Because this is using asymmetric encryption, where each side has its own certificate and private key, it should be somewhat simpler to handle than the Listing 5 symmetric-encryption example.
因为这是使用非对象加密技术,而每一端有自己的证书和私有密钥,比起清单5对称加密技术示例,它处理起来更为简单。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509 证书相关联的公钥的非对称算法进行加密的。
Using asymmetric encryption with public/private key pairs for signing and encrypting messages is simple (at least conceptually!).
使用不对称加密和public/private密钥对进行消息的签名和加密是很简单的(至少概念上很简单)。
As discussed in "Axis2 WS-Security signing and encryption," asymmetric encryption is a useful tool because it works with key pairs.
正如在“Axis2WS - Security签名和加密”一文中讨论的,非对称加密由于可处理密匙对,因此是一种很有用的工具。
The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
密钥的RC4加密后生成的初始密钥交换中的RSA非对称加密使用。
To communicate a symmetric key and IV to a remote party, you would usually encrypt the symmetric key and IV using asymmetric encryption.
若要与远端的一方沟通对称金钥和IV,通常会使用非对称加密来加密对称金钥和IV。
Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
The RDP protocol USES the RC4 symmetric encryption algorithm with up to 128 bit keys. The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
RDP协议的使用对称加密算法rc4多达128位钥匙。rc4加密后所产生的一个初步的交流,其中的关键是使用RSA的非对称加密。
In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.
该机制通过非对称加密算法、随机密钥加密用户备份信息,以及“一次一密”加密数据库等手段有效解决传统密钥恢复机制在密钥产生、存储、备份、恢复过程中的安全问题。
In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.
该机制通过非对称加密算法、随机密钥加密用户备份信息,以及“一次一密”加密数据库等手段有效解决传统密钥恢复机制在密钥产生、存储、备份、恢复过程中的安全问题。
应用推荐