Ask the vendor what encryption algorithm it is using.
请询问您的提供商它所使用的是哪种加密算法。
The encryption algorithm makes use of keys in one of two ways.
加密算法通过以下两种方式之一使用密钥。
The SSL Server responds with the encryption algorithm and hash function to be used.
SSL服务器用加密算法以及要使用的散列函数来表示响应。
The encryption algorithm and the hash function are further grouped into CipherSpecs.
加密算法和散列函数被进一步分组到密码规范中。
Each INTEGER in the SEQUENCE specifies an encryption algorithm that the client supports.
SEQUENCE中的每个INTEGER指定客户机支持的一种加密算法。
An improved encryption algorithm based on digital chaotic coding system is proposed.
提出一种基于数字化混沌密码系统的改进算法。
Encryption Expert USES a hybrid encryption algorithm for encrypting database backup images.
EncryptionExpert对加密数据库备份映像使用混合的加密算法。
This paper presents a digital image encryption algorithm based on four-value chaotic array.
提出了一种基于四值混沌阵列的数字图像加密算法。
Make the following changes to /etc/krb5/krb5.conf file to support the ticket encryption algorithm.
对 /etc/krb5/krb5.conf文件做以下修改以支持票据加密算法。
I am also not disclosing the encryption algorithm used for providing ultimate security standards.
我也没有披露加密算法,用于提供最终的安全标准。
The combination of encryption algorithm and the key length governs the strength of the encryption type.
加密算法和密钥长度的组合决定加密类型的强度。
Based on region shifting encoding and pixel mapping, the paper proposes image encryption algorithm.
提出基于随机区域移位和随机像素映射的图像加密算法。
AES encryption algorithm, the writing is quite good, I hope you can help, can serve as a reference.
说明:aes的加密算法,写的相当好,希望能对大家有帮助,可以作为参考。
In this demonstration, I use the TripleDES block encryption algorithm of the SunJCE cryptography provider.
在这个演示中,我使用了SunJCE密码术供应商的tripledes块加密算法。
Select Encryption algorithm and hashing algorithm you want to use in your IPSec tunnels to encrypt the data.
选择在IPSec隧道中加密数据所用的加密算法和散列算法。
The key is typically a random sequence of bits; its size categorizes the strength of the encryption algorithm.
密钥一般是 0 或 1的一个随机序列;其大小区分了加密算法的能力。
In this paper, an image encryption algorithm based on chaotic mapping and vector quantization is presented.
提出了混沌映射与矢量码书相结合的加密算法。
Stream cipher and block cipher are main cipher systems in image encryption algorithm based on bit operation.
流密码与分组密码是基于位运算的图像加密算法中两种主要密码体制。
To take maximum advantage of the encryption algorithm, your key should be 32 characters in length (128 bits).
为了发挥加密算法的最大优势,你的解密钥匙需要被设置为32个字符长度为128比特。
Utilizing the stretch and fold mechanism, an invertible map set based image encryption algorithm is proposed.
利用拉伸和折叠的原理,提出了一种可逆映射集合的图像加密算法。
Then on the basis of safe and high efficient encryption algorithm, some related network protocols are produced.
相关网络安全协议应运而生,而它们的基础都是安全有效的加密算法。
It is not the only option which to increase the key length of encryption algorithm in order to enhance security.
仅通过增加加密算法的密钥长度来达到增强安全性已不再是唯一的可行方法。
It utilizes strong and time-proven encryption algorithm to provide you with peace of mind that your data is safe.
它利用强和时间验证的加密算法对向你提供一个平静的心态,你的数据是安全的。
You could also use a custom encryption algorithm to encrypt the username and the password at the client end using WMLScript.
您也可以用WMLScript来编写自定义的加密算法,以对客户端的用户名和密码进行加密。
And who wants to run off to a third party website and run a dozen email addresses through an encryption algorithm one at a time? Not me.
而且谁会希望在一个第三方网站上通过加密算法同时运行12个email帐号,我可不想那样。
For added benefit, using a one-way encryption algorithm or hash, like MD5 14 or Blowfish, 15 will make decrypting the password impossible.
为了更多的利益,利用单向加密算法或散列,像MD 514或Blowfish,15将使密码的解密成为不可能。
This article discusses the encryption algorithm of PC hard disk serial number with software according to the RSA encryption algorithm.
本文讨论通过RSA加密算法,对PC机硬盘序列号信息进行软加密,实现软件的试用。
The MD5 password encryption algorithm further improved security by allowing more robust passwords. An example of a shadow password entry is below.
MD 5密码加密算法支持更为可靠的密码,从而进一步提高了安全性。
Some players cannot be trusted, and worse, they have complete access to the encryption algorithm and all communications via the client executable.
有些玩家是不可信的,更糟的是,他们能够通过客户端执行文件获取对加密算法和所有通信的了解。
If you build an encryption algorithm around a function's easy direction, anyone wanting to break your encryption needs to work at it from the hard side.
如果围绕某个函数的简单方向构造一个加密算法,那么想要破解加密的任何人都需要从相反的方向来解密。
应用推荐