弱密鑰 的英文怎麼說

中文拼音 [ruòyào]
弱密鑰 英文
weak key
  • : Ⅰ形容詞1 (氣力小; 勢力差) weak; feeble 2 (年幼) young 3 (差; 不如) inferior 4 (接在分數或...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  1. The traditional means, such as key, password, cryptogram, id card and even ic card, have fallen behind the needs of economic activity and social security. this is because that they would be forgeable, falsifiable, stolen or decodable

    傳統的個人身份鑒別手段如匙、口令、碼、身份證件,甚至ic卡等識別方式,由於它們具有可假冒、可偽造、可盜用、可破譯的點,已不能完全滿足現代社會經濟活動和社會安全防範的需要。
  2. It investigates the authentication mechanism on diffie - hellman ( dh ), which is why the ike protocol can " t avoid meeting denial - of - service attacks. the weak key confirmation and its key protocol are investigated

    最後,本文探討了弱密鑰認證方式( weakkeyconfirmation )以及基於這種認證方式構造的一種協商協議。
  3. To promote application interoperability, the candidate specifies a set of signature algorithms that are required to be implemented, though their use is at the discretion of the signature creator

    結果證實,演算法是異或跟一個常量的簡單組合,並且還在猜謎雜志中發現了比那還要脆的替代碼。
  4. Weak keys are keys that result in ciphers that are easy to break

    弱密鑰是所生成的碼容易被破解的
  5. Semi - weak keys are pairs of keys that result in ciphers that are easy to break

    弱密鑰是產生的碼容易被破解的對。
  6. While inserting the semi - fragile mark, the key is also robustly embedded into the host

    在水印數據半脆地嵌入載體信息的同時,也被穩健地隱藏在載體信息中。
  7. The performance can be improved by choosing a weaker key

    通過選擇較可以改進性能。
  8. One of the key techniques is the detection of near infrared ( 1310nm and 1550nm ). because the quantum key is transmitted by one photon, and 1310nm and 1550nm infrared are the lost loss wavelength in fiber. we can detect the visible light now, but it is difficult to detect the near infrared because of its low energy

    量子通信的關鍵技術之一就是紅外( 1310nm 、 1550nm )單光子探測,這是因為光量子傳輸是採用單個光子來實現的, 1 . 3微米和1 . 5微米是現在所使用的光纖通信中損耗最小的波長,現有成熟的單光子探測器工作波長都是在可見光波段,而紅外光子因為能量小,信號非常微,極易被噪聲淹沒,因而非常難探測到。
  9. The secret key to test for semi - weakness

    要進行半漏洞測試的機
  10. Of course, you could try to guess the key with a brute force attack, but unless there is an unknown weakness in the cipher algorithm, it is not achievable in our lifetime

    當然,您會猜想該將面臨暴力破解,但是除非加演算法中有未知的點,這輩子也不會被攻破。
  11. This method will never return a weak key see

    此方法決不返回弱密鑰(請參見
  12. An attempt was made to set a weak key see

    試圖設置弱密鑰(請參見
  13. Attempting to set a weak key results in a

    嘗試設置弱密鑰將導致
  14. Is called to create a random key, a weak key will never be returned

    創建隨機時,絕不會返回弱密鑰
  15. Is called to create a random key, a semi - weak key will never be returned

    創建隨機時,絕不會返回半弱密鑰
  16. Or a semi - weak key see

    )或半弱密鑰(請參見
  17. Algorithm ; this method checks for those semi - weak keys. attempting to set a semi - weak key results in a

    )演算法有六個已知的半弱密鑰對;此方法檢查那些半弱密鑰
  18. Determines whether the specified key is weak

    確定指定的是否為弱密鑰
  19. If the key is semi - weak ; otherwise,

    如果該為半弱密鑰,則為
  20. If the key is weak ; otherwise,

    如果該弱密鑰,則為
分享友人