网站首页  词典首页

请输入您要查询的词汇:

 

词汇 example_english_encryption-key
释义

encryption key

collocation in English

meanings of encryptionand key


These words are often used together. Click on the links below to explore the meanings. Or, see other collocations with key.
encryption
noun[U]
uk /ɪnˈkrip.ʃən/ us /ɪnˈkrip.ʃən/
the process of changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use without ...
See more at encryption
key
noun[C]
uk /kiː/ us /kiː/
a piece of metal that has been cut into a special shape and is used for opening or closing a lock, starting a car ...
See more at key


Examples of encryption key


These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
The password allows the individual to access the information, but the encryptionkey is never seen.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
What is described in the first limb seems to be an encryptionkey.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
It is generated by the encryptionkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The encryptionkey is based on this password.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
However, the hackers have no control of the encryptionkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
If the person refuses to hand over the encryptionkey, there is a maximum two-year sentence.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
The length and strength of the encryptionkey is also an important consideration.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Signature is designed so that the encryptionkey is stored randomly in the flash memory.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Once they have obtained that encryptionkey, they can decrypt encrypted data at rest.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
An encryptionkey may not be exported and used to decrypt the ciphertext which is encrypted.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Passphrases are particularly applicable to systems that use the passphrase as an encryptionkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The encryptionkey (public key) need not be kept secret and can be published.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
This often involves the use of an encryptionkey as well.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
No one can be required to deposit any encryptionkey—that protects the confidentiality of their information—with a third party.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
What will happen to all those innocent business men and women who have encrypted material with an encryptionkey involving letters and figures, but who cannot remember it?
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
He had been required, under this act, to provide his 50-character encryptionkey but had not complied.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
For technical reasons, an encryption scheme usually uses a pseudo-random encryptionkey generated by an algorithm.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The hidden volume has its own separate file system, password, and encryptionkey distinct from the container volume.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
When a secret encryptionkey is pseudorandomly generated, having the seed will allow one to obtain the key.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
If an encryptionkey is lost, a backup or key escrow should be utilized to continue viewing encrypted content.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In such a cryptosystem, the encryptionkey is public and differs from the decryption key which is kept secret.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
This allows the sender to have plausible deniability if compelled to give up his or her encryptionkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Clause 49 makes it an offence punishable by two years' imprisonment to fail to comply with a notice that requires the production of a key to coded information—an encryptionkey.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition of encryption
Go to the definition of key
See other collocations with key
随便看

 

反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。

 

Copyright © 2005-2024 fscai.com All Rights Reserved 更新时间:2024/12/22 21:11:06