密鑰恢復 的英文怎麼說
中文拼音 [mìyàohuīfù]
密鑰恢復
英文
key recovery-
Allow a key to be exported for archival or recovery
允許導出密鑰以便存檔或恢復。The difficulty of decoding based on cryptograph and public key is equal to the difficult } " of dividing the product of two big prime numbers
從一個公開密鑰和密文中恢復出明文的難度等價于分解兩個大素數之積。Paper on the risks of key recovery, escrow, etc
有關密鑰恢復、契約等風險的文章。Information that is encrypted only by an irretrievable key will be lost
僅由不可恢復密鑰加密的信息將會丟失。Use the force option only if the master key is irretrievable or if decryption fails
請僅在主密鑰無法恢復或解密失敗時,才使用force選項。This paper is at introduction foundation of cryptography, analyzes x. 509 certificate, has explained the principle of pki and function of each part, and combines the author ' s project development, explains the running environment and systematic characteristic of jy _ ca, it is to divide jy _ ca into ca initial module, certificate requisition module, certificate signature module, certificate revocation module, certificate inquiry module, privat key recovery module and management module. the realization of each module has been explained briefly at the same time
本文在介紹密碼學知識的基礎上,剖析了x . 509證書的證書結構,詳盡闡述了pki的原理和各個組成部分的功能,並結合作者的項目開發,對jyca的運行環境和系統特點作了整體說明,把jyca劃分為ca初始化模塊、證書申請模塊、證書簽發模塊、證書吊銷模塊、證書查詢模塊、密鑰恢復模塊及管理模塊,同時對各個模塊的實現要點作了扼要說明。Koal card - issuing management server provides key management functions. it is responsible for security management in the process of card - issuing such as the card key accessing, card key - issuing, card key s backup and retrieve and the key destruct etc
格爾發卡管理服務器提供密鑰管理功能,它負責所有卡密鑰的接入、發卡密鑰服務、卡密鑰備份和恢復以及密鑰的銷毀等整個發卡過程的安全管理。A group - key distribution protocol is designed which has the capability of self - recovery and coalition - attack - resisting, particularly suitable for highly lossy transmission environment such as wireless sensor networks
摘要構造一個具有自恢復能力和抵禦合謀攻擊能力的組群密鑰發布協議,該協議特別適合於高度易失傳輸環境,例如無線傳感器網路。Verify a sound, robust key recovery policy
驗證一個良好的、健壯的密鑰恢復策略:Make sure that the xkms service provider has a sound and robust key recovery policy as it has a direct impact on signed document repudiation and encrypted document authenticity
確保xkms服務提供程序具有一個良好的、健壯的密鑰恢復策略,因為這直接影響著簽名文檔的否認和加密文檔的可靠性。Kmc management control desk is responsible for the checkup of key recovery, the checkup of key destruct and the checkup of key trusteeship
Kmc管理控制臺負責密鑰恢復審核、密鑰銷毀審核、密鑰託管審核。It is used for the management of the key recovery. kmc control desk can be divided into two parts, that is, kmc management control desk and judicial key recovery
Kmc控制臺是kmc的一部分,用於密鑰恢復的管理, kmc控制臺分為kmc管理控制臺和司法密鑰恢復兩部分。After ra operator receives the recovery request, he is able to see it through the kmc control desk. kmc operator should startup the kmc control desk regularly and browse the requests for the key recovery, and determine whether approve them or not
Ra操作員錄入用戶的證書恢復請求后, kmc操作員就可以在kmc控制臺看到。 kmc操作員應當定期啟動kmc控制臺,瀏覽密鑰恢復申請,決定批準還是拒絕用戶的證書恢復申請。This system provides support for group sending of military emails belonging to the same security domain as well as point to point transfer. it also supports functions such as distribution, refreshment and recovery of keys
系統支持同一安全域內軍用郵件的組間群發及點對點互發,支持分級的密鑰分發及密鑰更新和恢復等功能。A feature designed to allow messages to be recovered even if a key has been lost
密鑰恢復( key recovery )即使密鑰丟失也可以允許恢復消息的特性。At present, pki which used in enterprise environment is still rare. jy _ ca is the pki product that we developed on the basis of openssl " s function library, it is formed of ca and ra. it realizes main function of typical pki / ca, which has certificate requisition, certificate signature, certificate revocation, certificate inquiry, private key recovery etc., it can meet the needs of different application occasions
目前,企業使用的pki還不多見, jyca是我們基於openssl函數庫開發的pki產品,它由ca和ra構成,實現了一個典型的pki ca的主要功能,有證書申請、證書簽發、證書吊銷、證書查詢、密鑰恢復等,可以滿足各種應用場合的需要。Kerberos is essentially a secure network authentication protocol that employs a system of shared secret keys and is able to provide robust security against impersonation and reply attacks
Kerberos實際上是一種安全網路認證協議,採用共享密鑰的系統,並且能提供健壯的安全性,以防止偽裝攻擊和恢復攻擊。Managing the encryption keys consists of creating a backup copy, and knowing when and how to restore, delete, or change the keys
創建對稱密鑰的備份副本,並了解應何時以及如何在部署或恢復方案中使用備份副本至關重要。分享友人