decryption是什么意思   decryption怎么读

英式:[di:'krɪpʃn]    美式:[di:'krɪpʃn]

decryption单词基本解析:

n.解密,译码,密电码回译
n. 译码(解释编码的数据)
n.解密,译码,密电码回译;

decryption变化用词:

动词:decrypt;

decryption英英释义:

Noun

1. the activity of making clear or converting from code into plain text;

"a secret key or password is required for decryption"

名词 decryption:

the activity of making clear or converting from code into plain text

同义词:decoding, decipherment



decryption[ di:'kripʃən ]n.the activity of making clear or converting from code into plain text

"a secret key or password is required for decryption"

同义词:decodingdecipherment

decryption中文词源:

decryption用法和例句:

Hardware encrypting resists decryption intensely, but it use inconveniently for user.

硬件加密方法有较强的抗解密性, 但用户使用不方便.

互联网

Group encryption and decryption, group signatures such as multisignature etc.

团体式加密、解密, 团体式签名如多重签名等.

互联网

Cryptography curriculum design to achieve DES encryption and decryption functions.

密码学的课程设计实现DES加密解密功能.

互联网

Law # 7 : Encrypted data is only as secure as the decryption key.

加密数据的安全程度取决于密匙的安全程度.

互联网

Symmetric encryption requires the same key for Both encryption and decryption.

传统的对称加密要求加密与解密使用同样的密钥.

互联网

This version of the implementation of the database encryption and decryption.

替换MYSQL, 替换SQLSERVER.本版本实现了数据库加密解密.

互联网

Describes symmetric and asymmetric algorithms used for encryption and decryption.

描述用于加密和解密的对称和非对称算法.

互联网

A secret key or password is required for decryption.

解密必须有密匙或者密码.

互联网

The proposed method includes two processes of encryption and decryption.

该方法包括加密和解密两个过程.

互联网

Trade passwords, product decryption keys, or programs.

交换口令, 产品解密答案, 或程序.

互联网

Explains how to do symmetric and asymmetric decryption.

解释如何执行对称和非对称解密.

互联网

Encryption and decryption can be achieved.

加密和解密是可以实现的.

互联网

DES encryption and decryption very junior.

DES加解密很初级的.

互联网

Decryption games, mobile phone tools to escape snow.

解密类游戏, 手机工具逃离雪地.

互联网

The view state validation key or decryption key in config database is invalid.

配置数据库中的视图状态验证密钥或解密密钥无效.

互联网

decryption


The decryption of the certificate's signature failed. This means it could not even be calculated as opposed to just not matching the expected result.

05证书签名解密失败。这意味着无法求得和预期匹配的反向计算结果。


After performing an decrypt or verify operation from the applet, display the resulting text in a window.

12在面板程序中执行解密或验证操作后,在窗体中显示结果文本。


Not enough memory to decrypt private key.

16没有足够的内存来解密私钥。


Software Description: About Aeda, AEDA is an encryption and decryption tool that can be used recursively on directories and subdirectories.

Aeda AEDA是一款可以被用于归纳目录和子目录的加密和解壳工具。


CAPICOM can be used to digitally sign data, sign code, verify digital signatures, envelop data for privacy, hash data, encrypt decrypt data and more.

CAPICOM可用于对数据进行数字签名、对代码签名、验证数字签名、包封保密数据、对数据进行散列处理、加密及解密数据等等。


Encryption and decryption of a cookie are performed by the same Client Access server.

Cookie的加密和解密由同一台客户端访问服务器执行。


The CSP generates the public and private key pair used for the encryption and decryption of messages.

CSP生成用于信息加密和解密的公钥和私钥对。


DVD players that have been encoded audio / video signal is encrypted and then sent to the receiving device from receiving equipment to decrypt.

DVD播放机对已编码的音频/视频信号进行加密,然后发送给接收设备,由接收设备进行解密。


IRM encrypts the downloaded files and limits the set of users and programs that are allowed to decrypt these files.

IRM会加密下载的文件,并限制允许对这些文件进行解密的用户和程序集。


The value of KEY_SOURCE is valuable data that can be used to re-create the symmetric key and decrypt data.

KEY_SOURCE值是很重要的数据,可用来重新创建对称密钥和解密数据。


The Passport logon server uses this key to encrypt and decrypt the query strings passed between sites.

