As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.
作为现在流行的采用密钥加密解密的算法,无非分为对称密钥和非对称密钥两种类型。
After the authentication, SSL will actually use secret key encryption to secure the channel, but the details of that aren't relevant to this discussion.
在身份验证之后,SSL将真正使用保密的密钥加密来保护通道,但其细节与本讨论无关。
This element's content gives a secret key in encrypted form, using the server's public key to do the encryption.
这个元素的内容提供了一个加密了的秘密密匙,使用了服务器的公开密匙执行加密。
For the curious, a 1024 bit RSA key pair is used for signing and a 128 bit secret key (AES) is used for encryption.
出于好奇,我们使用1024位RS a密钥对来进行签名,使用128位机密密钥(AES)来进行加密。
Another popular secret-key cryptosystem is the International Data Encryption Algorithm (IDEA).
另一个流行的秘密密钥加密系统是国际数据加密算法(IDEA)。
When you use super encryption, you can encrypt just the payment information with the accounts department's secret key to produce an element-encrypted XML file.
使用超级加密时,您可以用会计部门的秘钥只加密支付信息,以产生元素加密的XML文件。
The temporary secret key serves both as the value of the key and as the value of the initial vector for DES-CBC encryption.
这个临时密钥同时作为密钥的值和DES - CBC加密的初始矢量的值。
SymmEncr: Require symmetric encryption using a client-generated secret key.
SymmEncr:需要使用一个客户端生成您的密钥进行对称加密。
The alternative is symmetric encryption, but with symmetric encryption you must have a secret key known only to the parties involved in a message exchange.
另外一种方法是对称加密,但是使用对称加密时,您必须拥有只有参与消息交换各方才知道的密钥。
This policy specifies encryption of message bodies sent in both directions, using a client-generated secret key.
这个策略使用客户端生成的保密密钥来规定发送到两个方向的消息体加密方式。
When the loop exits, I simply return the encryption result of the last data block, which is the result of Step 9 of the secret key generation process.
循环退出时,我只是返回最后一个数据块的加密结果,这就是密钥生成过程第9步的结果。
Finally, the management and assignment of secret key in data encryption devices and data networks.
对数据加密设备和数据网络中密钥的管理和分配问题进行了探讨。
The attacker exploits the correct and incorrect encryption results to disclose the secret information (key) hidden in the cryptographic device.
攻击者同时利用正确的和错误的加密结果来发现隐藏在密码设备中的秘密信息(密钥)。
Many encryption packages that are basically secret-key systems use public-key encryption to communicate the secret session keys.
很多基本上是秘钥系统的加密软件包采用明钥加密,来传送秘密的会话密钥。
When the algorithms open, the decryption key can not be calculated by encryption key so the encryption key could be open, only keep decryption key secret, that is public key.
当算法公开时,在计算上不可能由加密密钥求解解密密钥,因而可以将加密密钥公开,即公开密钥。
Receivers use a combination of the sender's public key and their own private encryption key to unlock the secret code for that message and decipher it.
接收者利用发送者的公开密钥和他们自己的秘密密钥的结合,解开该报文的秘密编码,并解密之。
The scheme makes changes in existing database systems and introduces the mechanisms of database encryption and secret key management.
该方案对现有的数据库管理系统进行了改造,在其中引入数据库加密和密钥管理机制。
In the data encryption systems, chaotic sequences can be used as the secret key to guarantee the safety of data and prohibit the juggle and steal unlawfully towards the data we sent.
在数据加密系统中,通常利用混沌模型迭代产生的序列作为密钥,以保障数据安全,防止非法篡改和窃取。
To improve the inefficiency of the existing key distribution protocols in the secure broadcasting, an ideal multi-recipient public key encryption scheme to achieve the secret broadcasting is proposed.
针对现有安全广播协议密钥分发效率较低的问题,提出了一种通过多接收者公钥加密实现安全广播的方法。
The advantages of this algorithm were, rapidity of encryption, carried out easily by computer, ampliative secret key space and so on.
该算法有加密速度快、易于计算机实现、密钥空间大等优点。
Public-key algorithms, on the other hand, are asymmetrical, using different keys, a public key, and a secret key, for encryption and decryption.
公开钥匙算法则是不对称的,采用不同的密钥,一个公开的钥匙和一个秘密的钥匙,用于加密和解密。
Public-key encryption The key distribution problem has always been the weak link in the secret-key systems.
公钥加密密钥的分布问题在秘钥系统中一直是一个薄弱环节。
Public-key encryption The key distribution problem has always been the weak link in the secret-key systems.
公钥加密密钥的分布问题在秘钥系统中一直是一个薄弱环节。
应用推荐