代用密碼 的英文怎麼說
中文拼音 [dàiyòngmìmǎ]
代用密碼
英文
substitution cipher- 代 : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
- 用 : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 碼 : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
- 代用 : substitute
-
In a word, by integrating the user " s fingerprint identification with the cryptological authentication protocol, a secure, reliable and effective approach to identifying the users in the network environment can be provided
把以指紋特徵為代表的生物識別技術與基於密碼體制的身份認證協議有機結合,向最終用戶提供一種更加安全、可靠、便捷的身份認證手段,將是成功地實現網路安全和信息系統安全的有效途徑。The traditional means, such as key, password, cryptogram, id card and even ic card, have fallen behind the needs of economic activity and social security. this is because that they would be forgeable, falsifiable, stolen or decodable
傳統的個人身份鑒別手段如鑰匙、口令、密碼、身份證件,甚至ic卡等識別方式,由於它們具有可假冒、可偽造、可盜用、可破譯的弱點,已不能完全滿足現代社會經濟活動和社會安全防範的需要。The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed
按照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密碼rijndael演算法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加密模塊,所得的結果再加入到反饋端,參與下一分組輸入的異或運算,迭代結束時的rijndael加密結果即為所求的hash函數值。Used properly - with a key of sufficient length and an encryption mode that doesn t leak information about the plaintext - most modern algorithms are reasonably safe against cryptanalytic attacks
如果使用得當使用足夠長的密鑰和不會泄漏關于明文的信息的加密方式大多數現代演算法在密碼分析攻擊面向都有一定的安全性。This is an important thing to keep in mind when using the " anonymous proxy " services available across the internet : how well can you trust them since you re sending usernames and passwords through their systems
在使用internet上的「匿名代理」時,記得這一點尤其重要:您正在通過它們的系統來發送用戶名和密碼,怎樣才能相信它們呢?How to apply modern cryptography to the copyright protection of digital contents is the focus of this dissertation, in which the traitor tracing problem of digital fingerprinting technology is researched in order that the issue of digital contents is run by natural commercial format
本文中重點研究如何將現代密碼學技術應用到數字產品的版權保護中,即數字指紋技術中的叛逆者追蹤問題,以保證數字產品的出版發行能夠按正常商業形式運作。The paper mainly discussed the pki foundation technology knowledge and the concept, discussed the base knowledge and the basic principle of the modern cryptography. the article introduced and compared main algorithm characteristic, the speed, the encryption intensity of each kind of encrypt. elaborated the public key system in the pki system application : digital envelope, digital signature, as well as digital certificate definition, form and use
論文主要論述了pki基礎技術的一般知識和概念;討論了現代密碼學的基本知識和基本原理;對各種加解密演算法的主要特點、速度、加密強度進行了簡要的介紹和比較;論述了公開密鑰體制在pki體系中的應用:數字信封、數字簽名,以及數字證書定義、格式及用途。An investigation of the rijndael algorithm which is the advanced encryption standard of usa is taken in this thesis. we have focused on developing the cryptographic properties of the rijndael sbox from the viewpoint of boolean function, walsh spectrum and algebraic structures, on the attacks against the reduced variants of rijndael, and on the optimized implementations of rijndael. the key contributions follow below
本文對美國高級加密標準rijndael演算法進行了比較深入的研究,內容包括:從布爾函數、 walsh譜和代數結構的角度對其s盒密碼性質進行的研究,簡化演算法的攻擊方法以及演算法的優化實現問題,主要成果有: 1 、提出求解布爾函數表達式的兩種新方法,具有簡潔、易於編程實現、準確而快速的特點,應用於des演算法獲得與公開文獻相符的結果,應用於rijndael演算法首次求出其s盒布爾函數表達式。In cryptography, a cipher produced by a composition of a number of substitution and transposition ciphers
密碼學中,由替代密碼和置換密碼結合使用而構成的一種密碼。In cryptography, an early example of monoalphabetic, or substitution cipher used in the gallic wars
密碼學中,在高盧戰爭中使用的一種單表置換密碼,或稱替代密碼的早期例子。The module of customer certification adds one - off password certification to the traditional sheet certification, and replaces stored password with stored digest of user password to guard against attacks and keep secrets
用戶認證模塊在傳統基於表單認證的方式上增加一次性口令認證,並且在密碼存儲時以存儲用戶密碼消息摘要替代密碼本身,從而達到防攻擊和保密的目的。The " change password program " software is designed for use by the subscribers of hongkong post e - cert in changing the password of the e - cert file that is created and saved on a floppy disk through the central key generation service
"更改電子證書檔案密碼程式"軟體為香港郵政電子核證服務登記人而設。經代制密碼匙服務產生電子證書而存入磁碟后,可以利用此軟體更改檔案密碼。You may not transfer all or any of your rights or obligations under this membership agreement to any other person, or permit any other person to use your member id or password
