• The document is decrypted using the decryption key.

    解密密钥会被用来文档进行解密

    youdao

  • When she wants to download some documents, Alice USES the TG to generate a token and a decryption key.

    需要下载一些文档的时候,Alice会使用TG生成令牌一个解密密钥

    youdao

  • The other is adopt the inverse expansion in decryption key expansion module of feedback working pattern.

    第二反馈工作模式下对解密密钥扩展运用逆向扩展方法。

    youdao

  • Step 4: Create the Decryptor object with decryption key and the location of the encrypted data that is to be decrypted.

    步骤4解密密钥需要解密加密数据所在位置创建Decryptor对象

    youdao

  • Gave three properties of decryption key in RSA system: infinite property, constructive property, same odd type property.

    给出了RSA系统脱密密钥三个性质无穷构造性,奇。

    youdao

  • In terms of the difference between encryption key and decryption key, it can divide into symmetry cryptogram and public key cryptogram.

    根据加密密钥解密密钥在性质上差异可以密码体制分为对称密码和公钥密码两大类。

    youdao

  • It then passes the extracted Base 64 encoded cipher value, the decryption key, and the algorithm name to a method named decrypt (examined in Cryptography).

    接着抽取出的用Base 64编码密码解密密钥以及算法名称传递名为Decrypt方法(见密码术中的研究)。

    youdao

  • Collaboration is done by Alice generating a new token plus a decryption key which are sent to Bob who USES them to retrieve documents from the cloud and to decrypt them.

    协作通过Alice生成新的令牌还有解密密钥完成的,密钥会传送Bob,他会使用密钥云中取得文档对其进行解密。

    youdao

  • When the algorithms open, the decryption key can not be calculated by encryption key so the encryption key could be open, only keep decryption key secret, that is public key.

    算法公开时,计算可能加密密钥求解解密密钥,因而可以加密密钥公开,公开密钥。

    youdao

  • Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.

    对称算法非常有效并且可以与用于加密解密计算的单一密钥一起使用

    youdao

  • The encryption guarantees the data confidentiality on the topic, because only the service provider owning the right private key can perform decryption correctly and, thus, understand the data.

    加密可以保证有关某个主题数据机密性原因只有拥有正确服务提供者才能正确执行解密因此也能读懂数据。

    youdao

  • This mechanism ensures that only the trusted party can perform the decryption of the message, being the only one owning the right private key.

    机制确保只有可以执行消息解密,而此受信方只能拥有正确方。

    youdao

  • Note that XML Encryption is only about encryption and decryption of structured information and does not dictate any particular method of key exchange.

    XML加密关于加密解密结构化信息,而规定密钥交换任何特定方法

    youdao

  • A mismatch in either the encryption key or key version number causes the decryption process to fail.

    密密版本的不匹配导致解密过程失败

    youdao

  • This can happen to messages being transmitted in the clear, transmitted encrypted but stored in the clear, or decryption of messages due to stolen key or cryptoanalysis.

    明文方式传输消息、传输加密以明文方式存储的消息、或者由于密钥被窃取或通过密码分析获取后消息进行解密,以上几种情况下都可能发生这种攻击。

    youdao

  • In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.

    第三节中展示如何生成一个用于Kerveros通信中进行加密解密的密钥。

    youdao

  • The password callback earlier used to get the private-key password for signing, shown in Listing 2, also provides the password for decryption, so no change is needed there.

    前面密码回调用于获得私有密匙密码(用于实现签名),如清单2提供了用于解密的密码,因此需要做任何修改

    youdao

  • All the information necessary for decryption is present within the XML encryption tags: the name of the encryption algorithm, the type of data that was encrypted, and the name of the encryption key.

    XML加密标记存在解密需要所有信息:加密算法名称加密数据类型以及加密密钥的名称。

    youdao

  • For simple applications not requiring role-based access control and implementing only a single encryption key, a single user exit could be used for all encryption and decryption functions.

    对于需要基于角色访问控制并且实现加密密钥简单应用程序那么可以一个用户出口用于所有加密解密函数

    youdao

  • Note that changing an encryption key may require a significant maintenance window; all existing encrypted data will require decryption with the old key and encryption with the new key.

    注意更改加密密钥时可能需要一个有效维护窗口所有已经被加密数据需要的密钥进行解密,然后用新的密钥加密。

    youdao

  • On the client side, of course, only the service provider identified by the serviceProviderId flag can understand the message, because it has the right private key to perform the decryption.

    当然客户端,只有serviceProviderId 标志标识服务提供者能够理解消息因为具有执行解密所需正确

    youdao

  • If a key pair is successfully used in an encryption and decryption operation, the pair's private key must have been used for one part of the operation.

    如果加密解密操作成功地使用密钥,那么必定在操作某个部分使用了密钥中的

    youdao

  • To enable automatic decryption of the database master key of a mirror database, you must provide the password used to encrypt the master key to the mirror server instance.

    启用镜像数据库密钥自动解密功能,必须镜像服务器实例提供用于加密主密钥密码

    youdao

  • Kerberos defines an algorithm for processing a user's password to produce a secret key. The Kerberos client will use this key for decryption during the process of getting the TGT.

    Kerberos定义了用户密码进行处理生成一个密钥算法

    youdao

  • As the encryption algorithm and decryption algorithm are open to everyone, so the private key storage management becomes an insecure part in public key system.

    公钥密码系统中加密解密算法公开的,因此存储管理成了公钥系统安全薄弱的环节

    youdao

  • This encryption method uses quantum state as the key used for the encryption and decryption of information.

    这种加密方法是用量子状态来作为信息加密解密密钥

    youdao

  • A group key distribution scheme utilizing a polynomial expansion is proposed, which features in no traditional encryption and decryption.

    提出了一种利用多项式展开密钥分配方案特点使用传统加密解密

    youdao

  • Cryptography is the core of security technologies, and encryption, decryption, digital signature, key exchange etc. are the important mechanisms to guarantee the safety.

    密码学安全技术核心,其中的加密解密数字签名密钥交换技术起到保障作用重要机制

    youdao

  • When the piracy occurring, the data supplier not only can trace the traitor but also can revoke the decryption ability of the traitor's private key by updating the code vectors of the users.

    发生盗版时,数据发行商不但可以追踪叛逆者而且可以通过更新用户向量来废除叛逆者的密钥解密能力

    youdao

  • When the piracy occurring, the data supplier not only can trace the traitor but also can revoke the decryption ability of the traitor's private key by updating the code vectors of the users.

    发生盗版时,数据发行商不但可以追踪叛逆者而且可以通过更新用户向量来废除叛逆者的密钥解密能力

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定