The KDC supplies the ME with single-sign-on credentials in the form of a Key Encryption Key (KEK).
所述KDC向所述ME提供密钥加密密钥(KEK)形式的单点登录证书。
Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output.
步骤4:利用一个数据加密密钥、一个密钥加密密钥、与这两个密钥相关联的算法、以及将来包含在输出信息中的密钥信息,根据它们来创建一个Encryptor对象。
The key used for the data encryption could be the same key passed in the original request or another randomly generated key, the latter being more typical.
用于数字加密的密钥可能是在最初请求中传送的同一密钥,也可能是另一个随机生成的密钥,而后者更具代表性。
Key - a key is cryptographic data which is usually derived from a user's password using specific encryption algorithms.
密钥—密钥就一些密码数据,通常使用特定加密算法从用户的密码中获得。
This element's content gives a secret key in encrypted form, using the server's public key to do the encryption.
这个元素的内容提供了一个加密了的秘密密匙,使用了服务器的公开密匙执行加密。
So public-private key pairs can be used for both encryption and signing of messages exchanged between two parties, provided each party has access to the other's public key.
公开-私有密匙对可以同时用于对双方之间交换的信息进行加密和签名,假设交换双方都可以访问对方的公开密匙。
For the curious, a 1024 bit RSA key pair is used for signing and a 128 bit secret key (AES) is used for encryption.
出于好奇,我们使用1024位RS a密钥对来进行签名,使用128位机密密钥(AES)来进行加密。
This proof of possession is similar to how the SSL handshake protocol uses encryption to prove that a client is in fact the holder of a private key, without sending the key itself.
这种所有权证明类似于SSL握手协议使用加密来证明客户端是私有密匙的持有者,而不需要发送密匙本身。
The temporary secret key serves both as the value of the key and as the value of the initial vector for DES-CBC encryption.
这个临时密钥同时作为密钥的值和DES - CBC加密的初始矢量的值。
First, we use keytool to create a key store for holding a generated encryption key.
首先,使用keytool创建用于保存生成的加密密钥的密钥库。
To encrypt file data, an encryption key password must be selected, which Tivoli Storage Manager uses to generate the encryption key for encrypting and decrypting the file data.
为加密文件数据,必须选择一个加密密钥口令,TivoliStorageManager使用它来生成加密密钥,以加密和解密文件数据。
To create the public or private key, you need to use ssh-keygen, specifying the type of key encryption.
要创建公钥或私钥,您需要使用ssh-keygen 来指定密钥加密的类型。
Once you generate the key, you can use the AbderaSecurity class to get an Encryption object and feed it the key you just created.
生成密钥之后,便可以使用AbderaSecurity类获得一个Encryption对象并把刚创建的密钥提供给它。
As discussed in "Axis2 WS-Security signing and encryption," you use your private key to sign messages and the recipient's public key to encrypt messages.
正如在“Axis2WS - Security签名和加密”中所介绍的,您可以使用您的私钥对消息进行签名,并使用接收者的公钥对消息进行加密。
If an encryption key is created with this option, the encryption key is stored on the agent disk with password protection.
如果加密密匙在创建时带有这个选项,那么它就存储在有密码保护的代理磁盘上。
The key can be encrypted, using a password (hopefully not weak) as the encryption key.
可以通过将一个密码(希望不太弱)用作加密密钥来对密钥加密。
In the grown-up world, you solve these problems through the use of public key-private key encryption.
在成年人的世界里,可以通过使用公钥—私钥加密来解决此类问题。
A mismatch in either the encryption key or key version number causes the decryption process to fail.
加密密匙或密匙版本号的不匹配会导致解密过程失败。
You need a symmetric key to do the encryption, and the key must be managed independently.
必须有对称密钥才能解密,而且密钥必须单独管理。
With PGP and other public-key encryption methods, there's no way to deduce someone's private key from the public key.
对于PGP和其他公钥加密方法,不存在从公钥推断某人私钥的方法。
The private key forever in chip, and public key authentication and encryption to send to the chip sensitive data.
这个私有密钥永远在芯片里,而公共密钥用来认证及加密发送到该芯片的敏感数据。
In terms of the difference between encryption key and decryption key, it can divide into symmetry cryptogram and public key cryptogram.
根据加密密钥和解密密钥在性质上的差异,可以将密码体制分为对称密码和公钥密码两大类。
If for some reason you cannot restore the encryption key, the report server will never be able to decrypt and use any data that is encrypted with that key.
如果由于某些原因无法还原加密密钥,报表服务器将永远无法解密和使用由该密钥加密的所有数据。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509 证书相关联的公钥的非对称算法进行加密的。
Note that changing an encryption key may require a significant maintenance window; all existing encrypted data will require decryption with the old key and encryption with the new key.
注意,更改加密密钥时可能需要一个有效的维护窗口。所有已经被加密的数据需要用旧的密钥进行解密,然后用新的密钥加密。
No encryption key is available. A well-known encryption key was returned.
没有可用的加密密钥。返回了一个已知加密密钥。
Click Create new encryption key to generate a new encryption key.
单击“新建加密键”以生成新的加密键。
If a key pair is successfully used in an encryption and decryption operation, the pair's private key must have been used for one part of the operation.
如果在加密和解密操作中成功地使用了密钥对,那么必定在操作的某个部分使用了密钥对中的私钥。
Many encryption packages that are basically secret-key systems use public-key encryption to communicate the secret session keys.
很多基本上是秘钥系统的加密软件包采用明钥加密,来传送秘密的会话密钥。
Many encryption packages that are basically secret-key systems use public-key encryption to communicate the secret session keys.
很多基本上是秘钥系统的加密软件包采用明钥加密,来传送秘密的会话密钥。
应用推荐