Passport登录服务器使用该密钥对站点间传递的查询字符串进行加密和解密。


RSA algorithm realized the generation of public key and private key,and the function of data encryption and decryption.

RSA算法的编程实现了公开密钥、私有密钥的生成,数据加密,解密功能。


SQL Server first tries to decrypt the database master key with the service master key of the instance.

SQL Server首先尝试使用实例的服务主密钥对数据库主密钥进行解密。


Set a loophole scanning, intrusion, encryption, decryption, shell shelling and hackers operate in a variety of integrated software.

一款集漏洞扫描、入侵,加密解密,加壳脱壳等多种黑客操作于一体的软件。


First, open the symmetric key with which to decrypt the data.

下列范例是利用对称金钥为加密文字解密。


You cannot decrypt data encrypted using the certificates. Do you want to delete the certificates?

不能解密用证书加密的数据。要删除证书吗?


In order to encrypt and decrypt, you need an encryption algorithm and a key.

为了进行加密和解密,您需要加密算法和密钥。


The RXD/TXD port of host-computer is respectively linked with the TXD/RXD ports of decryption equipments, and the communication protocol defined by user is used.

主机RXD/TXD端分别与从机TXD/RXD端连接,采用自定义协议通信。


Once messages are encrypted, even if illegal members eavesdrop these data, they can not decrypt the messages as well as only get unmeaning ones.

也因为讯息被加密,即便是资料遭窃听,若不是合法成员,也无法将讯息还原,而只是一串无意义的资讯。


Indeed, the entire living world had to be perpetually engaged in frenetic decryption, as eggs hatched, seeds germinated, fungus spread and bacteria divided.

事实上,所有的生物终其一生都在不断地进行这种解码动作,诸如鸟蛋的孵化、种子的萌芽、真菌的扩散,和细菌的分裂都牵涉到这种过程。


The following functions support encryption, decryption, digital signing, and the validation of digital signatures.

以下函数支持加密、解密、数字签名以及数字签名验证。


The following key(s) are not trusted: %1 Their owner(s) will not be able to decrypt the message.

以下密钥不受信任:%1这些密钥的所有者不能解密此信件。


It does not matter that Eve also knows Bob's PK because she cannot use it to decrypt the ciphertext.

伊芙也知道鲍伯的公钥,但是没关系,因为公钥无法用来解开密文。


Symmetric encryption requires the same key for Both encryption and decryption.

传统的对称加密要求加密与解密使用同样的密钥。


However, the agent cannot decrypt the message with the public key.

但是,该代理无法用公钥解密该消息。


Because the RSA arithmetic which usually used by PGP is slow in decryption and digital signature, the efficiency of secure E-mail system is obvious descended.

但由于PGP标准经常采用的公开密钥算法RSA具有解密和数字签名速度慢的缺点,会降低安全电子邮件系统的有效荷载。


As the recipient, it searches the My certificate store for the certificate, and uses the associated private key to decrypt the message.

作为收件人,该示例在“我的证书”存储中搜索该证书,并使用关联的私钥解密邮件。


Your private key lets you decrypt any message encrypted with your public key.

你的私钥可以解开任何用你的公钥加密过的信息。


C. Use the CIPHER command-line utility to decrypt the folder and its contents.

使用CIPHER指令行公用程式对资料夹及其内容解密。


Use one of the Decrypt methods of the EnvelopedCms class to decrypt the enveloped message.

使用EnvelopedCms类的Decrypt方法为封装的邮件解密。


The study and application of asymmetric encryption systems, which use one key for encryption and another for decryption.

使用一个加密密钥和一个解密密钥的不对称加密系统的研究和应用。


Performs asymmetric encryption and decryption using the implementation of the RSA algorithm provided by the cryptographic service provider (CSP).

使用加密服务提供程序(CSP)提供的RSA算法的实现执行不对称加密和解密。


The study and application of Ciphers that use a single secret key for both encryption and decryption operations.

使用单个密钥执行加密和解密操作的密码算法研究和应用。


The method can be used for confidential data encryption and decryption, and this process for legitimate users is real-time and transparent.

