The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.
公钥密码启用的安全性服务是基于这样的消息解密机制,即共有密钥只能通过相应的私有密钥才能解密,反之亦然。
This approach involving private and public key pairs is also known as public key cryptography.
这种涉及到私钥和公钥对的方式也被称作公钥密码术。
The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding private key can decrypt the data.
传递的数据使用公钥(非对称)加密算法加密,所以只有对应私钥的持有者才能解密数据。
Elliptic Curve Cryptography (ECC) has the highest safety strength of private key per bit in the Public-Key Cryptography recently.
椭圆曲线密码体制是目前公钥体制中每比特密钥安全强度最高的一种密码体制。
Public Key and Asymmetric - Public-key cryptography uses a pair of keys, one that is designated the private key and kept secret, the other key is called the public key and is generally made available.
公钥和非对称公钥密码学使用一对密钥,其中的一个定义为私钥并加密存放,另外一个被称为公钥,通常无须加密。
Create a new Private Key and select the defaults for configuring Cryptography and your CA Name.
创建新的专用密钥,然后选择配置加密和您的CA名称的默认值。
Asymmetric keys are used in public-key cryptography, which USES two keys, a public key and a private key, which are related mathematically.
非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关的一个公钥和一个私钥。
Asymmetric keys are used in public-key cryptography, which USES two keys, a public key and a private key, which are related mathematically.
非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关的一个公钥和一个私钥。
应用推荐