decrypt
[di:'kript]
vt. 破译, 解释
例句与用法:
The mayor decry gambling in all its form.
市长谴责各式各样的赌博。
He decried her efforts (as a waste of time).
他贬低她所作的努力(认为是浪费时间).
词形变化:
名词: decryption | 动词过去式: decrypted | 动词过去分词: decrypted | 动词现在分词: decrypting | 动词第三人称单数: decrypts |
vt.
译(电文); 解(密码)
decrypt
过去式:decrypted
过去分词:decrypted
现在进行时:decrypting
词形变化:
名词: decryption | 动词过去式: decrypted | 动词过去分词: decrypted | 动词现在分词: decrypting | 动词第三人称单数: decrypts |
decrypt[di:'kript]vt.1.■破译,解译(密码电文等),解(或译、脱)(密码等)2.■解释(古文字等)
decryptdecrypt[di:ˈkript]vt.1.■解...的密码[暗号]
继承用法decryption[di:ˈkripʃən]n.1.■解密; 译码, 密电码回译
[diːˈkrɪpt]
verb
- [with obj.]make (a coded or unclear message) intelligible
解译(密码信息,不清楚的信息),解释
the computer can be used to encrypt and decrypt sensitive transmissions.
计算机可用于机密传输的加密和解密。
- a text that has been decoded
解密文
decryption
noun
语源
- 1930s: from de- (expressing reversal) + crypt as in encrypt
decrypt
■(4) the encrypt and decrypt steps of Data Encryption Standard.
(4)数据加密标准(DES)算法的加密、解密过程。
■Participate in the manufacture, importation, sale or any other act that makes available a device or system capable of decrypting or helping to decrypt an encrypted program-carrying signal.
(iii)参与制造、进口、销售或以任何其他方式提供能对载有节目的加密信号解密或帮助解密的装置或系统的行为。
■* Further encrypt the files in XXE/UUE format and then decrypt them.
*进一步加密档案xxe / uue格式,然后进行解密。
■After performing an decrypt or verify operation from the applet, display the resulting text in a window.
12在面板程序中执行解密或验证操作后,在窗体中显示结果文本。
■Not enough memory to decrypt private key.
16没有足够的内存来解密私钥。
■: DVD43 will decrypt (unlock) a movie DVD so that your copy program can read it.
: DVD43将解密 (解锁) 一部视频DVD以便你的复制程序能够读出其内容。
■CAPICOM can be used to digitally sign data, sign code, verify digital signatures, envelop data for privacy, hash data, encrypt decrypt data and more.
CAPICOM可用于对数据进行数字签名、对代码签名、验证数字签名、包封保密数据、对数据进行散列处理、加密及解密数据等等。
■DVD players that have been encoded audio / video signal is encrypted and then sent to the receiving device from receiving equipment to decrypt.
DVD播放机对已编码的音频/视频信号进行加密,然后发送给接收设备,由接收设备进行解密。
■Both the Encrypt method and the Decrypt method use the cryptographic service provider (CSP) installed on the computer and the file encryption keys of the process calling the method.
Encrypt方法和Decrypt方法都使用安装在计算机上的加密服务提供程序(CSP)和调用该方法的进程的文件加密密钥。
■IC decrypt: 51 series.
IC解密:51系列.
■IRM encrypts the downloaded files and limits the set of users and programs that are allowed to decrypt these files.
IRM会加密下载的文件,并限制允许对这些文件进行解密的用户和程序集。
■The value of KEY_SOURCE is valuable data that can be used to re-create the symmetric key and decrypt data.
KEY_SOURCE值是很重要的数据,可用来重新创建对称密钥和解密数据。
■The Passport logon server uses this key to encrypt and decrypt the query strings passed between sites.
Passport登录服务器使用该密钥对站点间传递的查询字符串进行加密和解密。
■SQL Server first tries to decrypt the database master key with the service master key of the instance.
SQL Server首先尝试使用实例的服务主密钥对数据库主密钥进行解密。
■The study and practice of the VFP's table file encrypt & decrypt algorithms
VFP表文件加解密算法的研究和实践
■Research and Implementation of a DVD Decrypt Mirror Server
一种DVD解密镜像服务器的研究与实现
■First, open the symmetric key with which to decrypt the data.
下列范例是利用对称金钥为加密文字解密。
■You cannot decrypt data encrypted using the certificates. Do you want to delete the certificates?
不能解密用证书加密的数据。要删除证书吗?
■To work well, digital envelopes require that a public key infrastructure is in place: without the correct digital key to decrypt the wrapper, an intruder can't view the message inside.
为了很好工作,数字信封需要有一个公开的密钥基础设施:没有正确的数字密钥对包装器解密,入侵者就不能看到里面的信息。
■In order to encrypt and decrypt, you need an encryption algorithm and a key.
为了进行加密和解密,您需要加密算法和密钥。
■Once messages are encrypted, even if illegal members eavesdrop these data, they can not decrypt the messages as well as only get unmeaning ones.
也因为讯息被加密,即便是资料遭窃听,若不是合法成员,也无法将讯息还原,而只是一串无意义的资讯。
■The following key(s) are not trusted: %1 Their owner(s) will not be able to decrypt the message.
以下密钥不受信任:%1这些密钥的所有者不能解密此信件。
■It does not matter that Eve also knows Bob's PK because she cannot use it to decrypt the ciphertext.
