public key algorithm oor Koreaans

public key algorithm

en
An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message.

Vertalings in die woordeboek Engels - Koreaans

공개 키 알고리즘

en
An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message.
MicrosoftLanguagePortal

Geskatte vertalings

Vertoon algoritmies gegenereerde vertalings

voorbeelde

wedstryd
woorde
Advanced filtering
Voorbeelde moet herlaai word.
The structure of an X.509 v3 digital certificate is as follows: Certificate Version Number Serial Number Signature Algorithm ID Issuer Name Validity period Not Before Not After Subject name Subject Public Key Info Public Key Algorithm Subject Public Key Issuer Unique Identifier (optional) Subject Unique Identifier (optional) Extensions (optional) ...
봉제인형 및 동물WikiMatrix WikiMatrix
Therefore, each service may have different service primitives, such as a data encryption algorithm, public key, or initialization vector.
의약용 모발 성장 촉진제WikiMatrix WikiMatrix
The introduction of elliptic curve cryptography by Neal Koblitz and Victor Miller , independently and simultaneously in the mid-1980s, has yielded new public key algorithms based on the discrete logarithm problem.
웹사이트의 제작 및 유지대행업ParaCrawl Corpus ParaCrawl Corpus
The first phase is a choice of algorithm parameters which may be shared between different users of the system, while the second phase computes public and private keys for a single user.
이 프로그램이 텍스트 모드 프로그램이거나 터미널로 출력되는 정보를 보려면 선택하십시오WikiMatrix WikiMatrix
The public key can use either the DSA or RSA algorithms.
공업용 석회가마ParaCrawl Corpus ParaCrawl Corpus
SSO accepts public keys and certificates generated with either the RSA or DSA algorithm.
의약용 모발 성장 촉진제ParaCrawl Corpus ParaCrawl Corpus
SSL relies on a pair of public and private key technologies provided by Verisign, Inc. and based on a 40-bit encryption algorithm developed by RSA Data Security, Inc.
라이브공연업ParaCrawl Corpus ParaCrawl Corpus
7 sinne gevind in 11 ms. Hulle kom uit baie bronne en word nie nagegaan nie.