cipher key 中文意思是什麼

cipher key 解釋
暗號索引[密碼釋譯本]。

  • cipher : n 1 零〈即0〉。2 數碼,阿拉伯數字。3 暗號,暗碼,密碼;密碼索引 (=cipher key)。4 (姓名首字母...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. Class use a chaining mode called cipher block chaining, which requires a key and an initialization vector to perform cryptographic transformations on data

    類派生的類使用一種稱為密碼塊鏈接( cbc )的鏈接模式,該鏈接模式需要密鑰和初始化向量才能執行數據的加密轉換。
  2. The block cipher classes provided in the base class library use a chaining mode called cipher block chaining, which uses a key and an initialization vector to perform cryptographic transformations on data

    基類庫中提供的塊密碼類使用稱作密碼塊鏈( cbc )的鏈模式,它使用一個密鑰和一個初始化向量( iv )對數據執行加密轉換。
  3. The round keys are derived from the cipher key by means of the key schedule

    該域可能只包含一小部分與該用戶初始登錄相關的
  4. Authority procedure in dedicate mode checks the ms ' s validity, and if it is valid, a safe cipher key for the use of channel encrypting is given

    專用模式下的鑒權過程用於網路檢查ms提供的識別是否真實,並給ms一個安全的密鑰。
  5. These appliances, available from companies such as decru, neoscale, and vormetric, implement very fast encryption - they typically claim to operate at or close to " wire speed. " they also usually include sophisticated key management facilities for controlling the creation and distribution of cipher keys, cycling of keys, and disposition of keys, besides handling general data encryption

    Decru 、 neoscale和vormetric等公司都能提供這些器件,它們實現了非常快的加密通常被聲稱速度達到或接近「線速」 。它們還常常包括高級的密鑰管理設施,除了用於處理一般的數據加密外,還可用於控制密鑰的創建和分發、密鑰的循環和密鑰的銷毀。
  6. You can choose different encipher algorithms according to requirement. aes is a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192and 256 bits. because the length of block and key has been expanded, security has been enhanced

    Aes ( advancedencryptionstandard )是fip ( federalinformationprocessingstandardspublication )在2001年6月發布的草案,它是分組加密演算法,消息分組為128bit ,有三種密鑰長度128bit 、 192bit 、 256bit ,由於分組長度和密鑰長度加長使得安全性大大的提高,它有望成為21世紀的加密標準。
  7. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  8. At last this module is synthesized using 6s06dpdm technology library. 3, the algorithm used in key module to the performance of data security is thoroughly analyzed. considering both performance of enciphering and degree of complexity of realization, steam cipher algorithm is used

    3 、對數據通信安全性起決定作用的加密模塊所採用的加密演算法進行了深入的分析,綜合加密性能和實現的復雜度的考慮,採用了流密碼的加密演算法。
  9. The first kind of algorithm is based on s - box controlled by key, the algorithm distinguishes most of other block ciphers, its visible quality is that its s - box is not regular and fixative, but controlled by block cipher ' s key. the second kind of algorithm is based on smn ( d ) array code, it makes full use of the visible quality of smn ( d ) array code possessing big code distance ( d ). the thesis discusses the two algorithms " reversibility, security and their qualities, the

    第一種是基於「 s -盒由密鑰控制」的變結構分組密碼,該演算法區別于其它大部分分組密碼最大的特點是它的s -盒不是固定不變的而是由密鑰控制產生;第二種是基於smn ( d )陣列編碼的變結構分組密碼,該演算法充分利用了smn ( d )陣列編碼具有碼距大的特點;文中對這兩個演算法的可逆性、安全性及其性能等進行了探討和分析,分析結果認為這兩個變結構演算法正確、有效且安全。
  10. This upgrade adds support for the aes advanced encryption standard symmetric key cipher to those accessible from

    這次的升級添加了對aes ( advanced encryption standard )對稱密鑰加密演算法的支持,可以通過
  11. To get the same security against birthday attacks as you d want against brute - force attacks, given a symmetric cipher with key length

