密鑰加密系統 的英文怎麼說

中文拼音 [yàojiātǒng]
密鑰加密系統 英文
public key encryption
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. In sna products, a key used to encipher operational keys that are to is used at a node

    網路體結構( sna )產品中,對將要在某個網點上使用的操作鍵標進行的一種鍵(也稱鍵標,也就是) 。
  2. Also we study the ecc crypto theory in the field of public crypto system, in which the ecc encrypt principle, safety, reliability, as well as the structure of ecc based on galois field is focused on

    研究了公中的橢圓曲線理論,詳細闡述了有限域上橢圓曲線的結構及其基本運算; 3
  3. The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways

    本文提出的個性化kdc代理根據用戶輸入的圖片和個性信息,自動產生基,分別運用公開進行交換,使通話各方各自產生完全相同的主,巧妙地解決了分配和同步的問題,並利用單向散列函數的性質,基於相同的演算法產生用於的一次一會話
  4. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線碼體制的優點及研究現狀;其次研究了橢圓曲線碼體制的基本理論;第三,分析了橢圓曲線碼的安全性並介紹了共享,,數字簽名等橢圓曲線碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線碼體制,包括ecdh , eces , ecdsa 。
  5. Fairly good chaos map, which is of high performance and be implement easily is selected. with the introducing of appropriate perturbation aimed to change the initial conditions, we may enlarge the chaotic sequence period under finite precision in practical applications. mixed chaotic model is constructed by combining logistic sequences and m - sequences in form of exclusive - or. and we, by adding two mixed chaotic model, constructed double chaotic system to generate the key generator, which provides with excerllent cryptographic properties

    本文利用混沌技術,通過對混沌映射的選取,選取出了易於實現,且性能優良的混沌映射;通過初始參數的擾,使有限精度下混沌的短周期行為得以改善;通過利用混沌序列與m序列異或構成了混合混沌序列,在混合混沌序列的基礎上構造出了雙混沌,從而提高的抗破譯能力,設計出了混沌序列生成器。
  6. In public key instrument, the receiver ' s key is different from the sender ' s and it could hardly deduce the sender ' s key from the receiver ' s

    在公開中,收信方和發信方使用的互不相同,而且幾乎不可能從推導解
  7. A three - tier system is used in which encrypted tickets provided by a separate server called the kerberos key distribution center, or kdc for short are exchanged between the application server and client, rather than text userid and password pairs

    Kerberos使用一種三層,在這個三層中,應用服務器與客戶機之間交換的票據(單獨由一個名為kerberos分發中心,簡稱kdc的服務器提供) ,而不是交換文本形式的用戶id -碼對。
  8. In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc

    作者所作的主要工作有: ( 1 )研究了基於大素數域上的橢圓曲線碼在交換、數字簽名等方面的碼協議並分析了每種協議的安全性能; ( 2 )在現有基於身份的數字簽名方案的基礎上提出了基於身份的群簽名並討論了群簽名在數字現金中的應用; ( 3 )給出了橢圓曲線碼在電子拍賣認證方面的實現方案。
  9. Using the high sensitivity to the initial value of the chaos system, an assistant key is imported based on conventional chaotic encryption algorithm

    這種方法基於傳混沌演算法,利用混沌對初始條件的敏感依賴性,在圖像過程中引入一個輔助,可有效抵抗已知明文攻擊。
  10. Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme. this system include : local key management module key server module encrypt / decrypt module winsocket module and other module, this system solve the problem of security communication in distributed multipoint multimedia conferences system effectively

    混合主要包括以下模塊:本地管理模塊、服務器模塊、和認證模塊、網路socket模塊、其它輔助模塊等。本有效解決了基於voip技術的分散式網路多媒體會議中信息安全傳輸的問題。
  11. After particularly researched the cryptogram algorithm of des, rsa, ecc, with which the virtue and shortcoming of performance in practice using is analysed. through which a hybrid ecryptogram system based on the des and ecc is designed, and also the flow of this cryptogram is provided. with this cryptogram, the problems of conservation of key and velocity of operation which aroses from using des, rsa algorithm singly is it resolved, and the securities of the system is improved

    然後論文在詳細研究des 、 rsa 、 ecc等演算法的前提下,分析了它們在實際應用中性能上的優缺點,進而,設計了一種基於des和ecc的混合體制,給出了演算法的實現流程,解決了單獨使用des 、 rsa演算法所帶來的保存不方便和運算速度較慢等問題,有效地提高了的安全性能。
  12. This article provides a brief description of rsa public key cryptography, an analysis and compare of all kinds of present existed modular exponentiation in rsa public key cryptography, a colligation of the fastest accelerating software algorithm - vlnw sliding window methods and hardware mapping fast montgomery modular multiplication algorithm that can improve the implementary efficiency of rsa public key cryptography for achieving the novel algorithm - mnexp algorithm

    本文簡單介紹了rsa公碼體制,分析比較rsa公碼中已有的模冪運算方法,將得到的最快軟體速演算法vlnw滑動窗口法和硬體映射最快的montgomery模乘演算法綜合,得到改進后的mnexp演算法能有效提高rsa公碼的實現效率。橢圓曲線被認為可以替代rsa演算法的一種公碼體制。
  13. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信機制的研究,首先介紹了數字集群通信的安全保機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面過程及其的選用和管理,特別介紹了端到端;然後介紹了幾種常用的演算法,通過分析其優劣,提出了端到端的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信方案的設計,其具體過程為將經過數字信號送入器里,和以idea演算法為基礎設計的碼流發生器( ksg )產生的碼序列進行運算,並且研究了此過程的碼同步問題。
  14. Universal key management system realizes its function through software encryption algorithm and key - memory issuing functions itself through master - card. sjy49 uses key management platform by hardwares. the algorithm used in the generation, diffusion, eduction and transfer of the key is approved by the state competent department. the implementation of algorithm is functioned by the encryption equipment recognized by the state competent department

    通用管理採用軟體碼演算法,存儲分發等採用母卡方式實現; sjy49銀行ic卡管理採用硬體化的管理平臺,的生成、分散、導出、傳輸等管理功能使用的演算法是經國家主管部門審定通過的演算法,演算法的實現使用經國家主管部門審定通過的硬體設備。
  15. Based on this, this thesis puts forward the randomized key exchange system based on rsa, which uses des key as session key to handle the plain text and encrypted text, and uses rsa key pair to encrypt / decrypt des key in order to keep security

    在此基礎上,給出了基於rsa的隨機交換。該採用des作為會話處理明文和文,用rsa對des進行以保證安全。
  16. Public key cryptographic systems

    公開密鑰加密系統
  17. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通信數據,該將對稱演算法3des與非對稱演算法rsa相結合對數據,用公演算法rsa和單向散列函數md5實現對文件的數字簽名,有效地實現了網路通信中的信息、數字簽名、身份認證等功能,保證了發送方所發送信息的秘性、鑒別性、完整性及不可否認性。
  18. A special form of symmetric - key encryption system was proposed by the national institute of standards and technology ( nist ) and national security agency ( nsa )

    (美國)國家標準與技術局和國家安全局提出了一種特殊形式的對稱
  19. An image encryption algorithm with parameters controlled by external keys

    外部控制參數的圖像演算法
  20. Windows 2000 supports the following scalable security technologies : kerberos v5 protocol, smart card, public key cryptography, and internet protocol security ( ipsec )

    Windows2000支持下列可升級的安全技術: kerberosv5協議、智能卡、公用密鑰加密系統和網際協議安全保護( ipsec ) 。
分享友人