| 1. | That is , it doesn t depend on the shared secret key 即,它不取决于共享秘钥。 |
| 2. | Are used to generate single keys , also called shared secret keys 用于生成单个密钥,也称为共享密钥。 |
| 3. | Shared secret key infrastructures could also be used to provide pac identifiers 共享密钥基础设施也可以用来提供pac标识符。 |
| 4. | Macs work by leveraging a shared secret key , one copy of which is used on the recipient end Mac透过使用一种共用秘钥起作用,接收方端使用它的一个副本。 |
| 5. | The shared secret key itself is encrypted using the public key you created in the previous step , and is embedded in the xml content 共享密钥本身使用上一步生成的公钥加密并嵌入xml内容中。 |
| 6. | Decryption generates the identical keystream used for encryption using the transmitted - with - the - packet iv and the shared secret key 解密通过使用带信息包传输的iv和共享密钥来生成用于加密的等同密钥流。 |
| 7. | There isn t anything defective about cryptography that uses a shared secret key , provided a secure means of distributing the key exists 只要有可能,您都应该避免将它用作您唯一的防御线。这并不意味着含糊的安全性没有用武之地。 |
| 8. | Since the shared secret key is usually smaller than the content , a public key is used to encrypt only the shared secret key , which itself is embedded in the content 因为共享密钥通常比内容小,公钥只用于加密共享密钥,而把共享密钥本身嵌到内容中。 |
| 9. | Kerberos is a third - party network authentication protocol that employs a system of shared secret keys to securely authenticate a user in an insecure network environment Kerberos是一种第三方网络认证协议,采用共享密钥的系统安全地对不安全网络环境中的用户进行认证。 |
| 10. | Anyone can validate the signature by hashing the document themselves , and then decrypting the signature using either a public key or a shared secret key , and comparing the two hashes 任何人都可以透过自行杂凑文件,然后解密签名(使用公钥或共用秘钥) ,并比较两个杂凑来确认签名。 |