• EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.

    EKE协议基于口令密钥交换协议通过使用对称密钥加密体制公钥加密体制,能够很好地抵抗离线字典攻击

    youdao

  • Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.

    对称算法非常有效并且可以与用于加密解密计算的单一密钥一起使用

    youdao

  • Use the key that was previously generated to encrypt the sensitive data within the SOAP message (symmetric encryption).

    使用以前生成密钥加密SOAP消息中的敏感数据对称加密)。

    youdao

  • You need a symmetric key to do the encryption, and the key must be managed independently.

    必须对称密钥才能解密而且密钥必须单独管理

    youdao

  • Begins by indexing it and encrypting it with a symmetric encryption scheme (e.g., AES) under a unique key.

    首先为其建立索引使用对称加密模式(例如aes)唯一的密钥对其进行加密

    youdao

  • SymmEncr: Require symmetric encryption using a client-generated secret key.

    SymmEncr需要使用一个客户端生成您的密钥进行对称加密

    youdao

  • This encrypted data element references the <xenc:EncryptedKey> value from the security header as the key for the symmetric encryption used on the Body content.

    这个加密数据安全头部引用 <xenc:EncryptedKey>作为Body内容用于对称加密的密匙。

    youdao

  • The alternative is symmetric encryption, but with symmetric encryption you must have a secret key known only to the parties involved in a message exchange.

    另外一种方法对称加密但是使用对称加密时,必须拥有只有参与消息交换各方知道密钥。

    youdao

  • Because this is using asymmetric encryption, where each side has its own certificate and private key, it should be somewhat simpler to handle than the Listing 5 symmetric-encryption example.

    因为使用非对象加密技术,一端自己证书私有密钥,比起清单5对称加密技术示例,处理起来更为简单。

    youdao

  • If the match succeeds, a symmetric key is created that permits reversible encryption.

    如果匹配成功,则创建允许可逆加密对称密钥

    youdao

  • To overcome that, you'd need to use a symmetric encryption scheme and require the key each times you read/write the file.

    克服需要使用对称加密方案需要关键每一/文件

    youdao

  • To communicate a symmetric key and IV to a remote party, you would usually encrypt the symmetric key and IV using asymmetric encryption.

    与远端的沟通对称IV通常使用对称加密来加密对称金钥和IV。

    youdao

  • Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.

    目前有几种加密技术对称密钥密码系统对称密钥密码系统。

    youdao

  • The RDP protocol USES the RC4 symmetric encryption algorithm with up to 128 bit keys. The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.

    RDP协议使用对称加密算法rc4多达128钥匙。rc4加密产生的一个初步交流其中关键使用RSA的非对称加密。

    youdao

  • The RDP protocol USES the RC4 symmetric encryption algorithm with up to 128 bit keys. The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.

    RDP协议使用对称加密算法rc4多达128钥匙。rc4加密产生的一个初步交流其中关键使用RSA的非对称加密。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定