Asymmetric Encryption

[ˌeɪsɪˈmetrɪk ɪnˈkrɪpʃ(ə)n]
  • 网络

    非对称加密;不对称加密

数据更新时间:2025-11-14 20:39:23
1、

Using asymmetric encryption with public/ private key pairs for signing and encrypting messages is simple ( at least conceptually!).

使用不对称加密和public/private密钥对进行消息的签名和加密是很简单的(至少概念上很简单)。

互联网摘选

2、

An asymmetric encryption algorithm for images based on matrix transformation

一种基于矩阵变换的非对称图像加密算法

互联网摘选

3、
4、

When you're signing a large number of small messages with asymmetric encryption, most of your processing time is spent on the signature step.

当使用非对称加密对很多消息签名时,大多数处理时间花在签名上。

互联网摘选

5、

Create a custom channel sink that performs asymmetric encryption.

创建执行不对称加密的自定义通道接收。

互联网摘选

6、

The mechanism establishes the secure transmission channel through signature certification and asymmetric encryption, and then distributed controls the handoff authentication with context transfer.

该机制引入上下文传输思想,将签名证书和非对称加密相结合建立安全传输通道,通过在切换前后网络之间传递密钥信息,分布式地控制移动节点的切换认证。

互联网摘选

7、

Based on subliminal channels and asymmetric encryption techniques, a new password authentication scheme is proposed.

在阈下信道和非对称加密技术的基础上,提出了一种新的口令身份认证方案。

互联网摘选

8、

Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption.

由于使用了不同的密匙进行加密和解密消息,因此这种形式的加密被称为不对称加密。

互联网摘选

9、

If the client doesn't have a public/ private key pair, you can't use full asymmetric encryption.

如果客户端没有public/private密钥对,您就无法使用完整的不对称加密技术。

互联网摘选

10、

Encrypting session key with asymmetric encryption, multiple authentication.

为了利用对称加密的快速性和公开密钥加密的方便性,系统只对会话密钥进行公开密钥加密。系统还能够和PGP协同工作以提供相互鉴别的功能。

互联网摘选

11、

Although public-key cryptography using asymmetric encryption is the basis for many of the useful features of WS-Security, old-fashioned secret-key cryptography still plays an important role.

尽管使用非对称加密的公开密匙加密构成了许多有用WS-Security特性的基础,但是老式的秘密密匙加密仍然发挥着重要的作用。

互联网摘选

12、

Symmetric encryption will always be faster than asymmetric encryption ( for roughly equivalent strengths), but for both signing and encrypting the blended times essentially average the gains.

对称加密总是比非对称加密快(对大致相当的强度而言),但对签名和加密都有的情况,收益就平均了。

互联网摘选

13、

Based on the need of network office, this paper introduces the algorithm of asymmetric encryption, digital certificates and digital signature.

基于互联网络办公的需求,介绍了公开密钥加密算法、数字证书和数字签名技术。

互联网摘选

14、

Generate a shared secret key using the public key contained in the trusted party's certificate ( asymmetric encryption).

使用受信方证书中包含的公钥生成共享密钥(非对称加密)。

互联网摘选

15、

Firstly, it explains PKI infrastructure and asymmetric encryption theory.

从PKI体系结构出发,介绍RSA理论和在此基础上的非对称加密技术和数字签名技术。

互联网摘选

16、

Exchange of keys ( asymmetric encryption)

密钥的交换(非对称加密)

互联网摘选

17、

At the same time, in the watermark generation phase also uses the RSA asymmetric encryption technology, sufficient to ensure the security of watermark to prevent unauthorized detection and embedding.

同时本文在水印的生成阶段还用到了公钥算法RSA非对称加密技术,充分保证了水印的安全性,防止未经授权的检测与嵌入。

互联网摘选

18、

But it also has drawbacks, including the performance overhead of asymmetric encryption and the management headaches of obtaining and maintaining certificates for each client.

但是它也有缺点,包括不对称加密的性能开销和每个客户端获取和维护证书的繁琐管理。

互联网摘选

19、

SSL protocol uses symmetric encryption, asymmetric encryption, message digest, digital signature, digital certificate and other cryptographic techniques.

SSL协议采用了对称加密、非对称加密、信息摘要、数字签名、数字证书等密码学技术。

互联网摘选

20、

A major part of the WS-Security performance cost comes from the wide use of asymmetric encryption.

WS-Security之所以常常伴随性能损失主要是因为大量使用了非对称加密。

互联网摘选

21、

The stacks don't support using WS-Security asymmetric encryption for

这些工具并不支持使用WS-Security对称加密来

互联网摘选

22、

To communicate a symmetric key and IV to a remote party, you would usually encrypt the symmetric key and IV using asymmetric encryption.

为了将对称密钥和iv传送给远程方,通常使用不对称加密来加密对称密钥和iv。

provided by jukuu

23、

The asymmetric encryption mechanism made the encrypted data more secure.

非对称的加密机制则使得数据加密更具安全性。

互联网摘选

24、

If the message exchange with the STS uses asymmetric encryption, the client must include a

如果与STS的消息交换使用非对称加密,客户端必须在策略中包含

互联网摘选

25、

Deploying and configuring a secure web service using asymmetric encryption.

使用非对称加密部署和配置安全的Web服务。

互联网摘选

26、

Backman's files are all protected with an asymmetric encryption algorithm.

贝克曼所有的文件都有非对称加密。

互联网摘选

27、

One advantage of WS-SecureConversation is supposed to be a performance gain from using symmetric encryption rather than asymmetric encryption.

WS-SecureConversation的一个优势是使用对称加密比使用非对称加密更能取得性能收益。

互联网摘选

28、

PKI is a kind of secure infrastructure that based on the asymmetric encryption technology. CA ( Certification Authority) is the core of this system.

PKI是一种结合对称与非对称密码技术构建的安全基础设施,其中证书权威机构CA(Certification Authority)是系统的核心部分。

互联网摘选

29、

The encryption scheme in modern cryptography includes symmetric encryption and asymmetric encryption and the former is further classified as block cipher, stream cipher and hash function.

现代密码学中加密算法包括对称加密和非对称加密,前者又分为分组密码,流密码和Hash函数。

互联网摘选

30、

The difference between symmetric and asymmetric encryption

对称和非对称加密间的差异

互联网摘选

  • 相关词组
  • 今日热词
  • 热门搜索

纳米英语英语词典(dict.nm3.cn)为您提供在线翻译英语词典单词大全英译汉汉译英等英语服务!可按单词字数词义分类查询。支持lj:关键词格式查询例句。

用户反馈
请选择反馈类型(可多选):
您的联系方式:
反馈内容:
提交成功 小编会尽快处理
回到顶部
点击反馈