Information technology - security techniques - entity authentication - part 2 : mechanisms using symmetric encipherment algorithms 信息技术安全技术实体鉴别第2部分:采用对称加密算法的机制
Secret - key encryption is also referred to as symmetric encryption because the same key is used for encryption and decryption 私钥加密又称为对称加密,因为同一密钥既用于加密又用于解密。
Information technology - security techniques - entity authentication mechanisms - mechanisms using symmetric encipherment algorithms 信息技术.安全技术.实体鉴定机制.使用对称加密算法的机制
Information technology - security techniques - entity authentication - part 2 : mechanisms using symmetric encipherment algorithms 信息技术.安全技术.实体验证.第2部分:使用对称加密算法的机构
Information technology - security techniques - entity authentication - part 2 : mechanisms using symmetric encipherment algorithms 信息技术.安全技术.实体鉴别.第2部分:使用对称加密算法的机制
Never store a symmetric cryptographic key in plaintext or transfer a symmetric key between machines in plaintext 不要以纯文本格式存储对称加密密钥,也不要用纯文本在计算机之间传输对称密钥。
Public key cryptography or asymmetric cryptography forms the basis of digital signatures and public key infrastructure 公开密码匙加密术或非对称加密术构成数码签署及公开密码匙基础建设的基础。
Public key cryptography or asymmetric cryptography forms the basis of digital signatures and public key infrastructure 公开密码匙加密术或非对称加密术构成数码签署及公开密码匙基础建设的基础。
Asymmetry encryption could resolve ali of the security puzzies while tr8ditionai encryption could not do well 常规的加密技术很难满足新的安全性的要求,而非对称加密技术则可以提供完整的解决方案。
Represents the namespace uniform resource identifier for the rsa optimal asymmetric encryption padding oaep encryption algorithm 表示rsa优化非对称加密填充( oaep )加密算法对应的命名空间统一资源标识符( uri ) 。