The document is decrypted using the decryption key.
解密密钥会被用来对文档进行解密。
When she wants to download some documents, Alice USES the TG to generate a token and a decryption key.
当她需要下载一些文档的时候,Alice会使用TG来生成一个令牌和一个解密的密钥。
The other is adopt the inverse expansion in decryption key expansion module of feedback working pattern.
第二是在反馈工作模式下对解密密钥扩展运用了逆向扩展的方法。
Step 4: Create the Decryptor object with decryption key and the location of the encrypted data that is to be decrypted.
步骤4:用解密密钥和需要解密的加密数据所在的位置创建Decryptor对象。
Gave three properties of decryption key in RSA system: infinite property, constructive property, same odd type property.
给出了RSA系统中脱密密钥的三个性质:无穷性,构造性,同奇。
In terms of the difference between encryption key and decryption key, it can divide into symmetry cryptogram and public key cryptogram.
根据加密密钥和解密密钥在性质上的差异,可以将密码体制分为对称密码和公钥密码两大类。
It then passes the extracted Base 64 encoded cipher value, the decryption key, and the algorithm name to a method named decrypt (examined in Cryptography).
接着它将抽取出的用Base 64编码的密码值、解密密钥以及算法名称传递给名为Decrypt的方法(见密码术中的研究)。
Collaboration is done by Alice generating a new token plus a decryption key which are sent to Bob who USES them to retrieve documents from the cloud and to decrypt them.
协作是通过Alice生成新的令牌还有解密密钥完成的,密钥会被传送给Bob,他会使用密钥从云中取得文档并对其进行解密。
When the algorithms open, the decryption key can not be calculated by encryption key so the encryption key could be open, only keep decryption key secret, that is public key.
当算法公开时,在计算上不可能由加密密钥求解解密密钥,因而可以将加密密钥公开,即公开密钥。
Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.
对称算法非常有效,并且可以与用于加密和解密计算的单一密钥一起使用。
The encryption guarantees the data confidentiality on the topic, because only the service provider owning the right private key can perform decryption correctly and, thus, understand the data.
加密可以保证有关某个主题的数据机密性,原因是只有拥有正确私钥的服务提供者才能正确执行解密,因此也能读懂该数据。
This mechanism ensures that only the trusted party can perform the decryption of the message, being the only one owning the right private key.
此机制确保了只有受信方可以执行消息的解密,而此受信方只能是拥有正确私钥的一方。
Note that XML Encryption is only about encryption and decryption of structured information and does not dictate any particular method of key exchange.
XML加密只关于加密和解密结构化信息,而不规定密钥交换的任何特定方法。
A mismatch in either the encryption key or key version number causes the decryption process to fail.
加密密匙或密匙版本号的不匹配会导致解密过程失败。
This can happen to messages being transmitted in the clear, transmitted encrypted but stored in the clear, or decryption of messages due to stolen key or cryptoanalysis.
以明文方式传输消息、传输加密的但以明文方式存储的消息、或者由于密钥被窃取或通过密码分析获取后对消息进行解密,在以上几种情况下都可能发生这种攻击。
In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.
在第三节中,我将展示如何生成一个用于在Kerveros通信中进行加密和解密的密钥。
The password callback earlier used to get the private-key password for signing, shown in Listing 2, also provides the password for decryption, so no change is needed there.
前面的密码回调用于获得私有密匙密码(用于实现签名),如清单2所示,还提供了用于解密的密码,因此不需要做任何修改。
All the information necessary for decryption is present within the XML encryption tags: the name of the encryption algorithm, the type of data that was encrypted, and the name of the encryption key.
XML加密标记中存在着解密需要的所有信息:加密算法的名称、加密的数据类型以及加密密钥的名称。
For simple applications not requiring role-based access control and implementing only a single encryption key, a single user exit could be used for all encryption and decryption functions.
对于不需要基于角色的访问控制,并且只实现一个加密密钥的简单应用程序,那么可以将一个用户出口用于所有加密和解密函数。
Note that changing an encryption key may require a significant maintenance window; all existing encrypted data will require decryption with the old key and encryption with the new key.
注意,更改加密密钥时可能需要一个有效的维护窗口。所有已经被加密的数据需要用旧的密钥进行解密,然后用新的密钥加密。
On the client side, of course, only the service provider identified by the serviceProviderId flag can understand the message, because it has the right private key to perform the decryption.
当然,在客户端,只有serviceProviderId 标志标识的服务提供者能够理解此消息,因为其具有执行解密所需的正确私钥。
If a key pair is successfully used in an encryption and decryption operation, the pair's private key must have been used for one part of the operation.
如果在加密和解密操作中成功地使用了密钥对,那么必定在操作的某个部分使用了密钥对中的私钥。
To enable automatic decryption of the database master key of a mirror database, you must provide the password used to encrypt the master key to the mirror server instance.
若要启用镜像数据库的主密钥自动解密功能,必须向镜像服务器实例提供用于加密主密钥的密码。
Kerberos defines an algorithm for processing a user's password to produce a secret key. The Kerberos client will use this key for decryption during the process of getting the TGT.
Kerberos定义了一种对用户密码进行处理以生成一个密钥的算法。
As the encryption algorithm and decryption algorithm are open to everyone, so the private key storage management becomes an insecure part in public key system.
在公钥密码系统中加密和解密算法是公开的,因此私钥存储管理成了公钥系统安全中薄弱的环节。
This encryption method uses quantum state as the key used for the encryption and decryption of information.
这种加密方法是用量子状态来作为信息加密和解密的密钥。
A group key distribution scheme utilizing a polynomial expansion is proposed, which features in no traditional encryption and decryption.
提出了一种利用多项式展开的组密钥分配方案,其特点是不使用传统加密和解密。
Cryptography is the core of security technologies, and encryption, decryption, digital signature, key exchange etc. are the important mechanisms to guarantee the safety.
密码学是安全技术的核心,其中的加密解密、数字签名、密钥交换等技术是起到保障作用的重要机制。
When the piracy occurring, the data supplier not only can trace the traitor but also can revoke the decryption ability of the traitor's private key by updating the code vectors of the users.
当发生盗版时,数据发行商不但可以追踪到叛逆者,而且可以通过更新用户的码向量来废除叛逆者的秘密钥的解密能力。
When the piracy occurring, the data supplier not only can trace the traitor but also can revoke the decryption ability of the traitor's private key by updating the code vectors of the users.
当发生盗版时,数据发行商不但可以追踪到叛逆者,而且可以通过更新用户的码向量来废除叛逆者的秘密钥的解密能力。
应用推荐