The number that you choose to rotate your letters by is what we call in cryptography, a key.
你选择的旋转字母的数量就是我们在密码学中所说的密匙。
There's cryptography going on.
这里就使用了密码技术。
Appendix 4: Public-key cryptography terminology.
附录4:公钥加密术语。
Digital signatures rely on public key cryptography.
数字签名依赖于公共密钥加密学。
Computing: Quantum cryptography is unbreakable in theory.
计算:量子密码理论上是无法破解的。
RSA public-key cryptography is based on this property of factorization.
RSA公钥密码系统就是基于这种因数分解特性的。
Note: See Resources for more information about cryptography in OpenBSD.
注意:有关OpenBSD中加密方面的更多信息,请参见参考资料部分。
All the clever cryptography means BitCoin dealings are difficult to trace.
所有聪明的密码学家都表示跟踪比特币交易很困难。
The articles on cryptography do contain a great deal of mathematical depth.
关于加密算法的文章确实包含了很多高深数学逻辑。
Cryptography is the art of "secret writing," as the word's Greek roots attest.
作为希腊的词根资产,加密技术是一种“神秘编写”艺术。
Since a pair of keys is involved, it is also called an asymmetric cryptography.
因为涉及到一对密钥,所以它也称为非对称加密。
This is the primary differentiating factor amongst the cryptography algorithms.
这是区分加密算法的根本。
Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).
不对称加密:公钥加密(这两个术语是同义词)。
There are also control challenges here, including those related to cryptography use.
这里还有一些控制上的问题,其中一些与应用加密有关。
To request a certificate, you need to generate a keypair using cryptography software.
要请求证书,您需要使用加密软件生成一个密钥对。
A digital certificate is more than just a cryptography key; it is an online credential.
数字证书不仅仅是一个加密密钥,它还是一个在线凭证。
You can use Shiro's cryptography support anywhere, even if a Subject is not being used.
你可以在任何地方使用Shiro的加密支持,甚至在不使用Subject的情况下。
Shiro’s goal in cryptography is to simplify and make usable the JDK’s cryptography support.
在加密方面,Shiro的目标是简化并让JDK的加密支持可用。
Cryptography is the process of hiding or obfuscating data so prying eyes can't understand it.
加密是隐藏或混淆数据以避免被偷窥的过程。
And their fears are not groundless: More than 90% of proprietary cryptography has been broken.
他们的害怕并非没有根据:90%以上的专用密码术都已被攻破。
Secret key cryptography is one of the most important technologies in distributed systems security.
秘密密钥加密是分布式系统安全机制中一种最重要的技术。
Kerberos was designed based on secret key cryptography and using trusted third party authentication.
Kerberos是根据秘密密钥加密并使用可信第三方身份验证而设计的。
However, public key Cryptography takes things a step further and introduces the idea of signed public keys.
然而,公钥密码术更进一步,它引入了签名公钥的概念。
Algorithm Type defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest.
算法类型定义加加密算法是对称的、非对称的还是消息摘要。
In this demonstration, I use the TripleDES block encryption algorithm of the SunJCE cryptography provider.
在这个演示中,我使用了SunJCE密码术供应商的tripledes块加密算法。
The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms.
加密过程或解密过程一般被称作密码术,且依赖于数学算法。
There are subtle issues of cryptography, replay attacks, and various other forms of attack that are easily overlooked.
加密、重播攻击和其中各种形式的攻击中有各种细微问题容易被忽视。
For instance, changes to cryptography in the core layer require changes to the cryptographic controls, and vice versa.
例如,对核心层的加密技术的更改要求对加密控制进行更改,反之亦然。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
应用推荐