解碼密鑰 的英文怎麼說

中文拼音 [jiěyào]
解碼密鑰 英文
deciphering key
  • : 解動詞(解送) send under guard
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • 解碼 : decoding; decipher; decode
  1. " the apparent paradox that openness about your methods leads to better security is not unique to computer software - military and diplomatic cryptographers have known for a century that it is folly to depend on the secrecy of your encoding method rather than the secrecy of your keys, " says raymond

    Raymond說: 「公開您的方法將導致更好的安全性這個明顯矛盾的觀點並非計算機軟體所獨有,軍事和外交上的者知道這個觀點已有一百年了:依賴編方法的保性而不依賴的保性是非常愚蠢的。 」
  2. It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key

    現代學認為,任何加體系的加演算法都可以公開,其安全性在於的保性。
  3. In public key instrument, the receiver ' s key is different from the sender ' s and it could hardly deduce the sender ' s key from the receiver ' s

    在公開系統中,收信方和發信方使用的互不相同,而且幾乎不可能從加推導
  4. Can t accept : it s an easily guessed word. enter new password : redrum can t accept : i read the shining, too

    蠻力的術攻擊為了破一個秘消息,需要按某種順序嘗試每一個可能的
  5. In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc

    作者所作的主要工作有: ( 1 )研究了基於大素數域上的橢圓曲線在加交換、數字簽名等方面的協議並分析了每種協議的安全性能; ( 2 )在現有基於身份的數字簽名方案的基礎上提出了基於身份的群簽名系統並討論了群簽名在數字現金中的應用; ( 3 )給出了橢圓曲線在電子拍賣系統、認證系統方面的實現方案。
  6. The paper mainly discussed the pki foundation technology knowledge and the concept, discussed the base knowledge and the basic principle of the modern cryptography. the article introduced and compared main algorithm characteristic, the speed, the encryption intensity of each kind of encrypt. elaborated the public key system in the pki system application : digital envelope, digital signature, as well as digital certificate definition, form and use

    論文主要論述了pki基礎技術的一般知識和概念;討論了現代學的基本知識和基本原理;對各種加演算法的主要特點、速度、加強度進行了簡要的介紹和比較;論述了公開體制在pki體系中的應用:數字信封、數字簽名,以及數字證書定義、格式及用途。
  7. His treadstone fiiles are bloated with code keys and case fiiles that he neither needed nor had clearance fior

    他的treadstone文件堆里塞滿了他既不需要也無權看到的解碼密鑰和案件檔案
  8. Receivers use a combination of the sender ' s public key and their own private encryption key to unlock the secret code for that message and decipher it

    接收者利用發送者的公開和他們自己的秘的結合,開該報文的秘,並之。
  9. The lack of an effective solution to the problem of secret key management inhibited the wide use of secret key cryptography in security practice. the emergence of public key cryptography solves the key management problem whereas it introduces another problem, the verification of public key authenticity

    體制存在管理的問題,而公體制在有效管理問題的同時卻又帶來了公真實性的問題。
  10. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加機制的研究,首先介紹了數字集群通信系統的安全保機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加過程及其的選用和管理,特別介紹了端到端加;然後介紹了幾種常用的加演算法,通過分析其優劣,提出了端到端加決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加方案的設計,其具體過程為將經過數字信號送入加器里,和以idea加演算法為基礎設計的流發生器( ksg )產生的序列進行加運算,並且研究了此加過程的同步問題。
  11. Weak keys are keys that result in ciphers that are easy to break

    是所生成的容易被破
  12. Semi - weak keys are pairs of keys that result in ciphers that are easy to break

    半弱是產生的容易被破對。
  13. Also known as the vernam cipher and considered unbreakable although not easy to manage ; the key consists of a random selection of bits exactly as long as the message itself and with which it is xored

    也稱為vernam,它雖然難以管理卻被認為是不可破的;由完全與消息本身等長的隨機選擇的位構成,並將它與消息進行xor運算進行加
  14. Every time cryptographic authentication is to be used, a password must be given in order to decode the key

    每次要使用認證時,必須給出一個解碼密鑰
  15. The encryption method make the secret message into confused code, and only some one who hold the right key can access the secret information

    而通常加方法則不同,它是把消息變成了一些人類無法識別的亂,擁有正確的人才能出信息。
  16. This is a contradiction to save a gradually longer key in a limit room. we proposed a solution to combine the elliptic curve cryptosystem and digital - image - hiding, the advantage of ecc ’ s shorter key at the same security level will solve the problem in some extent, at the same time make the transfer of document secure and also cryptic

    通過對現有商務文檔安全傳輸策略的研究和對比后,本文提出將橢圓曲線體制與圖像隱藏結合,利用ecc在相同安全強度下長度短的特點在一定程度上決這一矛盾,同時達到安全性和隱蔽性的結合,能在一定程度上決第三方的攻擊。
  17. Asymmetric - key cryptography, which we will discuss in chapter 10, is based on some topics in number theory, including theories related to primes, factorization of composites into primes, modular exponentiation and logarithm, quadratic residues, and the chinese remainder theorem

    我們將在第十章中討論非對稱學,非對稱學基於一些數論的論題,這些論題與素數、把復合數分為素數的因數分、模指數與模對數、二次剩餘和中國剩餘定理有關。
  18. Among the algorithmic design, the corresponding solution to the problems of transforming from the real sequence to binary sequence and precision in the chaotic stream cipher is put forward, and more efficient algorithm and better randomness of key sequence are obtained

    在演算法的設計中,我們對混沌序列所面臨的實數序列到二進制序列的轉化和精度等問題採取了相應的決方法,從而獲得較高的演算法執行效率和良好的序列隨機性。
  19. You do not have to open the key immediately before decrypting the cipher text

    不必只在之前才打開
  20. The way that use double watermark technique, and use asymmetric secret key system and a different secret key during watermark checking gives a novel idea to people : different information can be embedded into the image according to different requirement and provided for multiple utilization, because fragile watermark only require the trusted third part to extract and the user is transparent. the robust watermark required the authentication centre to extract the watermark. at the same time, the zero knowledge proof for the author id can be done by the authentication centre, which is the idea of the cryptology authentication and can solve problem of the copyright ownership more effectively

    雖然本文對該模型提出的演算法並沒有具體實現,但是,在同一幅圖像中嵌入魯棒水印與易損水印的雙水印技術,以及採用的非對稱體制即在水印嵌入過程與水印檢測過程中使用了一對不同的,可為人們提供一個新的思路:由於易損水印只需通過可信任第三方提取,對用戶是「可見」的,因此可根據需要嵌入不同的信息,多方利用;魯棒水印的提取需要認證中心提取,同時可由認證中心對商家身份進行的零知識驗證,體現了學的認證思想,更能決版權糾紛的所有權問題。
分享友人