• 用于数据加密密钥使用带有与服务提供者(Service Provider) X.509证书相关联的公钥的对称算法进行加密的。

    The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.

    youdao

  • 客户端消息发送网络之前WS-Security使用非对称密钥对消息进行数字签名加密

    Prior to the message being sent onto the wire from the client, WS-Security used asymmetric keys to digitally sign and encrypt the message.

    youdao

  • 对称算法使用不同密钥消息进行加密解密;其中个秘必须秘密的,一个密钥通常公开的。

    An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.

    youdao

  • 关键的问题这些密钥对称的——使用密钥加密信息可以使用一个密钥来解密

    The important point is that the keys are asymmetricinformation encrypted with one key can be decrypted using the other key.

    youdao

  • 关键的问题这些密钥对称的;使用密钥加密信息可以使用一个密钥来解密

    The important point is that the keys are asymmetric; information encrypted with one key can be decrypted using the other key.

    youdao

  • 因为涉及到一对密钥所以它称为对称加密

    Since a pair of keys is involved, it is also called an asymmetric cryptography.

    youdao

  • 对称密钥一个缺点加密消息对称密钥花费长的时间,而且加密时间直接与消息的长短成正比

    One disadvantage of asymmetric keys is that they take much longer to encrypt a message than do symmetric keys, and the encryption time is directly proportional to the size of the message.

    youdao

  • 换言之可以同时使用多个证书密码对称密钥以及对称密钥单个对称密钥进行加密

    In other words, a single symmetric key can be encrypted by using multiple certificates, passwords, symmetric keys, and asymmetric keys at the same time.

    youdao

  • 目前有几种加密技术对称密钥密码系统对称密钥密码系统。

    Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.

    youdao

  • 作为现在流行采用密钥加密解密算法,无分为对称密钥非对称密钥两种类型。

    As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.

    youdao

  • 公钥对称公钥密码学使用一对密钥,其中个定义加密存放另外一个称为公钥,通常无须加密

    Public Key and Asymmetric - Public-key cryptography uses a pair of keys, one that is designated the private key and kept secret, the other key is called the public key and is generally made available.

    youdao

  • 文中讨论了怎样对称密钥体制集成一个网络加密系统及相关的密钥管理算法,结合银行的网络系统的结构进行一些探讨。

    This paper describes how to integrate a networks cryptographic system based on the non-symmetric cryptographic system, and the correlative key-management method.

    youdao

  • 其它非对称加密体制相比ECC被认为能提供更高加密强度,并具有更快的执行速度更小的密钥长度

    Compared with other asymmetric cryptography, ECC provides higher strength per bit, makes faster computation and requires shorter key length.

    youdao

  • 密钥RC4加密生成初始密钥交换中的RSA非对称加密使用

    The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.

    youdao

  • 机制通过非对称加密算法随机密钥加密用户备份信息,以及“一次一加密数据库等手段有效解决传统密钥恢复机制密钥产生存储、备份、恢复过程中的安全问题

    In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.

    youdao

  • 非对称密钥用于公钥加密,公钥加密使用两个密钥即在数学上相关的一个公钥一个私

    Asymmetric keys are used in public-key cryptography, which USES two keys, a public key and a private key, which are related mathematically.

    youdao

  • 第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

  • 第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定