cryptographical 中文意思是什麼

cryptographical 解釋
密碼的
  1. It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key

    現代密碼學認為,任何加密體系的加密和解密演算法都可以公開,其安全性在於密鑰的保密性。
  2. This dissertation implements an access vpn cryptographical system and illustrates an application example. futhermore, there are more research work need to be done, include incorporating with ipsec protocol and firewall technology

    本文在對各項技術討論和改進的基礎上,採用kerberos協議、 socks協議和國內專用密碼演算法,實現了一個遠程訪問vpn密碼系統,並給出了該密碼系統的實際應用。
  3. Several authentication methods are discussed, and several vpn implementation protocols that include pptp / l2tp protocol, ipsec protocol, socks protocol and mpls protocol are discussed. to implement access vpn, this dissertation use socks protocol, kerberos protocol and domestic cryptographical algorithm

    針對遠程訪問vpn密碼系統的實現,我們採用socks協議做為vpn實現協議,使用kerberos協議來進行身份認證,使用國內專用密碼演算法來進行數據的加解密。
  4. The primary research contents are summarized as follows : 1. vpn cryptographical system is concerned with cryptographical technology, authentication technology and vpn implementation protocols. symmetrical cryptographical algorithms, non - symmetrical cryptographical algorithms and domestic cryptographical algorithms are discussed

    研究的主要內容包括以下幾個方面: 1 、 vpn密碼系統的構建涉及幾個方面的技術,包括加密技術、認證技術、實現協議等。
  5. Chapter 2 clarifies the cryptographical foundation of e - commerce system. it mainly introduces a hybrid cryptosystem using rc2 and rsa algorithm in our application and some message hash function producing message digest provided by ms ca ( microsoft certificate authority ) such as sha - 1, md4 and md5

    主要論述了系統採用的rc2和rsa相結合的混合密碼體制,另外對msca ( microsoftcertificateauthority )所提供的幾種產生消息摘要的消息散列函數如: sha - 1 、 md4 、 md5等也進行了分析。
  6. The usefulness of chaos in cryptography depends on the natural relationship between the two research areas : strong dynamical properties of chaotic systems imply strong cryptographical properties of cryptosystems, and the basic way to design cryptosystems containing good strong cryptographical properties implies quasi - chaos

    這一想法來自於混沌理論和傳統密碼學之間的自然聯系:一個強的混沌系統的動力學特性大致對應著高強度密碼系統的某些安全特徵,而具有良好混合性的傳統密碼系統又暗示著擬混沌現象。
  7. Because of the intrinsic relationship between chaotic systems and cryptosystems : strong dynamical proterties of chaotic systems imply strong cryptographical properties and strong cryptographical properties imply quasi - chaos. chaotic systems, which act as natural cryptosystems, are applied into the cryptography

    由於混沌系統和密碼學之間存在著一些自然聯系:強混沌系統的動力學特性大致對應著高強度密碼系統的某些安全特性,而具有良好混合性的傳統密碼系統又暗含著擬混沌現象,混沌系統作為一種天然的密碼系統,被引入到密碼學領域。
  8. In this paper we study the security mechanism based on ip, because ipsec protocol is a security mechanism based on cryptograph, we discussed cyptograhical algorithm firstly, then we analyze the cryptographical modes in the enviroment of ip communications

    本文對基於ip的安全機制? ? ipsec協議進行了研究, ipsec協議是基於加密機術的安全機制。本文首先研究了加密演算法,重點研究了高級加密標準( aes )演算法及其在ipsec協議中的應用,並對ip環境下的加密模式做了一定的分析。
分享友人