Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output.
步骤4:利用一个数据加密密钥、一个密钥加密密钥、与这两个密钥相关联的算法、以及将来包含在输出信息中的密钥信息,根据它们来创建一个Encryptor对象。
It can be used to authenticate the messages, to provide integrity, as well as encryption key to ensure confidentiality of the data.
它可用于验证消息、提供完整性检查,以及提供加密密钥来保证数据的机密性。
The encryption guarantees the data confidentiality on the topic, because only the service provider owning the right private key can perform decryption correctly and, thus, understand the data.
加密可以保证有关某个主题的数据机密性,原因是只有拥有正确私钥的服务提供者才能正确执行解密,因此也能读懂该数据。
Key - a key is cryptographic data which is usually derived from a user's password using specific encryption algorithms.
密钥—密钥就一些密码数据,通常使用特定加密算法从用户的密码中获得。
Use the key that was previously generated to encrypt the sensitive data within the SOAP message (symmetric encryption).
使用以前生成的密钥加密SOAP消息中的敏感数据(对称加密)。
The key used for the data encryption could be the same key passed in the original request or another randomly generated key, the latter being more typical.
用于数字加密的密钥可能是在最初请求中传送的同一密钥,也可能是另一个随机生成的密钥,而后者更具代表性。
There's another solution, one that works with whole-disk encryption products like PGP disk (I'm on PGP's advisory board), TrueCrypt, and BitLocker: encrypt the data to a key you don't know.
有另外一种方法,即用全磁盘加密产品,像PG P磁盘(我在PGP顾问委员会),加密软件,驱动器加密。用一个你不知道的密钥来加密数据。
The encryption key is used to encrypt the data transfer between the NAS and the RADIUS server.
加密密钥用于加密nas和RADIUS服务器之间的数据传输。
All the information necessary for decryption is present within the XML encryption tags: the name of the encryption algorithm, the type of data that was encrypted, and the name of the encryption key.
XML加密标记中存在着解密需要的所有信息:加密算法的名称、加密的数据类型以及加密密钥的名称。
Another popular secret-key cryptosystem is the International Data Encryption Algorithm (IDEA).
另一个流行的秘密密钥加密系统是国际数据加密算法(IDEA)。
When the loop exits, I simply return the encryption result of the last data block, which is the result of Step 9 of the secret key generation process.
循环退出时,我只是返回最后一个数据块的加密结果,这就是密钥生成过程第9步的结果。
This combination refers to the name of the key that Imran USES for data encryption.
这个组合引用了Imran用于数据加密的密钥名称。
To encrypt file data, an encryption key password must be selected, which Tivoli Storage Manager uses to generate the encryption key for encrypting and decrypting the file data.
为加密文件数据,必须选择一个加密密钥口令,TivoliStorageManager使用它来生成加密密钥,以加密和解密文件数据。
DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits.
即美国国家数据加密标准(the United States Data Encryption Standard),是一个块密码算法,块长8字节,密钥长56位。
This encrypted data element references the <xenc:EncryptedKey> value from the security header as the key for the symmetric encryption used on the Body content.
这个已加密的数据从安全头部引用 <xenc:EncryptedKey>值作为在Body内容中用于对称加密的密匙。
When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.
一旦计算机断开对等网络,网络形成的节点随即不复存在,储存在节点上的密钥数据也随之消失。
Encryption using a public-private key is slow and is directly proportional to the size of the data being encrypted.
使用公司密钥加密很慢,而且直接与加密的数据大小成正比。
Cryptography is sent by the general approach to data encryption to protect digital content before, the key given only to those legitimate users.
密码学的一般方式是在发送受维护数字内容之前对数据加密,仅把密钥给予那些合法的用户。
Encryption is a fancy computer-person word for scrambling your data until no one can understand what it says without a key.
加密是一个高大上的计算机术语,意思是对你的数据加以处理,直到没有密钥就没有人能理解它为止。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
The private key forever in chip, and public key authentication and encryption to send to the chip sensitive data.
这个私有密钥永远在芯片里,而公共密钥用来认证及加密发送到该芯片的敏感数据。
If for some reason you cannot restore the encryption key, the report server will never be able to decrypt and use any data that is encrypted with that key.
如果由于某些原因无法还原加密密钥,报表服务器将永远无法解密和使用由该密钥加密的所有数据。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509 证书相关联的公钥的非对称算法进行加密的。
Note that changing an encryption key may require a significant maintenance window; all existing encrypted data will require decryption with the old key and encryption with the new key.
注意,更改加密密钥时可能需要一个有效的维护窗口。所有已经被加密的数据需要用旧的密钥进行解密,然后用新的密钥加密。
Finally, the management and assignment of secret key in data encryption devices and data networks.
对数据加密设备和数据网络中密钥的管理和分配问题进行了探讨。
As a result, Public Key Institution (PKI) is proved to be the reliable system for encryption of data, which also draws attention of the commercial society.
其结果是,“公钥基础结构”或PK I被证实不是加密数据的可靠系统,而且商业社会也已经注意到了这一点。
The data encryption transmission is realized between Client and Server. Furthermore key management is realized including generating, storing, deleting, modifying and searching of key.
实现了客户机与服务器间数据加密传输,同时实现了密钥的管理,包括密钥的生成、存储、删除、修改和查询。
The data encryption technology is one of the key skills to ensure the network security.
数据加密技术是实现网络安全的关键技术之一。
Data encryption is one of the key technologies in network security.
数据加密技术是实现网络安全的关键技术之一。
Data encryption is one of the key technologies in network security.
数据加密技术是实现网络安全的关键技术之一。
应用推荐