用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509证书相关联的公钥的非对称算法进行加密的。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
从客户端将消息发送到网络之前,WS-Security使用了非对称密钥对消息进行数字签名和加密。
Prior to the message being sent onto the wire from the client, WS-Security used asymmetric keys to digitally sign and encrypt the message.
非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.
关键的问题是这些密钥是非对称的——使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric — information encrypted with one key can be decrypted using the other key.
关键的问题是这些密钥是非对称的;使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric; information encrypted with one key can be decrypted using the other key.
因为涉及到一对密钥,所以它也称为非对称加密。
Since a pair of keys is involved, it is also called an asymmetric cryptography.
非对称密钥的一个缺点是加密消息要比对称密钥花费更长的时间,而且加密时间直接与消息的长短成正比。
One disadvantage of asymmetric keys is that they take much longer to encrypt a message than do symmetric keys, and the encryption time is directly proportional to the size of the message.
换言之,可以同时使用多个证书、密码、对称密钥以及非对称密钥对单个对称密钥进行加密。
In other words, a single symmetric key can be encrypted by using multiple certificates, passwords, symmetric keys, and asymmetric keys at the same time.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
作为现在流行的采用密钥加密解密的算法,无非分为对称密钥和非对称密钥两种类型。
As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.
公钥和非对称公钥密码学使用一对密钥,其中的一个定义为私钥并加密存放,另外一个被称为公钥,通常无须加密。
Public Key and Asymmetric - Public-key cryptography uses a pair of keys, one that is designated the private key and kept secret, the other key is called the public key and is generally made available.
文中讨论了怎样在非对称密钥体制下集成一个网络加密系统及相关的密钥管理算法,并结合银行的网络系统的结构进行了一些探讨。
This paper describes how to integrate a networks cryptographic system based on the non-symmetric cryptographic system, and the correlative key-management method.
同其它非对称加密体制相比,ECC被认为能提供更高的加密强度,并具有更快的执行速度和更小的密钥长度。
Compared with other asymmetric cryptography, ECC provides higher strength per bit, makes faster computation and requires shorter key length.
密钥的RC4加密后生成的初始密钥交换中的RSA非对称加密使用。
The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
该机制通过非对称加密算法、随机密钥加密用户备份信息,以及“一次一密”加密数据库等手段有效解决传统密钥恢复机制在密钥产生、存储、备份、恢复过程中的安全问题。
In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.
非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关的一个公钥和一个私钥。
Asymmetric keys are used in public-key cryptography, which USES two keys, a public key and a private key, which are related mathematically.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
应用推荐