    如果希望針對生日攻擊獲得和針對蠻力攻擊一樣的安全性,給定一個密鑰長度為
  12. The key management server of key management subsystem assumes the core function of key management. it offers the retraction and filing etc. the server cipher machine ensures the safety generation and safety issuing of the keys

    密鑰管理子系統中的密鑰管理服務器承擔了密鑰管理的核心功能,同時提供了撤消、歸檔等功能,服務器密碼機保證了用戶密鑰的安全產生和安全分發。
  13. Encrypt. aes - also known as the rijndael usually pronounced something like " rhine doll " algorithm, after its developers joan daemen and vincent rijmen - is rapidly becoming the most popular symmetric key cipher used to develop new applications

    . aes來訪問,該演算法也稱rijndael (其發音常常類似於" rhine doll " )演算法,以它的開發者joan daemen和vincent rijmen命名,它正迅速成為用於開發新應用程序的最流行的對稱密鑰加密演算法。
  14. The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient

    數字包裝器最被認可的形式是數字信封,這些代碼主要完成電子郵件的加密,把想打開信封而沒有正確數字密鑰的入侵者擋在外面,數字信封主要由通過密碼加密或軟體演算法加密的代碼組成,運載著能正確讓接收方識別發送方身份的數字簽名。
  15. If the key expansion is done beforehand, the cipher can be specified in terms of the expanded key

    就是這樣。那些沒有明確允許的就是被禁止的。沒有灰色區域。
  16. One way to compromise data encrypted with this type of cipher is to perform an exhaustive search of every possible key

    可以危及用此類型密碼加密的數據的一個方法是,對每個可能的密鑰執行窮舉搜索。
  17. The first key technique : using plain - text cipher and md5 message - digest algorithm to ensure stb and dhcp server ' s certificate and secure the stb and server ' s communications - the second key technique : using hmac algorithm to realize the safe functions - the third key technique : using ipsec to realize safe functions o those three methods " complexity increases in turn and the degree of the security increases as well which depend on the frame of the methods and the complexity of the algorithm. all theose three methods use the unique serial - number or a special slip - window to defend replay attack

    主要採用三種安全方案實現:第一種:利用約定的明文密碼驗證機頂盒與dhcp服務器的合法身份, md5驗證信息合法性:第二種:利用hmac演算法驗證機頂盒與服務器身份,信息合法性;第三種:利用ipsec驗證機頂盒與dhcp服務器身份與信息合法性。每一種方案中皆採用包序號唯一法或者滑動窗口法保證重放攻擊。此三種方案復雜度依次增加,安全度依次升高,主要取決于演算法的復雜度與架構的搭建。
  18. The paper discusses the development of web, browser / server mode conception and the content and mechanism of network security based on web, and also describes the basic conception and system of cipher theory, symmetric - based data encryption standard and advanced encryption standard and asymmetric - based rsa. it presents a detailed design of secrecy net of digital government, and advances a des - and - rsa - based security model of information exchange, which makes use of symmetric cryptographic algorithm to encrypt plaintext, and introduces public - key algorithm rsa to encrypt session key to compose digital envelope and to realize digital signature

    本文論述了web的發展及其browser / server模式概念,以及基於web的網路安全的內容與機制;闡述了密碼學的基本概念、分類,對稱密鑰密碼體制des與aes以及公開密鑰密碼體制rsa ;最後,利用一種基於des和rsa的信息交換安全模型,詳細地給出了一個數字政府的保密網系統設計方案。
  19. Given that a specific cipher has no major design flaws, key length is the primary determinant of security

    如果某個加密演算法沒有大的設計缺陷,那麼密鑰長度就是安全性的決定因素。
  20. They wanted to issue a series of strong security cipher standards, including not only block cipher, but also stream cipher, hash function, message authentication code, digital signature, public key cipher and so on

    緊接著, 2001年1月,歐洲啟動了規模更大的nessie工程,希望推出一套不僅包括分組密碼,還包括流密碼、 hash函數、消息認證碼、數字簽名和公鑰加密等在內的強安全性的密碼標準。
分享友人