cryptographic key 中文意思是什麼

cryptographic key 解釋
密碼關鍵字
  • cryptographic : 關于暗號的, 用密碼寫的
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. On the whole, bb84 + quantum cryptographic key distribution project is far from a termless absolute secure one in the perspective of theory, because the efficiency is enhanced on the sacrifice of security decreased. what ' s more, some works are done to strengthen the cryptograph in the field of identity authentication and other sectors, and the enhancement of efficiency strongly supports the cryptograph

    綜合來看, bb84 +量子密鑰分配方案並不是一個理論上無條件絕對安全的方案,他在安全性能上的降低得到的代價卻是效率的極大提高,並且此方案在身份認證和其他環節上對其有所降低的安全性能作了保密加強的工作。
  2. The termless security of quantum cryptographic key protocol is based on the quantum non - clone principle and heisenberg uncertainty principle. whilst, these two characteristics mentioned above contributes greatly to solve the problems of low transmitting rate, complicated operation and forge - identity assault in the bb84 protocol

    量子密鑰協議的無條件安全性能主要建立在量子不可克隆定理和heisenberg的測不準原理兩大理論基礎上的,但也正是由於量子的這兩種特性導致在bb84協議中存在了傳輸效率低下、操作復雜、假冒身份攻擊等方面的問題。
  3. Specifies the name of the cryptographic key container

    指定加密密鑰容器的名稱。
  4. Specifies the file that contains the cryptographic key

    指定包含加密密鑰的文件。
  5. The name of the file containing the cryptographic key

    包含加密密鑰的文件的名稱。
  6. For daa to work, the secure chip, known as a trusted platform module, has a private cryptographic key embedded in it

    為了讓直接匿名認證成真,必須在一般稱為信賴平臺模組的安全晶片內,嵌上加密過的私密金鑰。
  7. When a device needs to be authenticated as secure, it generates a new cryptographic key for one session and sends it as a message signed with its private key to a third party

    當某個器材需要安全認證時,可為該狀況產生一個新的加密金鑰,然後附在訊息中,並以私密金鑰簽章,寄送給第三方。
  8. The quantum communication can be divided into two stages : in the first stage, the quantum communication is conducted and cryptographic key communication is finished through the quantum channel ; in the second stage, the negotiation of cryptographic key is achieved in order to measure whether any bug exists or not, and then confirms the final cryptographic key, at this time the quantum communication is accomplished

    在bb84協議中,量子通信實際上由兩個階段完成:第一階段通過量子通道進行量子通信,進行密鑰的通信;第二階段在經典通道中進行,主要負責密鑰的協商,探測竊聽者是否存在,然後確定最後的密鑰。
  9. Public part of a public private cryptographic key pair

    公共/私有密鑰對的公共部分。
  10. Represents an access rule for a cryptographic key

    表示加密密鑰的訪問規則。
  11. Specifies the filename containing the cryptographic key

    指定包含加密密鑰的文件名。
  12. Represents an audit rule for a cryptographic key

    表示加密密鑰的審核規則。
  13. The file name containing the cryptographic key

    包含加密密鑰的文件的名稱。
  14. Adds the cryptographic key but does not sign the assembly

    添加加密密鑰但不簽名程序集。
  15. Provides the ability to control access to a cryptographic key object without direct manipulation of an access control list

    提供無需直接操作訪問控制列表( acl )而控制對加密密鑰對象的訪問的能力。
  16. This member makes a link demand for the ecma public key, which is not a valid cryptographic key but a pseudo key

    此成員要求鏈接到ecma公鑰,此公鑰不是一個有效的加密密鑰,而是一個偽密鑰。
  17. This member also makes a link demand for the ecma public key, which is not a valid cryptographic key but a pseudo key

    此成員還發出對ecma公鑰(不是有效的加密密鑰,而是偽密鑰)的鏈接請求。
  18. This system ' s architecture is based on the advanced pki techniques and encryptions techniques, configured with indispensable hardware for security technology to form a substantial application security platform. this integrated application security platform provides the muti - platform applications systematical uniform security services, mainly including user ' s identification, confidentiality and integrity for data transmission, access control, user ' s digital sign and verification, cryptographic key management etc, to fulfill the trans - computer - type and trans - operation system control & management system, which is independent of different business applications or business procedures

    本設計方案以信息系統安全理論與系統工程學原理為基礎,在網路環境下構建了應用安全平臺,實現了一個跨硬體機型與操作系統臺的、與具體應用部署方式無關的統一的安全策略配置,實現了包括身份認證、訪問控制、數據機密性和完整性控制、應用密鑰管理服務、抗抵賴、安全審計、數據安全等安全服務。
  19. The algorithm encrypt a file by random factor by bit add xor add circular cryptographic key

    該演算法採用按位隨機碼數列+異或+循環密鑰的方式進行加密。
  20. Users can assign functional and hardware names by interacting with a device ? for instance, by pressing programming buttons on a light and switch that cause them to broadcast their addresses in succession and hence establish a control relation or by carrying the network address along with a cryptographic key between the devices to make the connection secure

    使用者可與器物互動,指定功能名稱與硬體名稱,比如按壓燈具與開關上的程式鍵,讓器物依續播送位址,藉此建立控制關系;或是讓器物攜帶彼此的網路位址與密碼金鑰,以確保通訊安全。
分享友人