閣下不得將閣下在本會員協議下的所有或任何權利或義務轉讓給任何其他人士,或者容許任何其他人士使用閣下的會員代號或密碼。Returns a pseudo - random key from a password, salt and iteration count
用密碼、 salt值和迭代次數返回偽隨機密鑰。Phishing : a type of technology - based social engineering ploy in which computers users are directed, usually via e - mail, to a web site that purports to be that of a bank, loan company, credit card company, e - commerce merchant, governmental agency, or other site that requires users to enter confidential information, such as account passwords, account numbers, social security numbers, and other personal data that is collected and used for identity theft
網路釣魚:基於社會工程學的技術,通常通過電子郵件,據稱是銀行,貸款公司,信用卡公司,電子商務商,政府代理的網站,或其他要求用戶輸入機密信息的站點,諸如帳戶密碼、帳戶號、社會保險號的機密信息被收集並用於身份偷竊。Using the theories of probability, algebra and number theory comprehensively, we investigate a class of boolean functions with three - valued walsh spectrum in the first part of this dissertation : the properties of the extended semi - bent functions, which are constructed from any two bent functions, are studied, followed by the structure characteristics of the boolean functions satisfying propagation criterion with respect to all but two vectors ; the definition and cryptographic properties of k - order quasi - bent functions are proposed whose walsh spectrum takes on only three values. some sufficient and necessary conditions are offered to decide whether a boolean function is a k - order quasi - bent function ; a special method is presented to construct the k - order quasi - bent functions, whose cryptographic properties are explored by the matrix method, which is different from the method of walsh spectrum and that of autocorrelation of boolean functions ; the application of this kind of boolean functions in the fields of stream cipher, communications and block ciphers is discussed, which shows the great importance of the fc - order quasi - bent functions ; some methodology are proposed to construct the k - order quasi - bent functions, including the complete construction by using the characteristic matrices of boolean functions, and the recursive method by two known k - order quasi - bent functions we further extend our investigation to the ring zp, where p is a prime, and the similar results are presented as far as the p - valued quasi - generalized - bent functions are considered
本文首先綜合運用概率論、代數學、數論等基礎學科的理論知識,並以頻譜理論作為主要研究工具,對一類譜值分佈相對均勻的函數? ?廣半bent函數、 k階擬bent函數和p值k階擬廣義bent函數進行了系統、深入的研究,給出了廣半bent函數定義,並探討了廣半bent函數的密碼學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的定義及等價判別條件;討論了k階擬bent函數和p值k階擬廣義bent函數與部分bent函數和p值廣義部分bent函數的關系,探討了它們的密碼學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的典型構造方法,並將對k階擬bent函數的密碼性質的研究轉化到對一類特殊的矩陣的研究上;利用布爾函數的特徵矩陣原則上給出了k階擬bent函數的一種完全構造方法,還給出了從已有的p值k階擬廣義bent函數出發,遞歸構造變元個數更多的p值k階擬廣義bent函數的方法;初步探討了k階擬bent函數在序列密碼、分組密碼以及通信中的應用;給出了一類布爾函數walsh譜的分解式,並利用這類布爾函數的walsh譜分解式給出了一類近似穩定的布爾函數的構造,特殊情形下為k階擬bent函數;利用代數數論的知識考察了p值k階擬廣義bent函數的譜特徵,並給出了k階擬廣義bent函數與所有仿射函數的符合率特徵等等。Furthermore, some novel cryptography technology such as chaotic cryptography, quota cryptography are paid much attention by researchers beside conventional cryptography. in this paper, we propose a new chaotic searching simulated annealing method based on chaotic cryptography and intelligent computing to obtain cryptographically strong s - boxes
在傳統的利用代數方法設計密碼學的基礎上,一些新興的密碼學理論,如混沌密碼學、量子密碼學等等也引起了愈來愈多的學者的青睞。The customer shall be granted a user id and an initial password
並獲發用戶代號及首次使用密碼之個人或企業團體。The default is pserver, which represents the password server protocol and is used by most public repositories
預設值是pserver ,它代表密碼服務器協議,大多數公共資源庫都使用這個協議。The platform ofsecure application based on b / s structure emerges as the times require. it has three main part : security agent client ( sac ), security proxy server ( sps ) and certificate authority server ( cas ). security socket layer ( ssl ) protocol is extended between tcp / ip and http to form a security channel to make those three parts be a full and rigorous security system. in addition, many cryptography algorithms are applied in the system to protect web application
基於b s架構的應用安全平臺應運而生,它包括安全代理客戶端( sac , securityagentclient ) 、安全代理服務器( sps , securityproxyserver ) 、 ca服務器( cas , certificateauthorityserver )三個組成部分,在傳統的tcp ip協議和http協議之間通過擴展ssl ( securitysocketlayer )協議形成了一條安全通道,組成了一個完整的、嚴密的安全體系,並採用密碼學中的多種方法,保護web應用安全。分享友人