消息密鑰 的英文怎麼說
中文拼音 [xiāoxīmìyào]
消息密鑰
英文
message key- 消 : 動詞1 (消失) disappear; vanish 2 (使消失; 消除) eliminate; dispel; remove 3 (度過; 消遣) pa...
- 息 : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 鑰 : 鑰名詞(鑰匙) key
- 消息 : 1. (情況報道) news; information 2. (音信) tidings; news
-
You can choose different encipher algorithms according to requirement. aes is a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192and 256 bits. because the length of block and key has been expanded, security has been enhanced
Aes ( advancedencryptionstandard )是fip ( federalinformationprocessingstandardspublication )在2001年6月發布的草案,它是分組加密演算法,消息分組為128bit ,有三種密鑰長度128bit 、 192bit 、 256bit ,由於分組長度和密鑰長度加長使得安全性大大的提高,它有望成為21世紀的加密標準。It includes functions of tonglink / q, using rc5 encryption algorithm, md5 message digesting algorithm, diffie - hellman key exchanging algorism to implement point - to - point security
描述了通過md5消息摘要演算法, rc5加密演算法, diffie - hellman密鑰交換演算法,密鑰保存等方法實現點-點加密的過程。Can t accept : it s an easily guessed word. enter new password : redrum can t accept : i read the shining, too
蠻力的密碼術攻擊為了破解一個秘密消息,需要按某種順序嘗試每一個可能的密鑰。Then it discusses hmac algorithm and generation of message authentication keys
研究消息鑒別碼的hmac演算法和消息鑒別碼密鑰的產生。The authors noted that stream ciphers like rc4 are vulnerable if two messages are encrypted with the same iv and secret key
作者指出:如果用相同的iv和秘鑰加密兩條消息,那麼流密碼(如rc4 )容易受到攻擊。A hash - based message authentication code hmac can be used to determine whether a message sent over an insecure channel has been tampered with, provided that the sender and receiver share a secret key
在發送方和接收方共享機密密鑰的前提下,基於哈希的消息驗證代碼( hmac )可用於確定通過不安全通道發送的消息是否已被篡改。The four secure key management mechanisms, including kp ( protect key ), kd & ke ( decrypt & encrypt key ), kw ( working key ) and km ( message key ), which can protect the key " end - to - end " and ensure the key only use once
採用了保護密鑰尤屍、雙鑰密鑰(犬d進犬e ) 、工作密鑰kw和消息密鑰尤材等四級密鑰管理體制。該體制可以保證密鑰的端端性和一次一密性。2. a comprehensive framework is developed for the above model. those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on
完整設計了模型的整個可實現框架:包括各組成模塊的功能、相關數據結構和消息編碼格式、證書管理庫和密鑰環的設計,以及具體的訪問控制流程等。As a result, most networks use a single key for 802. 11, even though an optional key identifier field specifying the index in the array of the key is present in a message
所以,即使在密鑰數組中指定索引的可選密鑰標識欄位出現在消息中,大多數網路還是將單個密鑰用於802 . 11 。If randchar is non - zero, then a word will be chosen at random from the passphrase, and a punctuation character or number will be added at random, adding another 5. 5 bits of entropy to the 13 provided by each word in the phrase
這個想法是創建一個密鑰,這個密鑰是只有消息發送方和接受方知道的大的隨機數。正如洗牌這個情形一樣,如果密鑰是可預測的,那麼整個系統會象一幢紙牌做的房子一樣坍塌掉。When ellie receives the message from jethro, her lotus notes client checks his signature via his digital certificate containing his public key that was published in a directory
當ellie收到jethro發出的消息時,她的lotus notes客戶程序就會使用在一個目錄中發布的包含jethro的公開密鑰的數字證書檢查簽名。A subliminal channel is a covert communication channel to send a message to an authorized receiver. this channel is constructed in the output crypto - data of an applied public - key cryptosystem such as digital signature, authentication, and so on. the message can not be discovered by any unauthorized receivers
閾下通道是指在基於公鑰密碼技術的數字簽名、認證等應用密碼體制的輸出密碼數據中建立起來的一種隱蔽通道,除指定的接收者外,任何其他人均不知道密碼數據中是否有閾下消息存在。The schemes to avoid the subliminal channels are summarized and compared with each other. a conclusion is drawn that the subliminal channel introduced by the semantic randomness of the input harmless message of cryptosystem can not be completely avoided. a new scheme to generate elgamal - type signatures that are free of any subliminal channels introduced by its session key is designed
總結了封閉閾下通道的若干方法並對各方案優缺點進行了對比分析,給出了作為系統輸入的無害消息的語義隨機性不可能完全封閉的結論,設計了新的對elgamal類簽名中會話密鑰進行完全封閉的方案,討論了現有封閉方案的實用性。Because the original message might be quite long, and public key algorithms to generate and verify digital signatures are resource intensive, the sender normally calculates a short version of the original message called the " digest " and digitally signs only this version
因為原始消息可能相當長,而且生成和驗證數字簽名的公鑰演算法是資源密集的,所以發送方通常計算稱為「摘要」的原始消息的短版本並且僅對該版本進行數字形式的簽署。The public key from this certificate is used for encryption and authentication of messages exchanged with the remote service
此證書的公鑰用於對與遠程服務交換的消息進行加密和身份驗證。They wanted to issue a series of strong security cipher standards, including not only block cipher, but also stream cipher, hash function, message authentication code, digital signature, public key cipher and so on
緊接著, 2001年1月,歐洲啟動了規模更大的nessie工程,希望推出一套不僅包括分組密碼,還包括流密碼、 hash函數、消息認證碼、數字簽名和公鑰加密等在內的強安全性的密碼標準。Cryptography technology provides the basis for such a mechanism. symmetric cryptosystems can provide privacy service ; hash functions and message authentication codes can provide integrity service ; asymmetric cryptosystems ( public key cryptosystems ) can provide authentication service
對稱密鑰密碼技術提供了機密性服務;雜湊函數和消息認證碼提供了完整性服務;非對稱密鑰密碼技術(公鑰密碼技術)提供了身份認證服務。Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties
傳輸層安全協議( tls )和安全套接字層協議( ssl )基於對稱密碼技術、非對稱密碼技術、消息認證碼技術、公鑰證書和公開密鑰基礎設施技術提供了保證網路通信數據的機密性、完整性和對通信各方進行認證的機制。Also known as the vernam cipher and considered unbreakable although not easy to manage ; the key consists of a random selection of bits exactly as long as the message itself and with which it is xored
也稱為vernam密碼,它雖然難以管理卻被認為是不可破解的;密鑰由完全與消息本身等長的隨機選擇的位構成,並將它與消息進行xor運算進行加密。The sender encrypts the message digest under her private key
發送方用自己的私鑰加密消息摘要。分享友人