1·With it, you can store session information in a database or implement a handler for encrypting and decrypting all of your data.
使用它,您可以将会话信息存储在数据库中,或者实现一个用于加密和解密你的所有数据的处理器。
2·New built-in functions provide methods for encrypting and decrypting data.
新的内置函数提供了加密和解密数据的方法。
3·An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.
非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
4·The callback in Listing 2 is designed to support both signing and decrypting using the same private-public key pair, so it checks for both cases and returns the same password in either case.
清单2中的回调旨在支持使用同一个公开-私有密匙对进行签名和解密,因此将在两种情况下进行检查并对任意一种情况返回相同的密码。
5·They are working with Roland, a hacker and identity thief who will assist them in finding and decrypting Scylla.
一个叫罗兰德的加入了他们,一个黑客和窃取信息的小偷,他将协助他们来找到并解密“锡拉”。