The difference between symmetric and asymmetric encryption
对称和非对称加密间的差异
Explains how to do symmetric and asymmetric encryption.
说明如何进行对称和非对称加密。
AsymmBinding: Require asymmetric encryption using dual certificates.
AsymmBinding:需要非对称加密,使用双重证书。
The asymmetric encryption mechanism made the encrypted data more secure.
非对称的加密机制则使得数据加密更具安全性。
For asymmetric encryption algorithms, you can use RSA1024, RSA2048, or RSA4096.
对于非对称加密算法,您可以使用RSA1024、RSA2048或RSA4096。
A major part of the WS-Security performance cost comes from the wide use of asymmetric encryption.
WS - Security之所以常常伴随性能损失主要是因为大量使用了非对称加密。
The Listing 6 example USES asymmetric encryption to sign all the messages providing book information.
清单6中的示例使用非对称加密技术签署所有消息,提供图书信息。
The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
密钥的RC4加密后生成的初始密钥交换中的RSA非对称加密使用。
Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption.
由于使用了不同的密匙进行加密和解密消息,因此这种形式的加密被称为不对称加密。
Using asymmetric encryption with public/private key pairs for signing and encrypting messages is simple (at least conceptually!).
使用不对称加密和public/private密钥对进行消息的签名和加密是很简单的(至少概念上很简单)。
As discussed in "Axis2 WS-Security signing and encryption," asymmetric encryption is a useful tool because it works with key pairs.
正如在“Axis2WS - Security签名和加密”一文中讨论的,非对称加密由于可处理密匙对,因此是一种很有用的工具。
When you're signing a large number of small messages with asymmetric encryption, most of your processing time is spent on the signature step.
当使用非对称加密对很多消息签名时,大多数处理时间花在签名上。
To communicate a symmetric key and IV to a remote party, you would usually encrypt the symmetric key and IV using asymmetric encryption.
若要与远端的一方沟通对称金钥和IV,通常会使用非对称加密来加密对称金钥和IV。
One advantage of WS-SecureConversation is supposed to be a performance gain from using symmetric encryption rather than asymmetric encryption.
WS -SecureConversation的一个优势是使用对称加密比使用非对称加密更能取得性能收益。
Based on the need of network office, this paper introduces the algorithm of asymmetric encryption, digital certificates and digital signature.
基于互联网络办公的需求,介绍了公开密钥加密算法、数字证书和数字签名技术。
SSL protocol USES symmetric encryption, asymmetric encryption, message digest, digital signature, digital certificate and other cryptographic techniques.
SSL协议采用了对称加密、非对称加密、信息摘要、数字签名、数字证书等密码学技术。
But it also has drawbacks, including the performance overhead of asymmetric encryption and the management headaches of obtaining and maintaining certificates for each client.
但是它也有缺点,包括不对称加密的性能开销和每个客户端获取和维护证书的繁琐管理。
When talking about asymmetric encryption it is often said that due to some reasons you should not encrypt your entire message asymmetrically, e. g. performance considerations.
当谈到非对称加密时,经常说,由于某些原因,你不应该不对称地加密整个消息,例如。性能注意事项。
This hash value is what's finally included in the actual signature, and generating the signature is the only step for which symmetric vs. asymmetric encryption is any different.
hash值最终包含在实际签名中,生成的签名是非对称与对称仅有的不同之处。
MD5 algorithm is used to implement the authentication process. DES algorithm combined with asymmetric encryption and digital signature to ensure the safety of information transmission.
MD 5算法用来实现身份认证过程,DES算法结合非对称加密和数字签名技术来保证信息的安全传输。
Because this is using asymmetric encryption, where each side has its own certificate and private key, it should be somewhat simpler to handle than the Listing 5 symmetric-encryption example.
因为这是使用非对象加密技术,而每一端有自己的证书和私有密钥,比起清单5对称加密技术示例,它处理起来更为简单。
The earlier article showed that WS-SecureConversation symmetric encryption provides considerably better performance than WS-Security asymmetric encryption, especially for encrypting messages.
前一篇文章显示WS -SecureConversation对称加密显然比WS - Security不对称加密具有更好的性能,特别是在加密消息时。
It'd be great to be able to do the same type of thing using asymmetric encryption, where the client has its own certificate (especially when you want to sign messages for sender verification).
能够使用非对称加密处理同类型的事情就太好了,其中客户端有自己的证书(特别是当您想要签署发送者证书消息时)。
In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.
该机制通过非对称加密算法、随机密钥加密用户备份信息,以及“一次一密”加密数据库等手段有效解决传统密钥恢复机制在密钥产生、存储、备份、恢复过程中的安全问题。
The RDP protocol USES the RC4 symmetric encryption algorithm with up to 128 bit keys. The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
RDP协议的使用对称加密算法rc4多达128位钥匙。rc4加密后所产生的一个初步的交流,其中的关键是使用RSA的非对称加密。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
One disadvantage of asymmetric keys is that they take much longer to encrypt a message than do symmetric keys, and the encryption time is directly proportional to the size of the message.
非对称密钥的一个缺点是加密消息要比对称密钥花费更长的时间,而且加密时间直接与消息的长短成正比。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509 证书相关联的公钥的非对称算法进行加密的。
Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
应用推荐