PUBLIC-KEY ENCRYPTION 中文是什么意思 - 中文翻译

在 英语 中使用 Public-key encryption 的示例及其翻译为 中文

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
SSL uses RSA public-key encryption for specific TCP/IP ports.
SSL对特定的TCP/IP端口使用RSA公钥加密
For this, PGP combines symmetric-key encryption and public-key encryption.
为此,PGP结合了对称密钥加密和公钥加密
Public-key encryption(PKE) came into existence in the year 1976.
公开密钥(publickey)密码体制出现于1976年。
(Note that with enough computational power, any public-key encryption can be broken).
(注意,只要有足够的计算能力,任何公钥加密都可能被破解)。
In public-key encryption, each computer(or user) has a public-private key pair.
公钥加密中,每个计算机(或用户)具有公钥-私钥对。
We will cover the relevant number theory and discuss public-key encryption and basic key-exchange.
我们将会讲到相关的数论知识,并讨论公钥加密和基本的密钥交换。
Public-key encryption provides a solution to key distribution and data transmission issues.
公钥加密反过来提供一个密钥分发和数据传输问题的解决方法。
As mentioned earlier, when doing public-key encryption, you need to have the recipient's public keys.
如前所述,在进行公钥加密时,您需要获得收件人的公钥。
Public-key encryption(used primarily for key exchange) and digital signatures are more complicated.
公钥加密(主要用于密钥交换)和数字签名更加复杂。
(2) The mathematical procedures used for generating authorized digital signatures under[this Law][these Rules]are based on public-key encryption.
(2)用于生成[本法][本规则]所授权的数字签字的数学步骤以公开加密方法为基础。
Public-key encryption(used primarily for key exchange) and digital signatures are more complicated.
公钥加密(主要用于密钥交换)和数字签名更为复杂。
An IBM researcher has solved a thorny mathematicalproblem that has confounded scientists since the invention of public-key encryption several decades ago.
一名IBM研究员解决了一项棘手的数学问题,该问题自从几十年前公钥加密发明以来一直困扰着科学家们。
Public-key encryption protocols are complicated, and in computer networks, they're executed by software.
公钥加密协议很复杂,在计算机网络中,它们由软件执行。
Because of these problems,secret-key encryption is often used together with public-key encryption to privately communicate the values of the key and IV.
由于存在这些问题,因此通常将私钥加密与公钥加密配合使用,以秘密地传达密钥和IV的值。
Public-key encryption protocols are complex, and in computer Networks, they're executed by software.
公钥加密协议是复杂的,而且在计算机网络中,它们是由软件执行的。
Provers with enough computational power can createproofs/arguments about wrong statements(Note that with enough computational power, any public-key encryption can be broken).
具有足够计算能力的证明器可以创建关于错误语句的证明/参数(注意,如果具有足够的计算能力,则可以破坏任何公钥加密)。
Public-key encryption protocols are complicated, and in computer networks, they're executed by software.
公钥加密协议非常复杂,在计算机网络中,它们是由软件执行的。
Like most modern public-key encryption systems, the researchers' chip uses a technique called elliptic-curve encryption..
像大多数现代公钥加密系统一样,研究人员研发的新型芯片使用了一种称为“椭圆曲线加密”的技术。
Public-key encryption protocols are complicated, and in computer networks, theyre executed by software.
公钥加密协议是复杂的,而且在计算机网络中,它们是由软件执行的。
This category also includes public-key encryption algorithms- such as RSA and Elliptic Curve cryptography- that do the same thing, but are less efficient.
这一类同时也包含公钥加密算法--比如RSA和椭圆曲线加密术,它们可以做同样的事情,但不是那么有效。
Public-key encryption protocols are very complicated, and in the world of computer networks, they're executed by software.
公钥加密协议非常复杂,在计算机网络中,它们是由软件执行的。
Therefore, public-key encryption is less susceptible to exhaustive attacks that try every possible key.
因此,公钥加密不太容易受到对每个可能的密钥都进行尝试的穷举攻击。
Public-key encryption uses a private key that must be kept secret from unauthorized users and a public key that can be made public to anyone.
公钥加密使用一个必须对未经授权的用户保密的私钥和一个可以对任何人公开的公钥。
Public-key encryption(PKE) requires the use of a key management tool to either generate private and public keys, or to import public keys.
公共密钥加密(PKE)需要使用密钥管理工具,以便生成私有和公共密钥,或者导入公共密钥。
结果: 24, 时间: 0.0346

单词翻译

顶级字典查询

英语 - 中文