密鑰 的英文怎麼說
中文拼音 [mìyào]
密鑰
英文
cipherkey-
Represents the secret key for the symmetric algorithm
表示對稱演算法的機密密鑰。Allow a key to be exported for archival or recovery
允許導出密鑰以便存檔或恢復。To encrypt an xml element with an asymmetric key
用非對稱密鑰對xml元素進行加密To decrypt an xml element with an asymmetric key
用非對稱密鑰對xml元素進行解密How to : store asymmetric keys in a key container
如何:在密鑰容器中存儲不對稱密鑰The id of an asymmetric key in the current database
數據庫中非對稱密鑰的id 。A byte array that represents an rsa key blob
一個表示rsa密鑰blob的位元組數組。Class use a chaining mode called cipher block chaining, which requires a key and an initialization vector to perform cryptographic transformations on data
類派生的類使用一種稱為密碼塊鏈接( cbc )的鏈接模式,該鏈接模式需要密鑰和初始化向量才能執行數據的加密轉換。The block cipher classes provided in the base class library use a chaining mode called cipher block chaining, which uses a key and an initialization vector to perform cryptographic transformations on data
基類庫中提供的塊密碼類使用稱作密碼塊鏈( cbc )的鏈模式,它使用一個密鑰和一個初始化向量( iv )對數據執行加密轉換。True to use an optimized cache key ; otherwise,
如果使用經過優化的緩存密鑰,則為Authority procedure in dedicate mode checks the ms ' s validity, and if it is valid, a safe cipher key for the use of channel encrypting is given
專用模式下的鑒權過程用於網路檢查ms提供的識別是否真實,並給ms一個安全的密鑰。These appliances, available from companies such as decru, neoscale, and vormetric, implement very fast encryption - they typically claim to operate at or close to " wire speed. " they also usually include sophisticated key management facilities for controlling the creation and distribution of cipher keys, cycling of keys, and disposition of keys, besides handling general data encryption
Decru 、 neoscale和vormetric等公司都能提供這些器件,它們實現了非常快的加密通常被聲稱速度達到或接近「線速」 。它們還常常包括高級的密鑰管理設施,除了用於處理一般的數據加密外,還可用於控制密鑰的創建和分發、密鑰的循環和密鑰的銷毀。You can choose different encipher algorithms according to requirement. aes is a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192and 256 bits. because the length of block and key has been expanded, security has been enhanced
Aes ( advancedencryptionstandard )是fip ( federalinformationprocessingstandardspublication )在2001年6月發布的草案,它是分組加密演算法,消息分組為128bit ,有三種密鑰長度128bit 、 192bit 、 256bit ,由於分組長度和密鑰長度加長使得安全性大大的提高,它有望成為21世紀的加密標準。The cryptanalysis of a quantum key distribution and authentication protocol through once quantum communication
一次量子通信量子密鑰分發和認證協議的安全性分析The security program builds largely upon sound cryptogram arithmetic and secure key management
密碼演算法的安全性很大程度上依賴於密鑰的安全性。Its key idea of this project is to balance the transmitting efficiency and the transmitting cryptograph
針對這些存在的問題,筆者提出了一種改進方案? ? bb84 +量子密鑰分配方案。The difficulty of decoding based on cryptograph and public key is equal to the difficult } " of dividing the product of two big prime numbers
從一個公開密鑰和密文中恢復出明文的難度等價于分解兩個大素數之積。" the apparent paradox that openness about your methods leads to better security is not unique to computer software - military and diplomatic cryptographers have known for a century that it is folly to depend on the secrecy of your encoding method rather than the secrecy of your keys, " says raymond
Raymond說: 「公開您的方法將導致更好的安全性這個明顯矛盾的觀點並非計算機軟體所獨有,軍事和外交上的解密者知道這個觀點已有一百年了:依賴編碼方法的保密性而不依賴密鑰的保密性是非常愚蠢的。 」Digital signatures rely on public key cryptography
數字簽名依賴于公共密鑰加密學。Public - private key combination is at the heart of public key infrastructure, and is based on asymmetric cypher
公鑰-私鑰組合是公共密鑰基礎設施的核心,建立在非對稱密碼的基礎上。分享友人