英語 での The encryption algorithm の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
The encryption algorithm is RC4.
Appropriate feedback techniques will usually be recommended with the encryption algorithm.
The encryption algorithm is RC4.
The encryption algorithm is AES-256.
When someone wants send you an encrypted message,he or she uses your public key to generate the encryption algorithm.
The encryption algorithm is blowfish.
The encryption algorithm name is"AES128-SHA.
In addition, the encryption algorithm has a fixed block size.
If chosen or known plain text and the resulting encrypted text are available,a"meet in the middle" attack is possible if the structure of the encryption algorithm allows it.
The encryption algorithm employed is specified by the SA.
In such circumstances,the content of the Padding field will be determined by the encryption algorithm and mode selected and defined in the corresponding algorithm RFC.
The encryption algorithm or protocol needs to be adequate to the task.
Expanded Key Material The number of bytes actually fed into the encryption algorithm Effective Key Bits How much entropy material is in the key material being fed into the encryption routines.
The encryption algorithm is used for encrypting data packets when they are sent and decrypting them once received.
What makes encryption so important is that if someone were to capture the briefcase andcut it open without the encryption key and the encryption algorithm, they wouldn't be able to read the documents.
The Encryption Algorithm and Authentication Algorithm documents are responsible for specifying the key sizes and strengths for each algorithm. .
A5/3 won't stop adversaries from eavesdropping on subscribers: if the attackers use a fake base station,the latter is empowered to downgrade the encryption algorithm used by the phone, ultimately helping hackers in their quest of obtaining the keyand the key is the same in all algorithms, .
The encryption algorithm has a fixed block size- increasing the length of the passphrase will not reduce the number of available characters.
Note that for an ESP SA, the encryption algorithm or the authentication algorithm could be"NULL".
The encryption algorithm must be in a public static method that takes a single string, the plaintext, as an argument and returns an array of two non-null strings, the key and the ciphertext.
No interactive interface, increasing the encryption algorithm, to avoid the work process and prevent non-authorized humanintervention set.
The encryption algorithm built SAM cards to establish their own security mechanisms and systems can also use large-capacity Memory card processing in real-time data on the hot backup, even when the handset accidental damage, but also to ensure that all operational records are not lost and rapid recovery.
Added: The full support to handle the encryption algorithm of the newly released DVDs such as The Hunger Games and The Dictator accurately.
If Padding bytes are needed but the encryption algorithm does not specify the padding contents, then the following default processing MUST be used.
Added: The full support to handle the encryption algorithm of the newly released DVDs such as The Hunger Games and The Dictator accurately.