A novel public key encryption scheme with multiple private keys is presented.
提出了一种新的具有多个私钥的加密方法。
The RSA algorithm based on the number theory is one of the public key encryption.
RSA算法是基于数论的公开密钥密码体制。
Therefore, in essence, it is like being encrypted with the equivalent of a 168-key encryption.
这样,本质上就相当于用一个长为168位的密钥进行加密。
However, its weak key encryption caused some hacker software easily to get the database password.
但是由于数据库的加密机制非常简单,很容易破解数据库密码,安全性差。
To create the public or private key, you need to use ssh-keygen, specifying the type of key encryption.
要创建公钥或私钥,您需要使用ssh-keygen 来指定密钥加密的类型。
In the grown-up world, you solve these problems through the use of public key-private key encryption.
在成年人的世界里,可以通过使用公钥—私钥加密来解决此类问题。
See Resources for links to more information on digital certificates and public-key encryption in general.
参见参考资料 获得有关数字证书和公开密匙加密的更多信息的链接。
As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.
作为现在流行的采用密钥加密解密的算法,无非分为对称密钥和非对称密钥两种类型。
Public-key encryption The key distribution problem has always been the weak link in the secret-key systems.
公钥加密密钥的分布问题在秘钥系统中一直是一个薄弱环节。
Signing an assembly with a strong name adds a public key encryption to the file containing the assembly manifest.
使用强名称对程序集进行签名将向包含程序集清单的文件添加公钥加密。
With PGP and other public-key encryption methods, there's no way to deduce someone's private key from the public key.
对于PGP和其他公钥加密方法,不存在从公钥推断某人私钥的方法。
A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.
公钥加密算法和追踪算法结合在一起,可构成一个公钥广播加密方案。
Default_tkt_enctypes: This field identifies the list of session key encryption types that will be requested by the client.
default_tkt_enctypes:这个字段指定客户机将请求的会话密匙加密类型的列表。
To evaluate the IND-CCA2 security of public key encryption schemes, proposed the gray-box analysis of IND-CCA2 security.
为了更简单准确地判断公钥加密方案的IND-CCA2安全性,提出了IND-CCA2安全性的灰盒分析法。
Public-key encryption solves the problem of managing several keys, but encryption is slow compared to conventional encryption.
公开钥匙加密法解决了管理几个钥匙的问题,但是与常规加密相比,公开钥匙加密慢些。
Many encryption packages that are basically secret-key systems use public-key encryption to communicate the secret session keys.
很多基本上是秘钥系统的加密软件包采用明钥加密,来传送秘密的会话密钥。
Most corporations do not need the level of email security provided by PGP or built-in public key encryption in most email systems.
大多数企业的大多数电子邮件系统不需要PGP或内置公匙加密提供的电子邮件安全级别。
If you are using more advanced techniques (like public key encryption) you'll probably need to brush up on your math a little more.
如果您使用的是更先进的技术(如公共密钥加密)你可能会需要温习你的数学一点。
Like urban public transport as IC CARDS, these CARDS to the public transport system, each card key encryption to have control of the factory.
就象城市公共交通IC卡一样,这些卡在交给公交系统使用前,每张卡的密钥都要进行出厂加密控制。
The problem was a famous one in the field – it had been proposed in the late 1970s by developers of the famous RSA public key encryption scheme.
这是密码学领域一个有名的难题--它于20世纪70年代末由著名的RSA公钥加密方案的开发人员提出的。
This scheme used of symmetry encryption and public key encryption which provided secured storage for sensitive data and effective key management.
综合运用对称加密算法和公钥算法,既保证敏感信息的存储安全又为密钥提供安全高效的管理。
After the authentication, SSL will actually use secret key encryption to secure the channel, but the details of that aren't relevant to this discussion.
在身份验证之后,SSL将真正使用保密的密钥加密来保护通道,但其细节与本讨论无关。
This paper introduces the routine encryption of computer information and the publicity key encryption mainly, and compares the both and their environment.
本文主要介绍了计算机信息的常规加密技术和公开密钥加密技术,并对两者的优缺点和应用环境作了比较。
BOINC protects against several types of attacks. For example, digital signatures based on public-key encryption protect against the distribution of viruses.
BOINC能防止各种类型的攻击。例如,使用基于公共钥匙加密技术的数字签名来防范病毒传播。
Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output.
步骤4:利用一个数据加密密钥、一个密钥加密密钥、与这两个密钥相关联的算法、以及将来包含在输出信息中的密钥信息,根据它们来创建一个Encryptor对象。
EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.
EKE协议是基于弱口令的密钥交换协议,通过使用对称密钥加密体制和公钥加密体制,能够很好地抵抗离线字典攻击。
This paper puts forward a new random key encryption algorithm and a new compression algorithm, and gives the strict mathematical certification for this encryption algorithm.
提出一种随机公开密钥加密算法和一个压缩算法,并给出这个加密算法严格的数学证明。
This paper puts forward a new random key encryption algorithm and a new compression algorithm, and gives the strict mathematical certification for this encryption algorithm.
提出一种随机公开密钥加密算法和一个压缩算法,并给出这个加密算法严格的数学证明。
应用推荐