虽然听起来这并不是什么了不起的事,但分解并找到一个离散对数的困难形成了大部分公用密钥密码学系统的基础,如果不是全部的话。
While this doesn't sound like a big deal, the difficulty of factoring and finding a discrete logarithm forms the basis of most if not all public-key cryptography systems.
所有RIM公司的说法都是建立在加密的信息是没有密钥来破解的基础上,那如果是在任意一个加密过程结束前?
All that RIM is saying is that while the message is encrypted it is not possible to provide a key to decrypt it. What about at either end of the encryption process?
在将被调用的对象和SOAP信封中的变元的基础上(如清单1所示),您可以生成这样一个密钥。
Based on the object to be called and the arguments found in the SOAP envelope, as seen in Listing 1, you can generate such a key.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
该产品的优点在于顾客取代提供商保存自己的密钥而不需要创建一个复杂的安全文件基础设施。
The advantage here are that customers, not the providers, own their own keys without the need to create a complex secure file infrastructure.
这些帐号都是在一视同仁的基础上给出的,并根据自动使用电子邮件发送的质询来返回一个证明已经收到随机密钥的消息。
These accounts are given out on a non-discriminatory basis, based on an automatic e-mailed challenge to send back a message to prove you received a random key.
公钥-私钥组合是公共密钥基础设施的核心,建立在非对称密码的基础上。
Public-private key combination is at the heart of Public key Infrastructure (PKI), and is based on asymmetric cypher.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。
Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
相同的基础设施还负责管理用于加密LTPA令牌的密钥。
The same infrastructure manages the keys used to encrypt LTPA tokens.
因此,当应用程序需要一种基于公共密钥基础设施的GSS-API机制时,SPKM 就能满足它的要求。
So for applications that need to have a GSS-API mechanism which is based on a public-key infrastructure, SPKM is the answer.
SPKM使用公钥基础设施在一个联机分布式应用程序环境下提供身份验证、密钥设立、数据完整性和数据机密性。
SPKM provides authentication, key establishment, data integrity, and data confidentiality in an online distributed application environment using a public key infrastructure.
SPKM是一种GSS - API机制,其基于公钥而非对称密钥基础设施。
SPKM is a GSS-API mechanism which is based on a public key rather than a symmetric key infrastructure.
因此,连接工具至少必须能够使您在每个Feed的基础上配置Pachubeapi密钥。
A bridging utility must therefore at a minimum enable you to configure the Pachube API key on a per-feed basis.
Yocto项目旨在为构建嵌入式Linux的开发人员提供密钥基础设施。
The Yocto project aims to provide key infrastructure for people working on building embedded Linux.
在Kerberos基础结构内,有一个密钥分发中心,即KDC,可以提供票据分发功能。
In a Kerberos infrastructure, we have something called a key distribution center, or KDC, which provides ticket distributing functionality.
xml密钥管理规范(XML Key Management Specification,XKMS)使得安全性基础设施易于管理,而安全性断言标记语言(Security Assertion Markup Language,SAML)则使信任可以移植。
The XML Key management Specification (XKMS) allows for easy management of the security infrastructure, while the security Assertion Markup Language (SAML) makes trust portable.
xml加密和数字签名依赖于公共密钥基础设施(Public Key Infrastructure,PKI)来帮助加密(encrypt)、解密(decrypt)、签名(sign)和验证(verify)各种文档。
XML encryption and digital signatures rely on Public Key Infrastructure (PKI) to help encrypt, decrypt, sign, and verify various documents.
在按需付费的基础设施中,灾难恢复、专用密钥管理和控件行为公开是SaaS环境中的主要安全性顾虑。
Disaster recovery, private key management, and disclosure of controls activities are security concerns in the SaaS environment in the pay-on-demand infrastructure.
利用现有的目录和公共密钥基础架构。
在对IKE进行分析的基础上,讨论了怎样在安全密钥协商过程中对发起者身份进行保护,并给出了具体实施步骤。
How to protect the initiator identifier during the secure key negotiation based on the analysis of IKE is discussed, and the concrete implementation is given.
在分析传统的BD方案和改进方案IBD的基础上提出一种层次化的密钥协商方案H-IBD。
This paper presented a hierarchical key agreement scheme H-IBD based on the analysis of traditional scheme BD and improved scheme IBD.
文章给出了一种RSA密钥生成的VLSI实现方案,在RS A协处理器基础上增加若干运算单元,来完成RSA密钥生成和加解密操作。
A new approach to VLSI implementation of RSA key generation is proposed in the paper, in which logic units are added to the RSA cryptography coprocessor to realize RSA key generation and encryption.
在数字混沌保密通信研究的基础上,提出了一种多混沌方程协助生成密钥序列的新方案。
Based on the research of digital chaos communications, a new method that generates key sequences by using more chaotic equations is presented.
在传统的安全机制中,加密和认证是重要的两个模块,密钥管理又是这两者的基础。
In traditional security mechanisms, encryption and authenticity are two important aspects while key management is the basis of them.
为解决当前无线传感器网络在目标定位与跟踪等领域的安全问题,提出了一种建立在自动跟踪簇基础上的动态簇密钥更新算法MCDGR。
To enhancing the wireless sensor network's security in target tracking and locating application, a tracking cluster based mobile cluster distributed group rekeying protocol (MCDGR) was proposed.
该文在分析组播通信安全需求的基础上,提出一种基于密钥矩阵的组播密钥管理方案。
According to the analysis of the security demand of multicast communication, a multicast key management scheme based on key matrix is proposed.
文中以DES加密算法为例,在分析DES加密过程、密钥计算、加密函数和解密过程的基础上,探讨分组密码的设计原则。
The general design rules of block cipher is discussed by analyzing the encryption process, key generating, encryption function and decryption process of des algorithm.
为了很好工作,数字信封需要有一个公开的密钥基础设施:没有正确的数字密钥对包装器解密,入侵者就不能看到里面的信息。
To work well, digital envelopes require that a public key infrastructure is in place: without the correct digital key to decrypt the wrapper, an intruder can't view the message inside.
为了很好工作,数字信封需要有一个公开的密钥基础设施:没有正确的数字密钥对包装器解密,入侵者就不能看到里面的信息。
To work well, digital envelopes require that a public key infrastructure is in place: without the correct digital key to decrypt the wrapper, an intruder can't view the message inside.
应用推荐