使用该方法可以对机密数据进行加解密,该加解密的过程对于合法用户是实时透明的;


Performs asymmetric encryption and decryption using the Cryptographic Application Programming Interfaces (CAPI) implementation of the Advanced Encryption Standard (AES) algorithm.

使用高级加密标准(AES)算法的加密应用程序编程接口(CAPI)实现执行非对称加密和解密。


A protector is a program that controls the encryption and decryption of rights-managed files of a specific file format.

保护程序是一种可以控制对特定文件格式的权限管理文件进行加密和解密的程序。


The fake print service cannot generate the correct response because it cannot decrypt the ticket and get the session key.

假冒的打印服务无法生成正确的响应因为它无法把票解开并得到会话密钥。


Allows recipients of XML digital signatures and encrypted XML documents to determine which signing method and key values should be used for validation and decryption.

允许XML数字签名和已加密XML文档的收件人确定应将哪种签名方法和密钥值用于验证和解密。


Public-key algorithms, on the other hand, are asymmetrical, using different keys, a public key, and a secret key, for encryption and decryption.

公开钥匙算法则是不对称的,采用不同的密钥,一个公开的钥匙和一个秘密的钥匙,用于加密和解密。


Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption.

公钥加密是使用一对非对称的密钥加密或解密的技术。


The public-key system uses a pair of mathematically related sequences, one each for encryption and decryption .

公钥系统采用一对数学上相关的序列,一个用于加密,另一个用于解密。


Provide a DLL files-Reg.dll, through reuse it to achieve data encryption and decryption.

其提供了DLL文件-Reg.dll,可以通过复用它来实现数据加密与解密。


English: Failed to initialize the decryption cipher slot.

初始化解密密钥槽失败。


English: Failed to initialize the decryption context.

初始化解码的上下文失败。


This paper also illustrates the feasible algorithm for Chinese documents encryption and decryption.

利用这一技术,给出了可行的对汉字文档加解密算法,并用实例展示了这种算法。


XtraTools: Fast File Encryptor Pro - encrypt or decrypt files, contents of folders and contains a lot of additional tools.

前快速的文件的编码机加密或解码文件,文件夹内容并且包含很多另外的工具。


Highly efficient encryption and decryption routines; no loss of productivity or performance by end user.

加密和解密程序非常高效,不浪费终端用户的生产力或生产率;


Law #7: Encrypted data is only as secure as the decryption key.

加密数据的安全程度取决于密匙的安全程度。


Encrypts a file so that only the current user can decrypt the information within the file.

加密文件,只有当前用户能够解密这个文件信息.


Lock encryption software for encryption and decryption, the protection of software system procedures.

加密锁用于软件加密和解密,保护软件系统程序。


Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim’s data and demands payment for the decryption key.

勒索软件是一类用于拐骗数据的恶意程序,它是一种攻击者对受害者的数据进行加密然后再要求(受害者)支付解密密钥费的攻击。


Contains the file with DES encryption and decryption algorithms, C++ Achieve, MFC format.

包含用DES对文件进行加密、解密的算法、C++实现,MFC格式。


Encryption can be divided into symmetry cryptogram and public key cryptogram in terms of the difference between encryption key and decryption key.

单纯的采用对称密码体制或公钥密码体制在信息安全方面有诸多的不适之处,很难满足信息安全的要求。


A dedicated processor is responsible for the encryption and decryption process. As such, the risk of exposure of private key carried by a smart card is low.

卡内的一个专用处理器会负责这个加密和解密的程序,以减低外泄卡内私人密码匙的风险。


Publicly revealing an encryption key does not thereby reveal the correspongding decryption decryption.

即使获取了公开的加密钥,也不能反推出解密钥。


The disassembler can be used to analyse the code statically, to remove the obfuscations, to decrypt binaries etc.

反汇编器可以用来静态分析代码,移除陷阱,对二进制代码进行解码等。


Only the owner of the key is able to decrypt these files using the private key.

只有密钥的所有者能够使用私钥解密这些文件。


Only the relevant financial institution is able to decrypt the information.

只有相关的金融机构才可将资料解密。


Only the private key holder can unlock the symmetric key, which is then used to decrypt the message.

只有私钥持有者可以解锁对称密钥,然后使用解锁后的对称密钥解密邮件。


Only the CA's public key can decrypt the signature, verifying that the CA has authenticated the network entity that owns the Certificate.

