单词 | symmetric key |
释义 | BETA Examples ofsymmetric keyDictionary> Examples ofsymmetric key symmetric keyisn’t in the Cambridge Dictionary yet. You can help! Add a definition Encryption algorithms which use the same key for both encryption and decryption are known assymmetrickeyalgorithms. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Pseudorandom generators may also be used to constructsymmetrickeycryptosystems, where a large number of messages can be safely encrypted under the same key. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Such systems almost always usesymmetrickeycryptographic algorithms. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. One type of encryption, secret key orsymmetrickey, relies on diffusion and confusion, which is modeled well by chaos theory. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. There is a physical argument that a 128-bitsymmetrickeyis computationally secure against brute-force attack. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The recipient then decrypts the public key message to recover thesymmetrickey. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. To transmit an encrypted key to a device which possesses thesymmetrickeynecessary to decrypt that key requires roughly 256 bits as well. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Currently, key lengths of 128 bits (forsymmetrickeyalgorithms) and 1024 bits (for public-key algorithms) are common. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Since longer symmetric keys require exponentially more work to brute force search, a sufficiently longsymmetrickeymakes this line of attack impractical. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This key can then be used to encrypt subsequent communications using asymmetrickeycipher. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It then uses thesymmetrickeyto decrypt the file. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Symmetrickeyciphers (also referred to as secret key ciphers) are called such because the same key is used for both encryption and decryption. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. As thesymmetrickeyis generally short, padding is required for full security and proofs of security for padding schemes are often less than complete. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The message is encrypted using a symmetric encryption algorithm, which requires asymmetrickey. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It is clear thatsymmetrickeysystems offer the smallest key sizes for post quantum cryptography. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Eachsymmetrickeyis used only once and is also called a session key. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. If the cipher is asymmetrickeycipher, both will need a copy of the same key. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The remainder of the conversation uses a (typically faster)symmetric-keyalgorithm for encryption. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. |
随便看 |
|
英汉词典包含213609条英汉翻译词条,涵盖了常用英语单词及词组短语的翻译及用法,是英语学习的必备工具。