Receivers use a combination of the sender's public key and their own private encryption key to unlock the secret code for that message and decipher it.
接收者利用发送者的公开密钥和他们自己的秘密密钥的结合,解开该报文的秘密编码,并解密之。
Some form of network-level encryption, such as a Virtual Private Network (VPN), perhaps using IP Security Protocol (IPSEC), is the most obvious solution, although there are other reasonable choices.
某种可能使用IP安全性协议 (IPSEC)的网络级加密形式(例如虚拟专用网 (VPN))是最可取的解决方案,虽然也有其他合理的选择。
A similar request is needed to upload the encryption key, which is private.
需要用一个类似的请求上传私有的加密密匙。
This proof of possession is similar to how the SSL handshake protocol uses encryption to prove that a client is in fact the holder of a private key, without sending the key itself.
这种所有权证明类似于SSL握手协议使用加密来证明客户端是私有密匙的持有者,而不需要发送密匙本身。
Because this is using asymmetric encryption, where each side has its own certificate and private key, it should be somewhat simpler to handle than the Listing 5 symmetric-encryption example.
因为这是使用非对象加密技术,而每一端有自己的证书和私有密钥,比起清单5对称加密技术示例,它处理起来更为简单。
The public/private keys need to be created for each host. They will be used both for encryption and identification of the hosts.
需要为每台主机创建公共/私有密匙,它们将用于加密和主机识别。
The encryption guarantees the data confidentiality on the topic, because only the service provider owning the right private key can perform decryption correctly and, thus, understand the data.
加密可以保证有关某个主题的数据机密性,原因是只有拥有正确私钥的服务提供者才能正确执行解密,因此也能读懂该数据。
Trust is also established from a technology perspective using cryptographic methods, including encryption keys, private or public keys, digital signatures, or protocols.
从技术的角度来看,还可以使用各种加密方法来建立信任,包括加密密钥、私钥或公钥、数字签名,或者协议。
It is helpful (but not necessary) for you to be familiar with basic concepts of security such as private and public keys, signatures, and encryption.
熟悉安全的基本概念(比如私钥和公钥、签名、加密)会有帮助,但不是必需的。
The keys that you set up will be used for authentication, and the encryption will be handled automatically through the public/private key.
您设置的密匙将用于身份验证,加密将通过公共/私有密匙自动处理。
With PGP and other public-key encryption methods, there's no way to deduce someone's private key from the public key.
对于PGP和其他公钥加密方法,不存在从公钥推断某人私钥的方法。
Certificates, private keys, and encryption keys are too hard to manage.
证书、私钥和加密密钥非常难于管理。
As discussed in "Axis2 WS-Security signing and encryption," you use your private key to sign messages and the recipient's public key to encrypt messages.
正如在“Axis2WS - Security签名和加密”中所介绍的,您可以使用您的私钥对消息进行签名,并使用接收者的公钥对消息进行加密。
Using asymmetric encryption with public/private key pairs for signing and encrypting messages is simple (at least conceptually!).
使用不对称加密和public/private密钥对进行消息的签名和加密是很简单的(至少概念上很简单)。
To create the public or private key, you need to use ssh-keygen, specifying the type of key encryption.
要创建公钥或私钥,您需要使用ssh-keygen 来指定密钥加密的类型。
So public-private key pairs can be used for both encryption and signing of messages exchanged between two parties, provided each party has access to the other's public key.
公开-私有密匙对可以同时用于对双方之间交换的信息进行加密和签名,假设交换双方都可以访问对方的公开密匙。
In the grown-up world, you solve these problems through the use of public key-private key encryption.
在成年人的世界里,可以通过使用公钥—私钥加密来解决此类问题。
This section describes the process of generating the public-private key pair, which is the basis for encryption and digital signature.
这一部分介绍生成公钥-私钥对的过程,这是加密和数字签名的基础。
Encryption using a public-private key is slow and is directly proportional to the size of the data being encrypted.
使用公司密钥加密很慢,而且直接与加密的数据大小成正比。
The private key forever in chip, and public key authentication and encryption to send to the chip sensitive data.
这个私有密钥永远在芯片里,而公共密钥用来认证及加密发送到该芯片的敏感数据。
Disk Encryption works on the fly, so there's no need to shut down or reboot the PC to encrypt private data.
磁盘加密工程的飞行,所以无需关闭或重新启动电脑,以加密的私人数据。
The three types of security: authentication, encryption and encapsulation, forms the foundation of virtual private networking.
安全有三种:身份验证,加密和封装,它们是各种虚拟专用网络的基础。
"Encryption" is the process of scrambling data using a kind of code known only to the software doing the coding, so that anyone accessing the private data is unable to read it.
“加密”是采用加扰的数据类型的代码只知道该软件做编码,任何人访问私人数据是无法读取如此的过程。
As the encryption algorithm and decryption algorithm are open to everyone, so the private key storage management becomes an insecure part in public key system.
在公钥密码系统中加密和解密算法是公开的,因此私钥存储管理成了公钥系统安全中薄弱的环节。
If a key pair is successfully used in an encryption and decryption operation, the pair's private key must have been used for one part of the operation.
如果在加密和解密操作中成功地使用了密钥对,那么必定在操作的某个部分使用了密钥对中的私钥。
When sending private messages, your application does not need to perform the message encryption.
发送私有消息时,应用程序不需要执行消息加密。
Protocol analysis module, asynchronous encryption and SADB realized are discussed in the system of virtual private network.
本文主要讨论了在虚拟专用网络系统中协议分析模块、异步加密模式和SADB的实现。
When sending private messages, it is not necessary that your application perform the message encryption.
发送私有消息时,应用程序不必执行消息加密。
When sending private messages, it is not necessary that your application perform the message encryption.
发送私有消息时,应用程序不必执行消息加密。
应用推荐