只有证书机构(CA)的公共密钥才能解密此签名,以证实持有此证书的网络实体已经通过了CA的鉴定。


We just can hope that our antivirus software will find them before they work. Moreover, we can search more useful ways to decrypt.

只能寄希望我们的病毒侦测软件提前发现他们。同时,我们要思考更多的解密办法。


You can use the -key parameter with the ExportEdgeConfig. Ps1 and ImportEdgeConfig. Ps1 scripts to specify the 32-byte string to use for password encryption and decryption.

可以在ExportEdgeConfig.ps1和ImportEdgeConfig.ps1脚本中使用-key参数来指定用于密码加密和解密的32位字符串。


You can use the -key parameter with the ImportEdgeConfig. Ps1 and ExportEdgeConfig. Ps1 scripts to specify the 32-byte string to use for password encryption and decryption.

可以在ImportEdgeConfig.ps1和ExportEdgeConfig.ps1脚本中使用-key参数来指定用于密码加密和解密的32字节字符串。


You can decrypt the encrypted Web. Config file contents, if you want to, by running aspnet_regiis. Exe with the -pd option.

可以根据需要通过运行带有-pd选项的aspnet_regiis.exe对已加密的Web.config文件内容进行解密。


Each portion of the 3-layer key can be changed independently, but each of them is required in order to decrypt wallet-stored information.

可以独立地修改三层密钥的每一部分,但要想对钱包中存储的信息进行解密就需要用到每一部分。


The program realized the encrypt and decrypt of digital bid documents based on PKI technology and passed the test.

同时,根据电子标书的特殊性,用基于公钥基础结构的技术实现了电子标书的混合加解密实现,并通过了程序测试。


Group encryption and decryption, group signatures such as multisignature etc.

团体式加密、解密,团体式签名如多重签名等。


The RSA crypto-coprocessor achieves decryption rate of 1 143 kbps for 512-bit RSA and 600 kbps for 1 024-bit RSA in CRT mode.

在CRT模式下工作,解密的速率分别可以达到600 kbit/s和1 143 kbit/s。


When using the file system, user only need to provide the right private key, the encryption and the decryption of the files are completely transparent to user.

在使用时,只要提供正确的私钥,文件的加密解密对用户完全透明。


In symmetric cryptography systems, a single key that is used for both encryption and decryption.

在对称密码术系统中同时用于加密和解密的单个密钥。


On the basis of these measures, the thesis also optimizes the algorithmic, so that the encryption and decryption can share the hardware and the area of AES processor can be saved.

在此基础上又对高级加密标准的四个轮函数进行了算法优化,使加密和解密共享硬件资源。


One or plural encrypt image would be processed priority or synchronously to accelerate decrypt process.

在解密的时候,可以根据实际需要,优先或同时分别处理一幅或多幅加密图像,加快解密过程。


In computer security, intelligible text or signals that have meaning and that can be read or acted upon without the application of any decryption.

在计算机保安技术领域,一种可以被理解并有意义的,不需要经任何解密工作即可阅读并对它进行处理的文字或信号。


Add files you encrypt and decrypt very often to "Safe list".

增加那些你常译码和解码的档案到“安全目录”。


Processing of even large files without noticeable delay ? because encryption and decryption are done "on the fly.

处理甚至很大的文件而没有显著的延迟,因为加密和解密是动态完成的。


If all is well in that regard, the service next uses the session key to decrypt the authenticator.

如果一切正常,服务接着就用会话密钥去解验证器。


If you receive an encrypted message, you need to decrypt it before you read it.

如果你接收到了加密的信息,你在阅读它之前对其进行解密。


If your data is encrypted, it is advisable to decrypt itbefore backing it up.

如果你的数据已经加密,你最好在备份前将其解密。


If a key pair is successfully used in an encryption and decryption operation, the pair's private key must have been used for one part of the operation.

如果在加密和解密操作中成功地使用了密钥对,那么必定在操作的某个部分使用了密钥对中的私钥。


If an authenticator was included when the ciphertext was encrypted, the authenticator must be provided at decryption time.

如果对加密文本进行解密时包括验证器,则必须在解密时提供该验证器。