Примеры использования Cryptographic key на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
The user's public cryptographic key;
Another situation where quick guessing is possible is when the password is used to form a cryptographic key.
At the field Cryptographic key can choose following options.
The user generates or is given a unique cryptographic key pair;
During the login process, a cryptographic key is performed using 1024-bit RSA encryption.
Each managed object has an immutable Value such as a key block that contains a cryptographic key.
A cryptoperiod is the time span during which a particular cryptographic key can be used for its defined purpose.
For example, if one periodically contacts a server to determine its health,a monitor will never see a failure unless the monitor tries to verify the server's cryptographic key.
User authentication in the system is performed using a special cryptographic key consisting of letters and numbers.
If one assumes that a cryptographic key can be tested with only one operation, then a typical 128-bit key could be cracked in under 10-36 seconds.
A legal person may identify a data message by affixing to that message the public cryptographic key certified for that legal person.
Covers all primary uses of a certificate's cryptographic key, including encryption of data, decryption of data, initial logon, or digitally signing data.
General remarks were made concerning the terminologyof draft article C, in particular the use of the word“user” with reference to the holder of the private key of a cryptographic key pair.
Each message has to be encrypted using some cryptographic key that is known only to the intended receivers.
On the other hand, in the context of digital signatures relying on asymmetric cryptography,the core operative element that could be described as"linked to the signatory" is the cryptographic key pair.
After press buttonMessage encryption and choice cryptographic key will be display window for entering user PIN, as see at the fig.
On the other hand, in the context of digital signaturesrelying on asymmetric cryptography, the core operative element that could be described as'linked to the signatory' is the cryptographic key pair.
Whether the transformation was operated using the private cryptographic key that corresponds to the originator's public cryptographic key; and.
For example, in the context of digital signatures relying on asymmetric cryptography, the core operative element that could be described as"linked to the signatory andto no other person" was the cryptographic key pair.
For example, crimeware could be distributed with an incorporated public cryptographic key, whose corresponding private key is kept secret by the attacker.
CSP_202 If the VU generates cryptographic keys, it shall be in accordance with specified cryptographic key generation algorithms and specified cryptographic key sizes.
The data message as received by the addressee resulted from the actions of a person whose relationship with the originator orwith any agent of the originator enabled that person to gain access to the originator's private cryptographic key.
We secure data from hackers by encrypting it at the hardware level,using a cryptographic key that is safely stored in an unique built-in Trusted Platform Module(TPM).
In a case where a private and a public cryptographic key are used respectively to create andverify an electronic signature, the link between the signatory and the public cryptographic key; and.
The holder of a certified key pair is under an obligation to revoke the corresponding certificate where the holder learns that the private cryptographic key has been lost, compromised or is in danger of being misused in other respects.
The suggestion was made that, in addition to the holder of a certified key pair, the certification authority, too,should have the duty to revoke the corresponding certificate where the certification authority learned that the private cryptographic key had been lost, compromised or was in danger of being misused in other respects.
The Zfone software detectswhen the call starts, and initiates a cryptographic key agreement between the two parties, and then proceeds to encrypt and decrypt the voice packets on the fly.
The draft guide to enactment should make it clear that in the uniform rules,"signature creation data" was intended to cover only the private cryptographic key(or other confidential data linked to the identity of the signatory) that was used to create an electronic signature.
Each user's computer can still be hacked to steal his or her cryptographic key(to create a MITM attack) or simply read the recipients' decrypted messages both in real time and from log files.