Very well, I begin to cipher out the German for that answer.
好吧,我开始搜肠刮肚尝试用德语作答。
And then compile it and run it to cipher the message in hello.txt.
然后,编译这个程序并运行它来加密hello . txt中的消息。
In data ciphering, it adopts improved ECC to cipher and decipher data.
数据加密方面,用改进的ECC对数据加解密。
Big problem is that user going to always have unlimited access to cipher and the key (s) now how I can secure the whole thing?
大问题是,用户总是可以无限制地访问密码和密钥,现在我如何保护整个事情?
Build up a differential fault attack model to cipher in satellite network and analyze rationality of the model and the attack process.
建立了卫星网络加密算法差分故障攻击模型,并对模型的合理性及攻击实现过程进行了阐述。
Now use hpmcount to launch this cipher tool to cipher a huge input file, hundreds of MB for example, to see what the PMC data looks like and where you can make some improvement.
现在,使用hpmcount启动这个密码工具,加密一个很大的输入文件(例如数百mb),然后查看pm c数据并判断哪些地方可以改进。
The listener deciphers what you said according to his own reference of blueness and transmits it to you in his own cipher.
听者根据他自己对蓝色的理解来破解你的话,再用他自己的密码传达给你。
All important plans were sent to the police in cipher.
所有重要计划均以密码送往警方。
I use a block cipher algorithm for encryption that requires the clear data bytes to be in blocks of 8 bytes, so I pad the last incomplete block with some characters.
我对需要将明文数据字节放在8字节块的加密使用块密码算法,所以我用一些字符填充最后一个不完整的块。
The default is STRONG, which means that CICS can use all of the cipher suites to negotiate with clients.
默认值是STRONG,这意味着CICS可以使用所有密码组合来与客户端协商。
The watermark, Dr Venter says, includes a cipher which contains the URL of a website and three quotations, if you can work out how to decode it.
文特尔说,水印包括一段密码,你要是会解密的话,就能发现里面含有一个网站的网址和三段引文。
Switch to the SSL tab view, and specify a cipher specification.
切换到SSL选项卡视图,并指定密码规范。
The cipher text string is then passed to the getCipherDataDoc private method.
接着该密码文本字符串传递给getcipherdatadoc私有方法。
Switch to the SSL TAB view, and specify a cipher specification (in this case, use RC4_MD5_US).
切换到SSL选项卡视图,然后指定一个密码规范(在这个例子中使用RC4_MD5_US)。
From the master secret, the client and server create the session keys, symmetric keys within the bounds of the chosen symmetric cipher used to encrypt the session's data.
从mastersecret中,客户机和服务器可以创建sessionkeys(会话密钥),这是选择用来对会话数据进行加密所使用的对称密码中的对称密钥。
It then passes the extracted Base 64 encoded cipher value, the decryption key, and the algorithm name to a method named decrypt (examined in Cryptography).
接着它将抽取出的用Base 64编码的密码值、解密密钥以及算法名称传递给名为Decrypt的方法(见密码术中的研究)。
The algorithm is referred to as a stream or block cipher depending on whether the algorithm transforms the message one byte at a time or a block (eight bytes) at a time.
算法被称作流密码(stream cipher)还是块密码(block cipher),取决于算法转换消息时是一次一个字节还是一次一个块(8个字节)。
Like so many of the things we talk about here, the to-do list is really a cipher, albeit an important one.
就像我们在这儿谈到的很多事情一样,待办事项列表是一个真正的密码,而且是非常重要的一个。
The cipher used to encrypt files is the inherited cipher.
用于加密文件的密码是继承而来的密码。
Unfortunately, prior to V7, the default SSL cipher selection of strong includes some notably weak ciphers.
遗憾的是,在V7之前,默认的ssl强密码选择包含一些明显非常弱的密码。
The key and the plain text are processed together according to the DES algorithm to produce the encrypted (cipher text) form of the plain text data.
根据des算法对密钥和纯文本统一处理以生成一个加密的(密文)形式的纯文本数据。
The Caesar cipher is easy to break.
凯撒密码很容易破解。
You continue chaining blocks in this manner, one after the other, to produce a cipher text form of each of the blocks.
以这种方式继续一块接一块地生成每一个块的密文形式。
The quest for the true claimant drove people mad. Here are secrets and codes, an elaborate cipher-breaking machine, an obsession with graves and crazy adventures to find lost manuscripts.
人们疯狂地寻找真正的原作者,他们刨根寻底,用精密的解码器解读那些神秘代码,或挖掘坟墓或铤而走险,不放过一点遗失手稿的蛛丝马迹。
At the end, you concatenate all of the cipher text blocks to arrive at the cipher text form of the complete plain text data.
最后,串接所有密文块以得到全部纯文本数据的密文形式。
Note that not all of the digest and ciphers here are supported, but your OpenSSL must support the cipher and digest that you want to use.
注意,并非这里的所有摘要和密码都受到支持,但您的OpenSSL必须支持您想要使用的密码和摘要。
With this cipher option String approach, there is no type-safety to ensure you're using valid options.
这种字符串方式的cipher选项,并没有类型安全以确保你正在用有效的选项。
The specific cryptographic cipher used between client and server (browser and tomcat) must be amenable to Wireshark's method of decrypting.
用于客户机和服务器(浏览器和tomcat)之间的特殊加密密码必须能用Wireshark的解密方式进行解密。
The specific cryptographic cipher used between client and server (browser and tomcat) must be amenable to Wireshark's method of decrypting.
用于客户机和服务器(浏览器和tomcat)之间的特殊加密密码必须能用Wireshark的解密方式进行解密。
应用推荐