密鑰加密技術 的英文怎麼說

中文拼音 [yàojiāshù]
密鑰加密技術 英文
key encryption technology
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : 名詞(技能; 本領) skill; ability; trick; technique
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  1. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全及實現的關鍵隧道協議,通過對實現的分析比較,選用了安全性強大的ipsec隧道,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、管理ike協議、認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  2. This article describes the situation of information security theory and technology, and discusses the theories of ca, information encryption, and public key system

    本文介紹了目前信息安全理論和發展狀況,對ca認證理論、信息以及公共管理等方面的進行了分析和論述。
  3. Fairly good chaos map, which is of high performance and be implement easily is selected. with the introducing of appropriate perturbation aimed to change the initial conditions, we may enlarge the chaotic sequence period under finite precision in practical applications. mixed chaotic model is constructed by combining logistic sequences and m - sequences in form of exclusive - or. and we, by adding two mixed chaotic model, constructed double chaotic system to generate the key generator, which provides with excerllent cryptographic properties

    本文利用混沌,通過對混沌映射的選取,選取出了易於實現,且性能優良的混沌映射;通過初始參數的擾,使有限精度下混沌的短周期行為得以改善;通過利用混沌序列與m序列異或構成了混合混沌序列,在混合混沌序列的基礎上構造出了雙混沌系統,從而提高系統的抗破譯能力,設計出了混沌序列生成器。
  4. With the development of internet and electronic commerce, there is a high demand for information security. with the traditional encryption technology, the distribution of key still has n ' t a perfect solution. pki technology based on public key system resolves it through issuing the certificates by ca ( certification authority )

    但是在傳統的信息中,的分發一直沒有得到很好的解決,而基於公體制的pki ( publickeyinfrastructure ,即公基礎設施)通過簽證機關(即ca : certificationauthority )發布證書的方式較好地解決了這一問題。
  5. The paper mainly discussed the pki foundation technology knowledge and the concept, discussed the base knowledge and the basic principle of the modern cryptography. the article introduced and compared main algorithm characteristic, the speed, the encryption intensity of each kind of encrypt. elaborated the public key system in the pki system application : digital envelope, digital signature, as well as digital certificate definition, form and use

    論文主要論述了pki基礎的一般知識和概念;討論了現代碼學的基本知識和基本原理;對各種演算法的主要特點、速度、強度進行了簡要的介紹和比較;論述了公開體制在pki體系中的應用:數字信封、數字簽名,以及數字證書定義、格式及用途。
  6. Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme. this system include : local key management module key server module encrypt / decrypt module winsocket module and other module, this system solve the problem of security communication in distributed multipoint multimedia conferences system effectively

    混合系統主要包括以下模塊:本地管理模塊、服務器模塊、和認證模塊、網路socket模塊、其它輔助模塊等。本系統有效解決了基於voip的分散式網路多媒體會議系統中信息安全傳輸的問題。
  7. Cryptography is one of the key technologys to protect confidential information as it is transmitted from one location to another. there are two primary encryption methods in use today : symmetric - key cryptography and public - key cryptography

    是確保安全的關鍵之一,本文討論了幾種典型的演算法,包括分組、公、散列函數。
  8. Is made by formating some special tracks or sectors on the floppy disk. it provides protection at very low cost, but it can be beaten by the " bit copy " programs

    採用特別,其強度可與各種狗等比魅,能抵抗各種盤拷貝工具,有效防止盤被
  9. Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption

    是使用一對非對稱的或解
  10. In the paper, we construct the pseudorandom generator based on the hamilton array code and stream cipher after researching the theory of the hamilton array code and the technology of the encrypt. it can improve the ciphers " ability of resisting to many attacks if we use it to replace the key schedule algorithm of the ciphers

    本文在研究了hamilton陣列編碼的理論與后,構造了一個基於hamilton陣列編碼和序列碼的偽隨機產生器,這個產生器用來替代分組碼演算法的專用編排演算法,可以提高演算法的抗攻擊能力,從而實現了對稱碼兩大領域的結合。
  11. Key encryption technology

    密鑰加密技術
  12. Because of the properties of asymmetric key encryption technology, the recipient can then verify that the message was really from the sender by using the sender s public key because it is publicly available to verify the message digest for example,

    因為非對稱密鑰加密技術的特點,接收方可以使用發送方的公開(因為可以公開得到)驗證消息摘要(比如,
  13. As people enjoyed the opening and sharing of network, they were also distressed about the problem of security. this paper mainly studies the security encryption technology of networks - based e - commerce systems. it analyzes the message encryption and digital signature process of client browser, and the message decryption and validation of merchant server in a integrated e - commerce system, and it also provides an application example

    本文主要研究基於網路環境的電子商務系統安全,分析了一個完整的電子商務應用系統中客戶瀏覽器端和商家服務器端的信息、信息解、數字簽名、身份驗證,以及pki ( publickeyinfrastructure ,公開基礎設施)機制、數字證書在這個過程中的功能,並給出了一個具體的實現例子。
  14. Firstly, we discuss the general concepts of computer security and cryptology and describe the mostly used modem encryption methods and public key technologies including other typical algorithms. secondly, we put up a new combined security algorithm applied in the data transmission at network system on the base of introducing permutation code encryption ( a new type of block cipher ), and design the transmission system

    本文首先討論了數據中主要的數據方法,詳細討論了傳統方法和公開方法及其他典型方法,並介紹了一種新型的分組碼演算法?排列碼演算法,進而提出了一種應用於網路數據傳輸中的安全演算法。
  15. Public key cryptography technology sample

    >公示例
  16. This article brings forward an application of a new encryption algorithm and secret hash digital signature that aim at the insecure factors. at the base of these algorithms we can realize the secure credit card system, which can accelerate the development of credit card. in this paper we firstly discuss the general concepts of applied cryptography, and then introduce the mostly used modern encryption methods and technologies

    本文首先介紹了應用碼學的基本概念,然後介紹了目前常用的,認真分析了對稱方法、公開方法等的優缺點,提出了一種新型的分組方法? ?排列碼演算法以及基於該演算法的保散列數字簽名演算法,並將其應用於信用卡系統,從而在一定程度上降低了信用卡因遺失、被盜、假卡等因素造成的損失。
  17. The encryption of public - key is an effective technology to complete the information security and visit control

    是完成信息保性和訪問控制的有效
  18. Using the interaction between cellular automata, a cryptography system based on the coupled toggle cellular automata is proposed to enlarge the key space and the strength of the system

    摘要利用元胞自動機之間的相互作用,提出耦合觸發元胞自動機的,增空間和增強碼系統的強度。
  19. The proposed security and authentication protocol made use to the combination of public key and secret key to provide such ploy

    這種方法採用的認證協議同時結合了公密鑰加密技術
  20. Since human civilization, man wish to protect sensitive information. in inforl11ation era, institution and indivual more and more depend on computer system and net to store information and intercource information. pki ( public key infrastructure ), based on public key encrpytion techniques, provide comprehensive secutity service. for computer system and net

    在信息時代,機構和個人更依賴計算機系統和網路來存儲信息和交流信息,而建立在公開密鑰加密技術基礎上的公開基礎設施? pki為計算機系統和網路提供了全面的安全服務。
分享友人