1·Public-private key combination is at the heart of Public key Infrastructure (PKI), and is based on asymmetric cypher.
公钥-私钥组合是公共密钥基础设施的核心,建立在非对称密码的基础上。
2·This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
3·The Listing 6 example USES asymmetric encryption to sign all the messages providing book information.
清单6中的示例使用非对称加密技术签署所有消息,提供图书信息。
4·But to retain that advantage, America will need to harden its forward bases, invest in missile defence and submarines and counter China’s capacity in asymmetric electronic, cyber and space warfare.
不过为了保持优势,美国需强化其前沿基地,在导弹防御和潜艇方面投入资金,并对抗中国在非对称电子战、网络战以及太空战领域的能力。
5·The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding private key can decrypt the data.
传递的数据使用公钥(非对称)加密算法加密,所以只有对应私钥的持有者才能解密数据。