通行密鑰 的英文怎麼說

中文拼音 [tōnghángyào]
通行密鑰 英文
pass phrase key
  • : 通量詞(用於動作)
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • 通行 : 1. (行人、車馬等在交通線上通過) go through; pass through 2. (流通; 普遍使用) current; general
  1. In this dissertation we make a study of subliminal channels that conclude the progress, the application, the model, the construction, the stego - key, the capacity, the security, the way to realize subliminal - freeness, and so on

    本文對閾下道技術進了比較全面的總結和研究,包括閾下道的發展狀況,應用前景,閾下道的模型,構造方法,隱匿,容量,安全性以及封閉方法等。
  2. The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways

    本文提出的個性化kdc代理根據用戶輸入的圖片和個性信息,自動產生基,分別運用公開系統進交換,使話各方各自產生完全相同的主,巧妙地解決了分配和加同步的問題,並利用單向散列函數的性質,基於相同的演算法產生用於加的一次一會話
  3. The passphrase is used to generate a decryption key, which will not be persisted

    短語用於生成一個解,該不會持久化。
  4. Fairly good chaos map, which is of high performance and be implement easily is selected. with the introducing of appropriate perturbation aimed to change the initial conditions, we may enlarge the chaotic sequence period under finite precision in practical applications. mixed chaotic model is constructed by combining logistic sequences and m - sequences in form of exclusive - or. and we, by adding two mixed chaotic model, constructed double chaotic system to generate the key generator, which provides with excerllent cryptographic properties

    本文利用混沌技術,過對混沌映射的選取,選取出了易於實現,且性能優良的混沌映射;過初始參數的加擾,使有限精度下混沌的短周期為得以改善;過利用混沌序列與m序列異或構成了混合混沌序列,在混合混沌序列的基礎上構造出了雙混沌系統,從而提高系統的抗破譯能力,設計出了混沌序列生成器。
  5. The models of unconditional security from quantum channels and noisy channels are two typical methods now. two parties begin the secret - key agreement over a public channel

    目前最典型的方法是利用有擾道或量子道建立無條件安全模型,信雙方在公共道上進協商。
  6. Information - theoretically secure secret - key agreement is the key to make perfect security. the models of unconditional security from quantum channels and noisy channels are two typical methods now. once the secret - key has been agreed over a public channel, one can use the key to encrypt messages by using one time pad

    現在常的做法是信雙方使用有擾道或量子道建立無條件安全模型,然後在公開認證道上交互信息進協商,信雙方把協商之後的安全的作為雙方共享的使用一次一體制進信。
  7. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群信系統加機制的研究,首先介紹了數字集群信系統的安全保機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加過程及其的選用和管理,特別介紹了端到端加;然後介紹了幾種常用的加演算法,過分析其優劣,提出了端到端加的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群信系統加方案的設計,其具體過程為將經過數字信號送入加器里,和以idea加演算法為基礎設計的碼流發生器( ksg )產生的碼序列進加解運算,並且研究了此加過程的碼同步問題。
  8. Universal key management system realizes its function through software encryption algorithm and key - memory issuing functions itself through master - card. sjy49 uses key management platform by hardwares. the algorithm used in the generation, diffusion, eduction and transfer of the key is approved by the state competent department. the implementation of algorithm is functioned by the encryption equipment recognized by the state competent department

    管理系統採用軟體碼演算法,存儲分發等採用母卡方式實現; sjy49銀ic卡管理系統採用硬體化的管理平臺,的生成、分散、導出、傳輸等管理功能使用的演算法是經國家主管部門審定過的演算法,演算法的實現使用經國家主管部門審定過的硬體加設備。
  9. Management of internet key is a necessary condition to communicate security. the paper introduces internet key exchange protocol to provide key management. and finite state machine is use for the procedure of internet key exchange

    第六部分: hitemet的管理是用戶進安全信的必要條件,本文採用了hitemet交換協議ike ( hitemetkeyexchange ) ,本文採用有限狀態機來描述的協商過程。
  10. The security of the algorithm is analyzed from the randomness, linear complexity of the chaotic sequence and the intensity of initial key. the results show the randomness of the key sequence pass the frequency test, sequential test, poker test, autocorrelation test, runs test, etc. and the total level is better than the binary sequence generated by the prng of delphi 7. 0, logistic chaotic system and rc4, the linear complexity comes up to the expectation, the initial key has very strong intensity