伊芙也知道鲍伯的公钥,但是没关系,因为公钥无法用来解开密文。
■However, the agent cannot decrypt the message with the public key.
但是,该代理无法用公钥解密该消息。
■As the recipient, it searches the My certificate store for the certificate, and uses the associated private key to decrypt the message.
作为收件人,该示例在“我的证书”存储中搜索该证书,并使用关联的私钥解密邮件。
■Your computer has to do extra work to decrypt all that data, and encrypted data doesn't travel across the internet as efficiently as unencrypted data," says the Gmail blog.
你的电脑也要多做不少解密的工作,并且加密过的数去在网上的传播不如没有加密的数据有效。”
■Your private key lets you decrypt any message encrypted with your public key.
你的私钥可以解开任何用你的公钥加密过的信息。
■C. Use the CIPHER command-line utility to decrypt the folder and its contents.
使用CIPHER指令行公用程式对资料夹及其内容解密。
■Use one of the Decrypt methods of the EnvelopedCms class to decrypt the enveloped message.
使用EnvelopedCms类的Decrypt方法为封装的邮件解密。
■Using the context menu you can encrypt ordecrypt files and folders by right-clicking on them in Explorer and selecting the encrypt or decrypt command.
使用你能够加密或者解密的上下文菜单由在对资源浏览器的他们上的右键点击所作的文件和文件夹和选择加密或者解密指挥。
■To decrypt data from a file or stream using data protection
使用数据保护从文件或流中解密数据
■The fake print service cannot generate the correct response because it cannot decrypt the ticket and get the session key.
假冒的打印服务无法生成正确的响应因为它无法把票解开并得到会话密钥。
■Public-key cryptographic algorithms are also known as asymmetric algorithms because one key is required to encrypt data while another is required to decrypt data.
公钥加密算法也称为不对称算法,原因是需要用一个密钥加密数据而需要用另一个密钥来解密数据。
■According to Long once again to solve the world's rich and varied fans addictive title. Games available to players each for a few hours of fun to decrypt.
再次来到依龙丰富多彩的世界去解决上瘾的迷题。游戏提供给每个玩家数小时的解密乐趣。
■Create, decrypt, delete, and open a key container; export and import a key; sign files using a key; and view and change the access control list for a key container.
创建、解密、删除、打开密钥容器;导出、导入密钥;使用密钥给文件签名;查看并更改密钥容器的访问控制列表。
■Make Use of the PHP Implementing the Data to Encrypt and Decrypt
利用PHP实现数据的加密及解密
■XtraTools: Fast File Encryptor Pro - encrypt or decrypt files, contents of folders and contains a lot of additional tools.
前快速的文件的编码机加密或解码文件,文件夹内容并且包含很多另外的工具。
■"encryption" - from the disk read and write documents, can automatically encrypt and decrypt data, and other documents.
加密"--在从磁盘读取和写入文件时,可以自动加密和解密文件数据等。
■Encrypts a file so that only the current user can decrypt the information within the file.
加密文件,只有当前用户能够解密这个文件信息.
■ALTER TABLE encrypt_tab MODIFY ( clob_data CLOB DECRYPT); ALTER TABLE encrypt_tab MODIFY ( clob_data CLOB ENCRYPT USING '3DES168'); ALTER TABLE encrypt_tab REKEY USING 'AES192';
加密是不受原来的导入导出工具或表空间传输支持的,因此必须使用数据泵导入导出工具来传输数据。
■encrypt and decrypt engine
加脱密引擎
■The disassembler can be used to analyse the code statically, to remove the obfuscations, to decrypt binaries etc.
反汇编器可以用来静态分析代码,移除陷阱,对二进制代码进行解码等。
■When you send an application-encrypted message, the receiving queue manager uses the symmetric key to decrypt the message before sending it to its destination queue.
发送应用程序加密的消息时,接收队列管理器在将消息发送到其目标队列之前,使用对称密钥解密该消息。
■Only the owner of the key is able to decrypt these files using the private key.
只有密钥的所有者能够使用私钥解密这些文件。
■Only the relevant financial institution is able to decrypt the information.
只有相关的金融机构才可将资料解密。
■Only the private key holder can unlock the symmetric key, which is then used to decrypt the message.
只有私钥持有者可以解锁对称密钥,然后使用解锁后的对称密钥解密邮件。
■Only the CA's public key can decrypt the signature, verifying that the CA has authenticated the network entity that owns the Certificate.
只有证书机构(CA)的公共密钥才能解密此签名,以证实持有此证书的网络实体已经通过了CA的鉴定。
■We just can hope that our antivirus software will find them before they work. Moreover, we can search more useful ways to decrypt.
只能寄希望我们的病毒侦测软件提前发现他们。同时,我们要思考更多的解密办法。
■You can decrypt the encrypted Web. Config file contents, if you want to, by running aspnet_regiis. Exe with the -pd option.
可以根据需要通过运行带有-pd选项的aspnet_regiis.exe对已加密的Web.config文件内容进行解密。
■Each portion of the 3-layer key can be changed independently, but each of them is required in order to decrypt wallet-stored information.
可以独立地修改三层密钥的每一部分,但要想对钱包中存储的信息进行解密就需要用到每一部分。