Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).
两个广泛使用的公钥加密算法是RSA(根据其发明者Rivest、Shamir和Adleman 命名)和DSA(数字签名算法)。
Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).
不对称加密:公钥加密(这两个术语是同义词)。
While this doesn't sound like a big deal, the difficulty of factoring and finding a discrete logarithm forms the basis of most if not all public-key cryptography systems.
虽然听起来这并不是什么了不起的事,但分解并找到一个离散对数的困难形成了大部分公用密钥密码学系统的基础,如果不是全部的话。
Digital signatures are used to verify that the message was actually sent by the sender; they combine the use of message digests and public key cryptography.
数字签名用于验证消息是否真正由发送方发送;数字签名结合了消息摘要和公钥密码术的使用。
The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding private key can decrypt the data.
传递的数据使用公钥(非对称)加密算法加密,所以只有对应私钥的持有者才能解密数据。
The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other.
SSL协议基于公钥密码,加密密钥成对地出现在公钥密码中,它们是在数学上是相关的,但无法由一个推知另一个。
RSA public-key cryptography is based on this property of factorization.
RSA公钥密码系统就是基于这种因数分解特性的。
Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。
I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.
我们对安全性、加密技术,甚至公钥加密技术介绍了很多,目的是帮助您成功开发下一个PHP项目。
Many application platforms allow the use of public key cryptography to encrypt, send, and decrypt messages with relative ease.
很多应用程序平台都支持通过使用公钥加密相对容易地对消息进行加密、发送和解密。
Digital signatures rely on public key cryptography.
数字签名依赖于公共密钥加密学。
The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.
公钥密码启用的安全性服务是基于这样的消息解密机制,即共有密钥只能通过相应的私有密钥才能解密,反之亦然。
This approach involving private and public key pairs is also known as public key cryptography.
这种涉及到私钥和公钥对的方式也被称作公钥密码术。
However, public key Cryptography takes things a step further and introduces the idea of signed public keys.
然而,公钥密码术更进一步,它引入了签名公钥的概念。
Appendix 4: Public-key cryptography terminology.
附录4:公钥加密术语。
A few changes are needed to support using WS-Security public-key cryptography features, though, so a separate code package accompanies this article (see Download).
但是,需要作出一些修改来支持使用WS - Security公开密匙加密特性,因此本文附带了一个单独的代码包(见下载)。
But first, I'll give you a quick rundown of the principles of public-key cryptography - the basis for most of WS-Security's encrypting and signing features.
但是,我们首先将扼要概述一下公开密匙加密的原理—这是WS - Security的加密和签名特性的主要基础。
Elliptic Curve Cryptography (ECC) has the highest safety strength of private key per bit in the Public-Key Cryptography recently.
椭圆曲线密码体制是目前公钥体制中每比特密钥安全强度最高的一种密码体制。
The scheme perfectly integrates digital signature scheme with public key cryptography system.
该方案是数字签名与公钥密码体制的有机集成。
In the following example involving Alice and Bob, public key cryptography is easily used to verify identity.
在下列例子中包括甲和乙,公钥加密会轻松地校验身份。
A new invisible watermarking technique which could localize tampered areas for image authentication was proposed, based on image feature and public key cryptography.
提出一种基于图像特征和公钥密码系统的易损水印算法,在图像认证中能够定位图像被篡改的位置。
The area and speed of cryptography coprocessor impede the application of public-key cryptography RSA for smart card.
密码协处理器的面积过大和速度较慢制约了公钥密码体制RSA在智能卡中的应用。
In this paper, the principles of digital signature is given, Meanwhile the key technology of digital signature: public key cryptography and Hash algorithms is introduced.
文章阐述了数字签名技术原理,并介绍了数字签名中的关键技术:公钥加密体制和哈希算法。
It seems that braid group is a kind of considerable public key cryptography platform, but current key agreement protocols, such as AAG, AAFG and BDH, all have different degrees of security weaknesses.
辫子群是一种新兴的适用于量子计算机时代的公钥密码平台,但是目前基于辫子群的密钥协商协议AAG、AAFG和BDH等都有不同程度的安全弱点。
The wide use of public key cryptography requires the ability to verify the authenticity of public keys.
公钥密码学的广泛应用使得公钥真实性的可验证性成为必要条件。
This asymmetry is the property that makes public key cryptography so useful.
这个非对称的特性使得公钥加密很有用。 。
Based on the public key cryptography, a mobile communication protocol providing end - to - end security is provided.
基于公钥加密体制,本文提出了一种具有移动终端安全性的无线通讯协议。
Based on the ideas of public key cryptography, a new scrambling technology of digital image based on primitive roots is given.
以密码学中的公钥思想为基础,提出了一种基于原根的数字图像置乱技术。
Based on the ideas of public key cryptography, a new scrambling technology of digital image based on primitive roots is given.
以密码学中的公钥思想为基础,提出了一种基于原根的数字图像置乱技术。
应用推荐