You have not chosen an encryption key.
您还没有选择一个加密密钥。
Again, the encryption key needs to match between the client and server.
同样,客户机与服务器之间的加密密钥必须匹配。
Store the encryption key password for later use.
存储加密密钥口令以便此后使用。
After the authentication, SSL will actually use secret key encryption to secure the channel, but the details of that aren't relevant to this discussion.
在身份验证之后,SSL将真正使用保密的密钥加密来保护通道,但其细节与本讨论无关。
A similar request is needed to upload the encryption key, which is private.
需要用一个类似的请求上传私有的加密密匙。
Default_tkt_enctypes: This field identifies the list of session key encryption types that will be requested by the client.
default_tkt_enctypes:这个字段指定客户机将请求的会话密匙加密类型的列表。
First, we use keytool to create a key store for holding a generated encryption key.
首先,使用keytool创建用于保存生成的加密密钥的密钥库。
Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output.
步骤4:利用一个数据加密密钥、一个密钥加密密钥、与这两个密钥相关联的算法、以及将来包含在输出信息中的密钥信息,根据它们来创建一个Encryptor对象。
If an encryption key is created with this option, the encryption key is stored on the agent disk with password protection.
如果加密密匙在创建时带有这个选项,那么它就存储在有密码保护的代理磁盘上。
You can use the same encryption key or different encryption keys against files and directories under the guard point.
您可以对保护点下的文件和目录使用相同或不同的加密密匙。
See Resources for links to more information on digital certificates and public-key encryption in general.
参见参考资料 获得有关数字证书和公开密匙加密的更多信息的链接。
The key can be encrypted, using a password (hopefully not weak) as the encryption key.
可以通过将一个密码(希望不太弱)用作加密密钥来对密钥加密。
In the grown-up world, you solve these problems through the use of public key-private key encryption.
在成年人的世界里,可以通过使用公钥—私钥加密来解决此类问题。
You need a symmetric key to do the encryption, and the key must be managed independently.
必须有对称密钥才能解密,而且密钥必须单独管理。
With PGP and other public-key encryption methods, there's no way to deduce someone's private key from the public key.
对于PGP和其他公钥加密方法,不存在从公钥推断某人私钥的方法。
Like urban public transport as IC CARDS, these CARDS to the public transport system, each card key encryption to have control of the factory.
就象城市公共交通IC卡一样,这些卡在交给公交系统使用前,每张卡的密钥都要进行出厂加密控制。
The problem was a famous one in the field – it had been proposed in the late 1970s by developers of the famous RSA public key encryption scheme.
这是密码学领域一个有名的难题--它于20世纪70年代末由著名的RSA公钥加密方案的开发人员提出的。
To create the public or private key, you need to use ssh-keygen, specifying the type of key encryption.
要创建公钥或私钥,您需要使用ssh-keygen 来指定密钥加密的类型。
This paper introduces the routine encryption of computer information and the publicity key encryption mainly, and compares the both and their environment.
本文主要介绍了计算机信息的常规加密技术和公开密钥加密技术,并对两者的优缺点和应用环境作了比较。
Most corporations do not need the level of email security provided by PGP or built-in public key encryption in most email systems.
大多数企业的大多数电子邮件系统不需要PGP或内置公匙加密提供的电子邮件安全级别。
Signing an assembly with a strong name adds a public key encryption to the file containing the assembly manifest.
使用强名称对程序集进行签名将向包含程序集清单的文件添加公钥加密。
Many encryption packages that are basically secret-key systems use public-key encryption to communicate the secret session keys.
很多基本上是秘钥系统的加密软件包采用明钥加密,来传送秘密的会话密钥。
This paper puts forward a new random key encryption algorithm and a new compression algorithm, and gives the strict mathematical certification for this encryption algorithm.
提出一种随机公开密钥加密算法和一个压缩算法,并给出这个加密算法严格的数学证明。
If you are using more advanced techniques (like public key encryption) you'll probably need to brush up on your math a little more.
如果您使用的是更先进的技术(如公共密钥加密)你可能会需要温习你的数学一点。
Therefore, in essence, it is like being encrypted with the equivalent of a 168-key encryption.
这样,本质上就相当于用一个长为168位的密钥进行加密。
A novel public key encryption scheme with multiple private keys is presented.
提出了一种新的具有多个私钥的加密方法。
As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.
作为现在流行的采用密钥加密解密的算法,无非分为对称密钥和非对称密钥两种类型。
A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.
公钥加密算法和追踪算法结合在一起,可构成一个公钥广播加密方案。
A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.
公钥加密算法和追踪算法结合在一起,可构成一个公钥广播加密方案。
应用推荐