the same key
相同 的 密钥
相同 的 键
同 一 个 密钥
同 一 个 键
相同 的 关键
相同 的 钥匙 the same keys
相同 的 密钥
相同 的 键
同 一 个 密钥
同 一 个 键
相同 的 关键
相同 的 钥匙
Both the parties need to have the same key in order to achieve secure communication. Communicating parties must have the same key in order to achieve secure communication. All switches use the same key . Both locks use the same key . As a precondition, the sender and receiver have the same key . Combinations with other parts of speech
Note that both the sender and the recipient use the same key . All participating stations as well as the access point need the same key . It is necessary that both the sender and the receiver have the same key . It requires both the sender and recipient to have the same key . The sender and receiver use the same key . 在我之后重复:不要使用相同的密钥 来加密两个不同的消息。 This is vitally important: never use the same key to encrypt two different messages. If the same key is used by both parties, it is called Symmetric Encryption. 这称为对称加密,其中相同的密钥 用于双方加密和解密。 This is called symmetric encryption, in which the same key is used to encrypt and decrypt on both sides. Since both sides will be using the same keys , this is known as Symmetric Encryption. 不要对源数据使用相同的密钥 ,并将密钥访问权限限制在几个授权的管理员手中。 Don't use the same keys for the source data, and restrict key access to just a few authorized admins. 除非保持相同的密钥 对于公钥密钥很重要,否则每当获得新证书时,还应该生成新的私钥。 Unless keeping the same keys is important for public key pinning, you should also generate new private keys whenever you're getting a new certificate. 若使用对称加密,只有一个加密和解密密匙,这意味着发送者和接收者使用相同的密钥 。 With symmetric encryption, there is only one key with encryption and decryption, meaning that the sender and receiver use the same key . 在密钥加密技术中,交流的双发Alice和Bob,使用相同的密钥 来加密和解密消息。 In symmetric encryption Alice and Bob use the same key to encrypt and decrypt the message. 在传统数据中心的灾难恢复计划中采用相同的密钥 恢复度量是很重要的。 It is important to apply the same key recovery metrics that typically apply in a disaster recovery plan for a traditional data center. 在密钥加密技术中,交流的双发Alice和Bob,使用相同的密钥 来加密和解密消息。 With secret-key cryptography, both communicating parties, Alice and Bob, use the same key to encrypt and decrypt the messages. 然而,这种本地密钥生成方法的优点是,恶意软件是完全动态的,没有两个人会共享相同的密钥 。 However, the benefit to this local key generation method is that the malware is fully dynamic, and no two people will share the same key . 此类加密称为“对称密钥”加密,因为双方使用相同的密钥 。 This type of encryption is referred to as"symmetric key" encryption, because both parties use the same key . 它比对称加密更安全,因为发送方和接收方都使用相同的密钥 。 It is more secure than symmetric cryptography, where both sender and recipient use the same key . No two accounts may have the same key . 此类加密称为“对称密钥”加密,因为双方使用相同的密钥 。 The term“symmetric” is used because both ends use the same exact key .这样确保相同的密钥 和挑战应答对于一个特定的移动电话不会被使用两次。 This ensures that same keys and challenge responses are not used twice for a particular mobile. 像其他私人密码匙加密的方法一样,发送者和接受者必须知道并使用相同的密钥 。 Private key cryptographic methods,both the sender and the receiver must know and use the same private key . That means it is the same key on every system.
Display more examples
Results: 28 ,
Time: 0.0269