    本文最後從混沌序列的隨機性、線性復雜度和初始的強度三個方面對演算法進了安全性分析,結果表明演算法產生的序列的隨機性完全過了頻數檢驗、序列檢驗、撲克檢驗、自相關檢驗和遊程檢驗等5種統計檢驗方法的檢驗,而且整體水平要好於delphi7 . 0中的偽隨機數發生器、 logistic混沌系統和rc4三種方法產生的二進制序列,線性復雜度達到了數學期望值。
  11. Finally, this thesis develops a stimulated system in vc + + 6. 0 to ensure that the 2400 - bitted long rsa key can be created and be used to encrypt / decrypt des key in comparatively short time, by developing the division, power module, power inverse and big prime algorithms using big number

    最後,本文用vc + + 6 . 0設計出一個模擬系統,過開發出大數除法,模冪,模逆,大素數生成的演算法來保證在較短時間內生成2400位長度(二進制)的rsa以及運用其對des加解處理。
  12. Koal key management system products include universal key management system ( software edition ) and sjy49 banking ic card key management system

    格爾管理系統產品包括管理系統(軟體版)和sjy49銀ic卡管理系統兩個子產品。
  13. It receives credentials coming from ipsec entity. through its policy compliance checking to verify whether these credential are trustable, so determine whether these acts were authorized and under what conditions will be permitted. this kind of function will be very useful in the procession of resolving conflicts between different ipsec entities policies. in the light of such theory, the thesis developed an ipsec policy system based on the keynote which is the realization of “ trust management ”

    過一致性檢驗機構接收ipsec提交的安全策略與ipsec自身信任的安全策略相比進一致性檢驗,從而確定了該ipsec的協商過程是否符合「信任管理「的規范,也就確定該為是否被許可以及在何種限制條件下的許可。這樣就進一步解決了安全策略沖突的問題。本文就是在此理論基礎上初步實現了一個基於keynote信任管理的ipsec策略管理系統。
  14. The quantum communication can be divided into two stages : in the first stage, the quantum communication is conducted and cryptographic key communication is finished through the quantum channel ; in the second stage, the negotiation of cryptographic key is achieved in order to measure whether any bug exists or not, and then confirms the final cryptographic key, at this time the quantum communication is accomplished

    在bb84協議中,量子信實際上由兩個階段完成:第一階段過量子道進量子信,進信;第二階段在經典道中進,主要負責的協商,探測竊聽者是否存在,然後確定最後的
  15. The concept of stego - key exchange is first presented. some conditions and a basic protocol of realizing it are first discussed. then a known - secret stego - key exchange scheme and some unknown - secret stego - key exchange schemes are designed

    首次對閾下道中的隱匿協商的概念、實現條件和基本協議進了討論,並設計了已知秘的隱匿協商方案和幾個未知秘的隱匿協商方案。
  16. The schemes to avoid the subliminal channels are summarized and compared with each other. a conclusion is drawn that the subliminal channel introduced by the semantic randomness of the input harmless message of cryptosystem can not be completely avoided. a new scheme to generate elgamal - type signatures that are free of any subliminal channels introduced by its session key is designed

    總結了封閉閾下道的若干方法並對各方案優缺點進了對比分析,給出了作為系統輸入的無害消息的語義隨機性不可能完全封閉的結論,設計了新的對elgamal類簽名中會話完全封閉的方案,討論了現有封閉方案的實用性。
  17. Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties

    傳輸層安全協議( tls )和安全套接字層協議( ssl )基於對稱碼技術、非對稱碼技術、消息認證碼技術、公證書和公開基礎設施技術提供了保證網路信數據的機性、完整性和對信各方進認證的機制。
  18. Being the first application of quantum physics, quantum key distribution ( qkd ) has been developed very fast experimentally in recent years. it would impact thoroughly the existing secure communication, especially in military affairs, e - banking and so on

    量子信在分發上的實驗已經得到巨大進展,預計很快能投入應用,在軍事、電子銀等方面將有廣泛的應用前景。
  19. In the part of voice encryption, spatiotemporal chaotic system ( ocoml model ) and lfsr are used to generate multidimensional pseudo - random sequence. this sequence has a longer period, better randomicity, passing the verification of fips 140 - 2 security requirements. using the key stream generated by it to encrypt the voice gets a better security

    在語音加方面,本文利用時空混沌系統(單向耦合映象格子模型)與線性移位寄存器產生了高維的偽隨機序列,該序列周期很長,具有更強的隨機性,過了fips140 - 2的安全性能驗證,利用其作為流對語音信號進,獲得了更高的保性。
  20. A passphrase from which to generate a symmetric key

    用於生成對稱短語。
分享友人