A symmetric key is dynamically created and used for encrypting a database backup image.
为数据库备份映像加密时,将动态创建并应用一个对称密匙。
The process involves the sender generating the message digest, then encrypting the digest using its private key to create the digital signature.
这个过程包括发送方生成消息摘要,然后用其私钥对摘要加密以创建数字签名。
Begins by indexing it and encrypting it with a symmetric encryption scheme (e.g., AES) under a unique key.
首先为其建立索引,并使用对称的加密模式(例如aes)以唯一的密钥对其进行加密。
Using private key-certificate pairs for signing and encrypting messages is more complex to configure than the simple UsernameToken example.
与简单的UsernameToken示例相比,使用私有密钥-证书对进行消息签名和加密的配置比较复杂。
An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.
非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
Instead of encrypting everything with the same key strength regardless of needs, rich clients can establish a comprehensive differentiating security policy based on the content.
胖客户机可以根据内容建立全面分级的安全性策略,而不是无论是否需要都以相同的密钥强度加密所有内容。
In practice, more is involved in signing messages than just encrypting with your private key.
在实际中,消息签名的过程不仅仅是使用私有密匙加密消息。
GnuPG allows encrypting and signing your data and communication, and features a versatile key-management system and access modules for all kinds of public key directories.
GnuPG支持数据和通信的加密和签名,且以一个多功能的密钥管理系统和各种公钥目录的访问模块为特色。
To encrypt file data, an encryption key password must be selected, which Tivoli Storage Manager uses to generate the encryption key for encrypting and decrypting the file data.
为加密文件数据,必须选择一个加密密钥口令,TivoliStorageManager使用它来生成加密密钥,以加密和解密文件数据。
Using asymmetric encryption with public/private key pairs for signing and encrypting messages is simple (at least conceptually!).
使用不对称加密和public/private密钥对进行消息的签名和加密是很简单的(至少概念上很简单)。
But first, I'll give you a quick rundown of the principles of public-key cryptography - the basis for most of WS-Security's encrypting and signing features.
但是,我们首先将扼要概述一下公开密匙加密的原理—这是WS - Security的加密和签名特性的主要基础。
Encrypting the message with the public key of the receiver's X.509 certificate to ensure that only they can access the message content.
使用接收方的X . 509证书的公钥来加密消息,以便确保只有它们才能访问消息内容。
Unlesss you know exactly what you are encrypting, it is never a good idea to encrypt something with your private key and then send it to somebody else.
用私钥加密某些信息,然后发送给其他人不是一个好主意,除非你清楚知道这个信息的含义。
Data encrypting and data underwrite are key technique of solving the problem of network security.
数据加密和数字签名是解决网格安全问题的关键技术。
By database encrypting, and key management and users access control, we can protect the database from destroying.
通过数据加密、密钥管理、用户拜访控制等一系列的手腕来维护数据库内部数据的安全。
For more information on this process of encrypting and transferring the key and IV, see Creating a Cryptographic Scheme.
有关加密和传输密钥与IV的过程的更多信息,请参见创建加密方案。
Still, encrypting the mobile a-gent's result by means of secret key associated with the host on which the agent runs can prevent the result from spying and tampering attack.
而且,利用与运行移动代理的主机相关的密钥对运行结果加密,能有效地防止对移动代理运行结果的窥探和篡改攻击。
Still, encrypting the mobile a-gent's result by means of secret key associated with the host on which the agent runs can prevent the result from spying and tampering attack.
而且,利用与运行移动代理的主机相关的密钥对运行结果加密,能有效地防止对移动代理运行结果的窥探和篡改攻击。
应用推荐