How to: Store Asymmetric Keys in a Key Container.
如何:将非对称密钥存储在密钥容器中。
The issued token can have a symmetric or an asymmetric key.
发行的权杖可具有对称或非对称金钥。
The symmetric key itself is encrypted by one or more asymmetric keys (public keys).
这个对称密匙本身又由一个或多个非对称密匙(公共密匙)加密。
When implemented, gets a value that indicates whether the token has an asymmetric key.
实现时,将获取一个值,该值指示令牌是否支持客户端身份验证。
Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.
对称密钥(公钥)算法用于交换在对称算法中使用的加密密钥,以及用于数字签名。
In other words, a single symmetric key can be encrypted by using multiple certificates, passwords, symmetric keys, and asymmetric keys at the same time.
换言之,可以同时使用多个证书、密码、对称密钥以及非对称密钥对单个对称密钥进行加密。
The symmetric key systems compared with asymmetric key systems have astounding speed benefits, but managing their keys has always been difficult problem to be solved.
对称密钥系统较之非对称密钥系统具有惊人的速度优势,但是管理对称密钥系统的密钥却是需要解决的一个难题。
Because this is using asymmetric encryption, where each side has its own certificate and private key, it should be somewhat simpler to handle than the Listing 5 symmetric-encryption example.
因为这是使用非对象加密技术,而每一端有自己的证书和私有密钥,比起清单5对称加密技术示例,它处理起来更为简单。
Public-private key combination is at the heart of Public key Infrastructure (PKI), and is based on asymmetric cypher.
公钥-私钥组合是公共密钥基础设施的核心,建立在非对称密码的基础上。
Symmetric algorithms have faster performance than asymmetric algorithms, but passing the secret key securely between participants poses a distribution problem.
对称算法的性能比非对称算法的性能快,但是在参与者之间安全地传递秘钥会引起分发问题。
Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).
不对称加密:公钥加密(这两个术语是同义词)。
An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.
非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
The important point is that the keys are asymmetric — information encrypted with one key can be decrypted using the other key.
关键的问题是这些密钥是非对称的——使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric; information encrypted with one key can be decrypted using the other key.
关键的问题是这些密钥是非对称的;使用一个密钥加密的信息可以使用另一个密钥来解密。
The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding private key can decrypt the data.
传递的数据使用公钥(非对称)加密算法加密,所以只有对应私钥的持有者才能解密数据。
The asymmetric algorithm USES the public key in the server's digital certificate.
对称算法将使用服务器的数字证书中的公钥。
Using asymmetric encryption with public/private key pairs for signing and encrypting messages is simple (at least conceptually!).
使用不对称加密和public/private密钥对进行消息的签名和加密是很简单的(至少概念上很简单)。
As discussed in "Axis2 WS-Security signing and encryption," asymmetric encryption is a useful tool because it works with key pairs.
正如在“Axis2WS - Security签名和加密”一文中讨论的,非对称加密由于可处理密匙对,因此是一种很有用的工具。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509 证书相关联的公钥的非对称算法进行加密的。
The public key cryptosystem or the asymmetric cryptosystem is an important way to implement and ensure information security.
公开钥密码系统或非对称密码系统是实现和保障信息安全的一种重要方式。
Angle of attack and nose shape of bodies are key factors that asymmetric vortex occurs over slender bodies.
迎角、旋成体的外形,尤其是头部的几何形状是细长前体出现非对称涡的关键因素。
Represents the size, in bits, of the key modulus used by the asymmetric algorithm.
表示不对称算法所用密钥模块的大小(以位为单位)。
A group of deep-shallow thrusting sheets and asymmetric deformationfan-tectosomes is a key tectonic(division)domain in S. China orogenic zone.
深部—浅部系列冲断构造块体和不对称扇形构造形变体是组成区内“华南造山带”中一个重要的构造单元。
Compared with other asymmetric cryptography, ECC provides higher strength per bit, makes faster computation and requires shorter key length.
同其它非对称加密体制相比,ECC被认为能提供更高的加密强度,并具有更快的执行速度和更小的密钥长度。
The author emphasis that investment banking has advantage in the decision of stock price in the process of IPO owing to information asymmetric and often play a key role in the success of IPO.
在其中强调,投资银行在解决IPO定价中的信息不对称问题具有专业优势,往往对IPO的成功发行起着关键作用。
Key restrictions are the asymmetric bandwidth of the communications channel and latency.
关键是不对称的带宽限制和延迟的通信通道。
Asymmetric cryptographic algorithms, also known as public-key algorithms, require that each entity maintains a pair of related keys: a private key and a public key.
不对称加密算法(也称为公钥算法)要求每个实体都维护一对相关密钥:私钥和公钥。
The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
密钥的RC4加密后生成的初始密钥交换中的RSA非对称加密使用。
The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
密钥的RC4加密后生成的初始密钥交换中的RSA非对称加密使用。
应用推荐