网站首页  词典首页

请输入您要查询的英文单词:

 

单词 symmetric key
释义
BETA

Examples ofsymmetric key

Dictionary> Examples ofsymmetric key
symmetric keyisn’t in the Cambridge Dictionary yet. You can help!
Add a definition
Encryption algorithms which use the same key for both encryption and decryption are known assymmetrickeyalgorithms.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Pseudorandom generators may also be used to constructsymmetrickeycryptosystems, where a large number of messages can be safely encrypted under the same key.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Such systems almost always usesymmetrickeycryptographic algorithms.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
One type of encryption, secret key orsymmetrickey, relies on diffusion and confusion, which is modeled well by chaos theory.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
There is a physical argument that a 128-bitsymmetrickeyis computationally secure against brute-force attack.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
The recipient then decrypts the public key message to recover thesymmetrickey.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
To transmit an encrypted key to a device which possesses thesymmetrickeynecessary to decrypt that key requires roughly 256 bits as well.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Currently, key lengths of 128 bits (forsymmetrickeyalgorithms) and 1024 bits (for public-key algorithms) are common.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Since longer symmetric keys require exponentially more work to brute force search, a sufficiently longsymmetrickeymakes this line of attack impractical.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
This key can then be used to encrypt subsequent communications using asymmetrickeycipher.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
It then uses thesymmetrickeyto decrypt the file.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Symmetrickeyciphers (also referred to as secret key ciphers) are called such because the same key is used for both encryption and decryption.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
As thesymmetrickeyis generally short, padding is required for full security and proofs of security for padding schemes are often less than complete.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
The message is encrypted using a symmetric encryption algorithm, which requires asymmetrickey.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
It is clear thatsymmetrickeysystems offer the smallest key sizes for post quantum cryptography.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Eachsymmetrickeyis used only once and is also called a session key.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
If the cipher is asymmetrickeycipher, both will need a copy of the same key.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
The remainder of the conversation uses a (typically faster)symmetric-keyalgorithm for encryption.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.

These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.

随便看

 

英汉词典包含213609条英汉翻译词条,涵盖了常用英语单词及词组短语的翻译及用法,是英语学习的必备工具。

 

Copyright © 1999-2024 qbania.com All Rights Reserved
更新时间:2024/12/28 6:00:45