Asymmetric cryptographic algorithms , also known as public - key algorithms , require that each entity maintains a pair of related keys : a private key and a public key 不对称加密算法(也称为公钥算法)要求每个实体都维护一对相关密钥:私钥和公钥。
Public - key cryptographic algorithms are also known as asymmetric algorithms because one key is required to encrypt data while another is required to decrypt data 公钥加密算法也称为不对称算法,原因是需要用一个密钥加密数据而需要用另一个密钥来解密数据。
The purpose of the machine was to emphasize just how vulnerable des a popular , government - sanctioned cryptographic algorithm really is . to read more on the des cracker , see 具有安全性意识的程序会放弃root特权并让操作系统知道它不应再需要那些特权(至少在程序下一次运行之前) 。
As the core and the foundation of information security , the cryptography , especially the security of cryptographic algorithms , is the focus of correlated researches and discussions in the world 作为信息安全的核心和基石,密码算法特别是密码算法的安全性一直是国内外研究和讨论的热点问题。
For example , an enterprise that has its own implementation of a cryptographic algorithm can make that implementation the default instead of the implementation shipped in the . net framework sdk 例如,某个企业可以将自己的加密算法实现设置为默认实现,而不是使用. net framework sdk中提供的算法实现。
The . net framework sdk allows computer administrators to configure the default cryptographic algorithms and algorithm implementations that the . net framework and appropriately written applications use . net framework sdk允许计算机管理员配置默认加密算法和算法实现,供. net framework和正确编写的应用程序使用。
Public - key cryptography is used for strong authentication , but x . 509 is not dependent on the use of a particular cryptographic algorithm , though two users wishing to authenticate must support the same algorithm 强认证使用公钥加密方式,但是x . 509并不依赖于使用特殊加密算法,尽管两个用户希望认证必须支持同一算法。
Secondly , in order to develop and apply aes algorithm better , and design cryptographic algorithm independently , the paper deeply research the design principle and security of the aes algorithm 其次为了更好开发应用aes算法,并实现分组加密密码算法的本土化设计,对分组加密算法aes的设计原理、安全性能方面进行了深入的研究。
We identify two categories of operations in symmetric - key and public - key cryptographic algorithms that are not common in previous general - purpose workloads : advanced bit operations within a word and multi - word operations 我们区别对称密钥和公共密钥加密算法中的两类运算:面向位的运算和多字运算,他们在以往通用负载中并不常见。
The reverse process of converting cipher text back into plain text is called decryption . a cryptographic algorithm frequently referred to as a cipher is a mathematical function to perform encryption , and vice versa , using keys 加密技术范指透过特定程序算法及密码匙,将讯息从初始普通文本转换为另一种不易理解的形式密码文本。