消息密鑰 的英文怎麼說

中文拼音 [xiāoyào]
消息密鑰 英文
message key
  • : 動詞1 (消失) disappear; vanish 2 (使消失; 消除) eliminate; dispel; remove 3 (度過; 消遣) pa...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • 消息 : 1. (情況報道) news; information 2. (音信) tidings; news
  1. You can choose different encipher algorithms according to requirement. aes is a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192and 256 bits. because the length of block and key has been expanded, security has been enhanced

    Aes ( advancedencryptionstandard )是fip ( federalinformationprocessingstandardspublication )在2001年6月發布的草案,它是分組加演算法,分組為128bit ,有三種長度128bit 、 192bit 、 256bit ,由於分組長度和長度加長使得安全性大大的提高,它有望成為21世紀的加標準。
  2. It includes functions of tonglink / q, using rc5 encryption algorithm, md5 message digesting algorithm, diffie - hellman key exchanging algorism to implement point - to - point security

    描述了通過md5摘要演算法, rc5加演算法, diffie - hellman交換演算法,保存等方法實現點-點加的過程。
  3. Can t accept : it s an easily guessed word. enter new password : redrum can t accept : i read the shining, too

    蠻力的碼術攻擊為了破解一個秘,需要按某種順序嘗試每一個可能的
  4. Then it discusses hmac algorithm and generation of message authentication keys

    研究鑒別碼的hmac演算法和鑒別碼的產生。
  5. The authors noted that stream ciphers like rc4 are vulnerable if two messages are encrypted with the same iv and secret key

    作者指出:如果用相同的iv和秘兩條,那麼流碼(如rc4 )容易受到攻擊。
  6. A hash - based message authentication code hmac can be used to determine whether a message sent over an insecure channel has been tampered with, provided that the sender and receiver share a secret key

    在發送方和接收方共享機的前提下,基於哈希的驗證代碼( hmac )可用於確定通過不安全通道發送的是否已被篡改。
  7. The four secure key management mechanisms, including kp ( protect key ), kd & ke ( decrypt & encrypt key ), kw ( working key ) and km ( message key ), which can protect the key " end - to - end " and ensure the key only use once

    採用了保護尤屍、雙(犬d進犬e ) 、工作kw和消息密鑰尤材等四級管理體制。該體制可以保證的端端性和一次一性。
  8. 2. a comprehensive framework is developed for the above model. those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on

    完整設計了模型的整個可實現框架:包括各組成模塊的功能、相關數據結構和編碼格式、證書管理庫和環的設計,以及具體的訪問控制流程等。
  9. As a result, most networks use a single key for 802. 11, even though an optional key identifier field specifying the index in the array of the key is present in a message

    所以,即使在數組中指定索引的可選標識欄位出現在中,大多數網路還是將單個用於802 . 11 。
  10. If randchar is non - zero, then a word will be chosen at random from the passphrase, and a punctuation character or number will be added at random, adding another 5. 5 bits of entropy to the 13 provided by each word in the phrase

    這個想法是創建一個,這個是只有發送方和接受方知道的大的隨機數。正如洗牌這個情形一樣,如果是可預測的,那麼整個系統會象一幢紙牌做的房子一樣坍塌掉。
  11. When ellie receives the message from jethro, her lotus notes client checks his signature via his digital certificate containing his public key that was published in a directory

    當ellie收到jethro發出的時,她的lotus notes客戶程序就會使用在一個目錄中發布的包含jethro的公開的數字證書檢查簽名。
  12. A subliminal channel is a covert communication channel to send a message to an authorized receiver. this channel is constructed in the output crypto - data of an applied public - key cryptosystem such as digital signature, authentication, and so on. the message can not be discovered by any unauthorized receivers

    閾下通道是指在基於公碼技術的數字簽名、認證等應用碼體制的輸出碼數據中建立起來的一種隱蔽通道,除指定的接收者外,任何其他人均不知道碼數據中是否有閾下存在。
  13. The schemes to avoid the subliminal channels are summarized and compared with each other. a conclusion is drawn that the subliminal channel introduced by the semantic randomness of the input harmless message of cryptosystem can not be completely avoided. a new scheme to generate elgamal - type signatures that are free of any subliminal channels introduced by its session key is designed

    總結了封閉閾下通道的若干方法並對各方案優缺點進行了對比分析,給出了作為系統輸入的無害的語義隨機性不可能完全封閉的結論,設計了新的對elgamal類簽名中會話進行完全封閉的方案,討論了現有封閉方案的實用性。
  14. Because the original message might be quite long, and public key algorithms to generate and verify digital signatures are resource intensive, the sender normally calculates a short version of the original message called the " digest " and digitally signs only this version

    因為原始可能相當長,而且生成和驗證數字簽名的公演算法是資源集的,所以發送方通常計算稱為「摘要」的原始的短版本並且僅對該版本進行數字形式的簽署。
  15. The public key from this certificate is used for encryption and authentication of messages exchanged with the remote service

    此證書的公用於對與遠程服務交換的進行加和身份驗證。
  16. They wanted to issue a series of strong security cipher standards, including not only block cipher, but also stream cipher, hash function, message authentication code, digital signature, public key cipher and so on

    緊接著, 2001年1月,歐洲啟動了規模更大的nessie工程,希望推出一套不僅包括分組碼,還包括流碼、 hash函數、認證碼、數字簽名和公等在內的強安全性的碼標準。
  17. Cryptography technology provides the basis for such a mechanism. symmetric cryptosystems can provide privacy service ; hash functions and message authentication codes can provide integrity service ; asymmetric cryptosystems ( public key cryptosystems ) can provide authentication service

    對稱碼技術提供了機性服務;雜湊函數和認證碼提供了完整性服務;非對稱碼技術(公碼技術)提供了身份認證服務。
  18. Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties

    傳輸層安全協議( tls )和安全套接字層協議( ssl )基於對稱碼技術、非對稱碼技術、認證碼技術、公證書和公開基礎設施技術提供了保證網路通信數據的機性、完整性和對通信各方進行認證的機制。
  19. Also known as the vernam cipher and considered unbreakable although not easy to manage ; the key consists of a random selection of bits exactly as long as the message itself and with which it is xored

    也稱為vernam碼,它雖然難以管理卻被認為是不可破解的;由完全與本身等長的隨機選擇的位構成,並將它與進行xor運算進行加
  20. The sender encrypts the message digest under her private key

    發送方用自己的私摘要。
分享友人