每个通过DES身份验证使用安全rpc的用户都必须拥有一对公钥和机密密钥。
Each user using Secure RPC with DES authentication is supposed to have a pair of public and secret keys.
现在,每当需要使用公钥登录到远程主机时,您可以结合使用个人密钥脚本和远程主机上该用户接受的密钥列表。
Now, whenever you need to log in to a remote host with your public key, you can use the script of your personal key with the list of accepted keys for the user on the remote host.
PK i由两个密钥组成-公钥和私钥-用于认证用户和加密数据。
PKI consists of two keys — a public key and a private key — used to authenticate the user and encrypt the data.
在创建了用户的公钥和机密密钥之后,当这些用户希望运行安全RPC应用程序时,他们必须登录并运行keylogin命令。
Once the public and secret keys of the users are created, they must log in and run the keylogin command anytime they wish to run the Secure RPC application.
系统管理员为每个用户运行newkey命令,以便为希望使用DES身份验证的用户生成唯一的公钥和机密密钥。
The system administrator runs the newkey command for each user to generate unique public and secret keys for the user who wants to use DES authentication.
将用户的公钥复制到authorized_keys文件,这允许用户使用相应的密钥登录,而不需要使用密码。
Copy the user's public key to the authorized_keys file, which allows the user holding the corresponding private key to log in without a password.
密钥和初始向量用用户的公钥加密以保护它的机密性;
The key and the initialization vector are encrypted with the public key of the user to protect its confidentiality.
每次用户登录时,都会生成一个新的密钥对,并在数据库中覆盖该公钥。
Everytime the user logs in, a new key pair is generated and the public key is overwritten in the database.
公钥密码体制允许用户在不安全的网络空间中公开传播公钥,这种特性为密钥分发带来了极大的便利,但是并没有解决密钥管理的核心问题。
Public key cryptosystem allows users to deliver public key in an insecure cyberspace, such property brings great convenience to key distribution, but does not solve the core issue of key management.
该方案允许每个用户都采用相同的小公钥,发送者可根据要发送的用户数通过引入随机数r对加密密钥进行放大,每个接收者用两个小密钥对密文进行解密。
This protocol allowed each recipient using the same public key during the encryption process and the sender using a random number to enlarge the public key following the number of recipients.
该方案允许每个用户都采用相同的小公钥,发送者可根据要发送的用户数通过引入随机数r对加密密钥进行放大,每个接收者用两个小密钥对密文进行解密。
This protocol allowed each recipient using the same public key during the encryption process and the sender using a random number to enlarge the public key following the number of recipients.
应用推荐