• As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.

    作为现在流行采用密钥加密解密算法,无非分为对称密钥和非对称密钥两种类型。

    youdao

  • After the authentication, SSL will actually use secret key encryption to secure the channel, but the details of that aren't relevant to this discussion.

    身份验证之后SSL真正使用保密密钥加密保护通道细节讨论无关。

    youdao

  • This element's content gives a secret key in encrypted form, using the server's public key to do the encryption.

    这个元素内容提供了一个加密了的秘密密匙,使用服务器公开执行加密

    youdao

  • For the curious, a 1024 bit RSA key pair is used for signing and a 128 bit secret key (AES) is used for encryption.

    出于好奇,我们使用1024RS a密钥进行签名,使用128位机密密钥(AES)来进行加密。

    youdao

  • Another popular secret-key cryptosystem is the International Data Encryption Algorithm (IDEA).

    另一个流行秘密密钥加密系统国际数据加密算法(IDEA)。

    youdao

  • When you use super encryption, you can encrypt just the payment information with the accounts department's secret key to produce an element-encrypted XML file.

    使用超级加密可以会计部门加密支付信息产生元素加密的XML文件。

    youdao

  • The temporary secret key serves both as the value of the key and as the value of the initial vector for DES-CBC encryption.

    这个临时密钥同时作为密钥DES - CBC加密的初始矢量值。

    youdao

  • SymmEncr: Require symmetric encryption using a client-generated secret key.

    SymmEncr需要使用一个客户端生成您的密钥进行对称加密

    youdao

  • The alternative is symmetric encryption, but with symmetric encryption you must have a secret key known only to the parties involved in a message exchange.

    另外一种方法对称加密但是使用对称加密时,必须拥有只有参与消息交换各方知道密钥。

    youdao

  • This policy specifies encryption of message bodies sent in both directions, using a client-generated secret key.

    这个策略使用客户端生成保密密钥来规定发送两个方向消息加密方式

    youdao

  • When the loop exits, I simply return the encryption result of the last data block, which is the result of Step 9 of the secret key generation process.

    循环退出时只是返回最后一个数据加密结果就是密钥生成过程第9的结果。

    youdao

  • Finally, the management and assignment of secret key in data encryption devices and data networks.

    数据加密设备数据网络密钥管理分配问题进行了探讨。

    youdao

  • The attacker exploits the correct and incorrect encryption results to disclose the secret information (key) hidden in the cryptographic device.

    攻击者同时利用正确错误的加密结果发现隐藏密码设备中的秘密信息(密钥)。

    youdao

  • Many encryption packages that are basically secret-key systems use public-key encryption to communicate the secret session keys.

    很多基本上系统加密软件包采用加密,传送秘密会话密钥

    youdao

  • When the algorithms open, the decryption key can not be calculated by encryption key so the encryption key could be open, only keep decryption key secret, that is public key.

    算法公开时,计算可能加密密钥求解解密密钥,因而可以加密密钥公开,公开密钥。

    youdao

  • Receivers use a combination of the sender's public key and their own private encryption key to unlock the secret code for that message and decipher it.

    接收者利用发送者公开密钥他们自己的秘密密钥结合解开该报文秘密编码解密之。

    youdao

  • The scheme makes changes in existing database systems and introduces the mechanisms of database encryption and secret key management.

    方案现有数据库管理系统进行了改造其中引入数据库加密密钥管理机制

    youdao

  • In the data encryption systems, chaotic sequences can be used as the secret key to guarantee the safety of data and prohibit the juggle and steal unlawfully towards the data we sent.

    数据加密系统中,通常利用混沌模型迭代产生序列作为密钥保障数据安全防止非法篡改窃取

    youdao

  • To improve the inefficiency of the existing key distribution protocols in the secure broadcasting, an ideal multi-recipient public key encryption scheme to achieve the secret broadcasting is proposed.

    针对现有安全广播协议密钥分发效率较低问题,提出一种通过多接收者公钥加密实现安全广播的方法。

    youdao

  • The advantages of this algorithm were, rapidity of encryption, carried out easily by computer, ampliative secret key space and so on.

    算法加密速度快易于计算机实现密钥空间优点

    youdao

  • Public-key algorithms, on the other hand, are asymmetrical, using different keys, a public key, and a secret key, for encryption and decryption.

    公开钥匙算法不对称的,采用不同密钥个公开的钥匙一个秘密的钥匙,用于加密解密

    youdao

  • Public-key encryption The key distribution problem has always been the weak link in the secret-key systems.

    公钥加密密钥分布问题钥系统中一直是一个薄弱环节

    youdao

  • Public-key encryption The key distribution problem has always been the weak link in the secret-key systems.

    公钥加密密钥分布问题钥系统中一直是一个薄弱环节

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定