解碼密鑰 的英文怎麼說
中文拼音 [jiěmǎmìyào]
解碼密鑰
英文
deciphering key-
" the apparent paradox that openness about your methods leads to better security is not unique to computer software - military and diplomatic cryptographers have known for a century that it is folly to depend on the secrecy of your encoding method rather than the secrecy of your keys, " says raymond
Raymond說: 「公開您的方法將導致更好的安全性這個明顯矛盾的觀點並非計算機軟體所獨有,軍事和外交上的解密者知道這個觀點已有一百年了:依賴編碼方法的保密性而不依賴密鑰的保密性是非常愚蠢的。 」It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key
現代密碼學認為,任何加密體系的加密和解密演算法都可以公開,其安全性在於密鑰的保密性。In public key instrument, the receiver ' s key is different from the sender ' s and it could hardly deduce the sender ' s key from the receiver ' s
在公開密鑰密碼系統中,收信方和發信方使用的密鑰互不相同,而且幾乎不可能從加密密鑰推導解密密鑰。Can t accept : it s an easily guessed word. enter new password : redrum can t accept : i read the shining, too
蠻力的密碼術攻擊為了破解一個秘密消息,需要按某種順序嘗試每一個可能的密鑰。In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc
作者所作的主要工作有: ( 1 )研究了基於大素數域上的橢圓曲線密碼在加密解密、密鑰交換、數字簽名等方面的密碼協議並分析了每種協議的安全性能; ( 2 )在現有基於身份的數字簽名方案的基礎上提出了基於身份的群簽名系統並討論了群簽名在數字現金中的應用; ( 3 )給出了橢圓曲線密碼在電子拍賣系統、密鑰認證系統方面的實現方案。The paper mainly discussed the pki foundation technology knowledge and the concept, discussed the base knowledge and the basic principle of the modern cryptography. the article introduced and compared main algorithm characteristic, the speed, the encryption intensity of each kind of encrypt. elaborated the public key system in the pki system application : digital envelope, digital signature, as well as digital certificate definition, form and use
論文主要論述了pki基礎技術的一般知識和概念;討論了現代密碼學的基本知識和基本原理;對各種加解密演算法的主要特點、速度、加密強度進行了簡要的介紹和比較;論述了公開密鑰體制在pki體系中的應用:數字信封、數字簽名,以及數字證書定義、格式及用途。His treadstone fiiles are bloated with code keys and case fiiles that he neither needed nor had clearance fior
他的treadstone文件堆里塞滿了他既不需要也無權看到的解碼密鑰和案件檔案Receivers use a combination of the sender ' s public key and their own private encryption key to unlock the secret code for that message and decipher it
接收者利用發送者的公開密鑰和他們自己的秘密密鑰的結合,解開該報文的秘密編碼,並解密之。The lack of an effective solution to the problem of secret key management inhibited the wide use of secret key cryptography in security practice. the emergence of public key cryptography solves the key management problem whereas it introduces another problem, the verification of public key authenticity
秘密密鑰密碼體制存在密鑰管理的問題,而公鑰密碼體制在有效解決密鑰管理問題的同時卻又帶來了公鑰真實性的問題。Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied
本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算法,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器里,和以idea加密演算法為基礎設計的密碼流發生器( ksg )產生的密碼序列進行加解密運算,並且研究了此加密過程的密碼同步問題。Weak keys are keys that result in ciphers that are easy to break
弱密鑰是所生成的密碼容易被破解的密鑰。Semi - weak keys are pairs of keys that result in ciphers that are easy to break
半弱密鑰是產生的密碼容易被破解的密鑰對。Also known as the vernam cipher and considered unbreakable although not easy to manage ; the key consists of a random selection of bits exactly as long as the message itself and with which it is xored
也稱為vernam密碼,它雖然難以管理卻被認為是不可破解的;密鑰由完全與消息本身等長的隨機選擇的位構成,並將它與消息進行xor運算進行加密。Every time cryptographic authentication is to be used, a password must be given in order to decode the key
每次要使用密碼認證時,必須給出一個密碼以解碼密鑰。The encryption method make the secret message into confused code, and only some one who hold the right key can access the secret information
而通常加密方法則不同,它是把消息變成了一些人類無法識別的亂碼,擁有正確密鑰的人才能解密出信息。This is a contradiction to save a gradually longer key in a limit room. we proposed a solution to combine the elliptic curve cryptosystem and digital - image - hiding, the advantage of ecc ’ s shorter key at the same security level will solve the problem in some extent, at the same time make the transfer of document secure and also cryptic
通過對現有商務文檔安全傳輸策略的研究和對比后,本文提出將橢圓曲線密碼體制與圖像隱藏結合,利用ecc在相同安全強度下密鑰長度短的特點在一定程度上解決這一矛盾,同時達到安全性和隱蔽性的結合,能在一定程度上解決第三方的攻擊。Asymmetric - key cryptography, which we will discuss in chapter 10, is based on some topics in number theory, including theories related to primes, factorization of composites into primes, modular exponentiation and logarithm, quadratic residues, and the chinese remainder theorem
我們將在第十章中討論非對稱密鑰密碼學,非對稱密鑰密碼學基於一些數論的論題,這些論題與素數、把復合數分解為素數的因數分解、模指數與模對數、二次剩餘和中國剩餘定理有關。Among the algorithmic design, the corresponding solution to the problems of transforming from the real sequence to binary sequence and precision in the chaotic stream cipher is put forward, and more efficient algorithm and better randomness of key sequence are obtained
在演算法的設計中,我們對混沌序列密碼所面臨的實數序列到二進制序列的轉化和精度等問題採取了相應的解決方法,從而獲得較高的演算法執行效率和良好的密鑰序列隨機性。You do not have to open the key immediately before decrypting the cipher text
不必只在解密密碼之前才打開密鑰。The way that use double watermark technique, and use asymmetric secret key system and a different secret key during watermark checking gives a novel idea to people : different information can be embedded into the image according to different requirement and provided for multiple utilization, because fragile watermark only require the trusted third part to extract and the user is transparent. the robust watermark required the authentication centre to extract the watermark. at the same time, the zero knowledge proof for the author id can be done by the authentication centre, which is the idea of the cryptology authentication and can solve problem of the copyright ownership more effectively
雖然本文對該模型提出的演算法並沒有具體實現,但是,在同一幅圖像中嵌入魯棒水印與易損水印的雙水印技術,以及採用的非對稱密鑰體制即在水印嵌入過程與水印檢測過程中使用了一對不同的密鑰,可為人們提供一個新的思路:由於易損水印只需通過可信任第三方提取,對用戶是「可見」的,因此可根據需要嵌入不同的信息,多方利用;魯棒水印的提取需要認證中心提取,同時可由認證中心對商家身份進行的零知識驗證,體現了密碼學的認證思想,更能解決版權糾紛的所有權問題。分享友人