchanged only once, and two parties exchanged the secret keys iteratively until the trust negotiation succeeded or failed.
ADFS使用SSL和公开密钥加密等一组安全协议,提供了单次登录访问没有放在内部网络上的应用程序这个便利。
ADFS USES a set of secure protocols like SSL and Public Key encryption to provide Single Sign on to applications that are not hosted inside your network.
此时谈判的每一方都是一个组,因此需要为多个组一次协商出所有的组密钥。
The other one can not only generates secret session key for one group but also generates keys for subgroups that exist in this group.
本文提出了一类新型的公开密钥密码—布尔公钥,并研究了它的一种特殊形式,二次布尔公钥。
A new kind of public key cryptosystem, the Boolean public key system, is introduced in this paper. Also, one of its special forms, the Boolean key cryptosystem of the second order, is discussed.
基于可验证的分布式密钥生成方案,设计了一个可验证的广义二次拍卖模型。
Based on distributed key generation protocol, we design a verifiable Generalized Vickrey Auction protocol.
谁能建议的一种方式来存储密码(已经给了它一次)安全地在说会话变量中,由一个密钥加密,只有客户需要持有,直到点的时候?。
Can anyone suggest a way to store the password (having been given it once) securely in say the session variable, encrypted by a key that only the client holds until the point when it's needed?
密钥扩展采用一次性生成方式。
提出了一种新的,基于主机身份的一次性密钥交换协议i- OKEP,并分析了其安全性。
After this, the paper takes out a new host Indentity based One-time Key Exchange Protocol (I-OKEP), and analyzes its security character.
SELF要求各节点每经过一个规定的时间间隔,就更新一次节点的身份密钥和节点间的邻居密钥,并将原密钥作废。
SELF required each node update the identity key of the node and the neighbor key between nodes and invalidate the old keys at given intervals.
然后,节点之间通过不同位进行第一次通信,并经过三次握手确定最终的密钥参数。
Then, the first time communication was set up between any two nodes, and the last key's parameter was ensured by thrice handshake.
该机制通过非对称加密算法、随机密钥加密用户备份信息,以及“一次一密”加密数据库等手段有效解决传统密钥恢复机制在密钥产生、存储、备份、恢复过程中的安全问题。
In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.
该机制通过非对称加密算法、随机密钥加密用户备份信息,以及“一次一密”加密数据库等手段有效解决传统密钥恢复机制在密钥产生、存储、备份、恢复过程中的安全问题。
In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.
应用推荐