EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.
EKE协议是基于弱口令的密钥交换协议,通过使用对称密钥加密体制和公钥加密体制,能够很好地抵抗离线字典攻击。
Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.
对称算法非常有效,并且可以与用于加密和解密计算的单一密钥一起使用。
Use the key that was previously generated to encrypt the sensitive data within the SOAP message (symmetric encryption).
使用以前生成的密钥加密SOAP消息中的敏感数据(对称加密)。
You need a symmetric key to do the encryption, and the key must be managed independently.
必须有对称密钥才能解密,而且密钥必须单独管理。
Begins by indexing it and encrypting it with a symmetric encryption scheme (e.g., AES) under a unique key.
首先为其建立索引,并使用对称的加密模式(例如aes)以唯一的密钥对其进行加密。
SymmEncr: Require symmetric encryption using a client-generated secret key.
SymmEncr:需要使用一个客户端生成您的密钥进行对称加密。
This encrypted data element references the <xenc:EncryptedKey> value from the security header as the key for the symmetric encryption used on the Body content.
这个已加密的数据从安全头部引用 <xenc:EncryptedKey>值作为在Body内容中用于对称加密的密匙。
The alternative is symmetric encryption, but with symmetric encryption you must have a secret key known only to the parties involved in a message exchange.
另外一种方法是对称加密,但是使用对称加密时,您必须拥有只有参与消息交换各方才知道的密钥。
Because this is using asymmetric encryption, where each side has its own certificate and private key, it should be somewhat simpler to handle than the Listing 5 symmetric-encryption example.
因为这是使用非对象加密技术,而每一端有自己的证书和私有密钥,比起清单5对称加密技术示例,它处理起来更为简单。
If the match succeeds, a symmetric key is created that permits reversible encryption.
如果匹配成功,则创建允许可逆加密的对称密钥。
To overcome that, you'd need to use a symmetric encryption scheme and require the key each times you read/write the file.
克服,你需要使用对称加密方案和需要的关键每一次你读/写文件。
To communicate a symmetric key and IV to a remote party, you would usually encrypt the symmetric key and IV using asymmetric encryption.
若要与远端的一方沟通对称金钥和IV,通常会使用非对称加密来加密对称金钥和IV。
Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
The RDP protocol USES the RC4 symmetric encryption algorithm with up to 128 bit keys. The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
RDP协议的使用对称加密算法rc4多达128位钥匙。rc4加密后所产生的一个初步的交流,其中的关键是使用RSA的非对称加密。
The RDP protocol USES the RC4 symmetric encryption algorithm with up to 128 bit keys. The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
RDP协议的使用对称加密算法rc4多达128位钥匙。rc4加密后所产生的一个初步的交流,其中的关键是使用RSA的非对称加密。
应用推荐