• The SSL Client initiates the conversation and sends information such as the SSL version, along with the encryption algorithms and hash functions it supports.

    SSL客户机开始对话发送诸如ssl版本之类信息同时还发送加密算法以及所支持散列函数

    youdao

  • The SSL Server responds with the encryption algorithm and hash function to be used.

    SSL服务器用加密算法以及使用散列函数表示响应。

    youdao

  • The encryption algorithm and the hash function are further grouped into CipherSpecs.

    加密算法函数进一步分组密码规范中

    youdao

  • LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.

    LMHash容易此类攻击攻破,是因为没有使用现今常用加密过程引入salt”的方式。

    youdao

  • For added benefit, using a one-way encryption algorithm or hash, like MD5 14 or Blowfish, 15 will make decrypting the password impossible.

    为了更多利益利用单向加密算法散列MD 514Blowfish,15使密码解密成为不可能

    youdao

  • To facilitate the specification of encryption algorithms and hash functions that are used during an SSL session, the algorithms are grouped into CipherSuites. A CipherSuite defines.

    为了使SSL会话使用加密算法散列函数规范更容易,这些算法分组各个密码套件(CipherSuite)中。

    youdao

  • The encryption using crypto algorithms is ensured by the fact that it is computationally infeasible to generate plaintext that matches the hash value.

    使用加密算法的保密性这样一个事实保证,生成哈希匹配明文在计算上不可行的

    youdao

  • A hash is the result of a cryptographic function that takes an arbitrarily sized string of data, performs a mathematical encryption function on it, and returns a fixed-size string.

    哈希加密功能所获得结果,这种加密需要获取任意大小字符串数据,并用算法进行加密然后返回一个固定大小的字符串。

    youdao

  • This hash value is what's finally included in the actual signature, and generating the signature is the only step for which symmetric vs. asymmetric encryption is any different.

    hash最终包含实际签名中,生成签名是非对称与对称仅有的不同之处。

    youdao

  • This paper defines a PPP authentication methods, the method using random "challenge" and the basis for "challenge" and calculated key encryption Hash "responsive" to complete certification.

    本文定义了一种PPP认证方法方法利用随机挑战依据“挑战”和密钥计算出加密哈希应答完成认证

    youdao

  • I can't simply use a hash or encryption to store the password because the database must recognize the password (I think most or all databases must receive password as plain text).

    不能简单地使用加密存储密码因为数据库必须识别密码(我认为大多数所有数据库必须以纯文本格式接收密码)。

    youdao

  • The results show that the implementations of the encryption algorithms and one-way hash algorithms achieved relatively high performance.

    性能测试结果表明密码算法单向列算法SDTA结构上获得好的性能。

    youdao

  • The results show that the implementations of the encryption algorithms and one-way hash algorithms achieved relatively high performance.

    性能测试结果表明密码算法单向列算法SDTA结构上获得好的性能。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定