The user supplies a secret key (password) to the security server to prove its identity.
用户向安全服务器提供一个秘密密钥(密码)来证明其身份。
Same secret key is used to encrypt and decrypt the messages exchanged among them.
使用同一个秘密密钥加密和解密在它们之间交换的消息。
For secret keys, some reasonable factors are key version number and the time the key was added to the key table.
对于密钥,一些合理的因素是密钥版本号和密钥被添加到密钥表中的时间。
This secret key is known only to the user and the security server.
此秘密密钥只有该用户和安全服务器知道。
Although DCE is currently based on secret key system, further in the article we will come to know how DCE exploits these techniques and augments them to provide a much more secured environment.
尽管DCE目前基于秘密密钥系统,但在本文后面将介绍DCE如何利用并扩展这些技术,以提供一种更为安全的环境。
The keylogin command then passes on the decrypted secret key to the local keyserver daemon, which stores the decrypted secret key with itself until the user runs a Secure RPC transaction.
keylogin命令然后将经过解密的机密密钥传递给本地keyserver守护进程,该守护进程将这个解密的机密密钥存储在其中,直到用户运行安全RPC事务。
Kerberos defines an algorithm for processing a user's password to produce a secret key. The Kerberos client will use this key for decryption during the process of getting the TGT.
Kerberos定义了一种对用户密码进行处理以生成一个密钥的算法。
The sample code generates a new secret key and uses it to encrypt and decrypt data.
这个样本代码将生成一个新的秘钥,并使用它对数据进行加密和解密。
The context acceptor, on the other hand, requires its secret key to decrypt the service ticket received from the initiator, thus authenticating the initiator.
另一方面,上下文接受者需要它的密钥来解密来自发起者的服务票证,通过这种方式认证发起者。
The eighth step during our secret key generation process is to check whether the byte array after parity fixing turns out to be a weak key.
我们的密钥生成过程的第八步是要检查奇偶修正后的字节数组是否是一个弱的密钥。
There's no need for the server to send the secret key back to the client, because the client already has it available.
服务器不需要将保密密钥发送回客户端,因为客户端已经拥有了这个保密密钥。
The alternative is symmetric encryption, but with symmetric encryption you must have a secret key known only to the parties involved in a message exchange.
另外一种方法是对称加密,但是使用对称加密时,您必须拥有只有参与消息交换各方才知道的密钥。
To reach the intended client, this response message is encrypted using the client secret key.
为了传送到期望的客户端,此响应消息使用客户端秘密密钥进行加密。
A service principal, on the other hand, requires just its secret key to accept GSSAPI contexts.
另一方面,一个服务主体所要求的仅是接受GSSAPI上下文的密钥。
I will now use the temporary secret key to encrypt the original padded byte array from Step 3 using the DES-CBC algorithm.
现在我要使用这个临时密钥以des -cbc算法加密第3步中得到的附加后的字节数组。
This element's content gives a secret key in encrypted form, using the server's public key to do the encryption.
这个元素的内容提供了一个加密了的秘密密匙,使用了服务器的公开密匙执行加密。
In this case, a sender might encrypt the message using the receiver's public key, but only the receiver has the secret key that is used to decrypt the message.
在这种情况下,发送方可能会使用接收方的公钥对消息加密,但是只有接收方拥有用于对消息解密的秘钥。
One way to demonstrate authorized use of a security token is to include a digital signature using the associated secret key (from a proof-of-possession token).
演示安全令牌已授权应用的一种方式是,添加采用相关联密钥(来自于占有证据令牌)的数字签名。
An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.
对称密钥(公钥)算法用于交换在对称算法中使用的加密密钥,以及用于数字签名。
When you want to connect securely to a remote system, first open the PPK file that contains the secret part of the SSH key.
当要安全地连接远程系统时,首先打开包含SSH密钥的秘密部分的PPK文件。
After the authentication, SSL will actually use secret key encryption to secure the channel, but the details of that aren't relevant to this discussion.
在身份验证之后,SSL将真正使用保密的密钥加密来保护通道,但其细节与本讨论无关。
The accounts department will need to decrypt the payment information in the purchase order using a pre-exchanged secret key.
会计部门要使用一个预先交换的秘钥对采购订单中的支付信息解密。
In case the secret link ever gets into the wrong hands, you can simply change the key phrase in order to restore privacy.
在安全链接到了错误的人手上的情况下,你就简单地改变密钥去恢复隐私。
When you use super encryption, you can encrypt just the payment information with the accounts department's secret key to produce an element-encrypted XML file.
使用超级加密时,您可以用会计部门的秘钥只加密支付信息,以产生元素加密的XML文件。
A symmetric algorithm requires that both the sender and receiver of the message use the same secret key; this is often referred to as secret key cryptography.
对称算法要求消息的发送方和接收方使用同一个秘钥;这通常被称作秘钥密码术。
The second party USES this public key to encrypt its secret key.
另一方使用这个公钥加密其秘钥。
Network part contains the information required to acquire tickets and other services (e.g. it includes the principals secret key).
网络部分包含获取票证和其他服务所需的信息(比如,它包含主体秘密密钥)。
The public key is known to everyone while the private key is kept secret.
所有人都知道公钥,而私钥是秘密的。
Create a public and secret key for userone and add it to the publickey database.
为userone创建公钥和机密密钥,并将它添加到publickey数据库中。
Create a public and secret key for userone and add it to the publickey database.
为userone创建公钥和机密密钥,并将它添加到publickey数据库中。
应用推荐