encryption system 中文意思是什麼

encryption system 解釋
編密碼系統
  • encryption : 編成密碼
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. The realization of encryption system based on ecc and aes

    相結合的加密系統的實現
  2. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰密碼體制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓曲線攻擊演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大素數域上的橢圓曲線的elgamal加解密和數字簽名。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份認證方案。
  3. In the application of pmos - 2000 system, the author carried out a hybrid encryption protocol with is suitable for information security transmission in electricity market with des, rsa and md5. with the pattern characteristics of pmos - 2000 power market operator system, and analyzed and compared with other encryption system, the author puts forward an implementing method, operational process and system structure of information encryption technology used in pmos - 2000, and the operating effects and projects which need further research and discussion were finally given. the research of this dissertation applied information security technology in power system project, which made it possible for information security transmission

    在pmos ? 2000系統的應用中,作者利用des對稱加密演算法、 rsa非對稱加密演算法、 md5數字簽名演算法實現了一套適合電力市場信息安全傳輸的混合加密體制,結合了pmos ? 2000發電市場技術支持系統的模式特點,通過與別的加密體制的分析比較,把混合加密體制應用於pmos ? 2000系統之上,並提出了這套加密系統在pmos ? 2000電力市場技術支持系統中的實現方法、運作過程和系統體系結構,最後給出了它的運行效果以及進一步可研究和探討的方案。
  4. Operation layer is the basic core part in elliptic curve encryption system including how to calculate elliptic curve ' s stairs is a large prime or including a large prime gene to ensure elliptic curve to be safe elliptic curve ; in this article safe elliptic curve is chosen by p1363 sae algorithm. besides, how to achieve fast point multiplication will influence the performance efficiency of the whole encryption system ; in this article, for different situations, signed binary method and rolling window method are respectively applied to perform quick operation of elliptic curve ' s point multiplication

    運算層是橢圓曲線密碼體制實現的最基礎、最核心的部分,包括如何來計算橢圓曲線的階為大素數或含有一個大的素因子,以保證所選取的橢圓曲線為安全橢圓曲線,本文根據ieeep1363協議的sea演算法實現了安全橢圓曲線的選取;另外如何實現標量乘的快速運算,將會影響整個密碼系統的實現效率,本文根據不同情況對橢圓曲線的標量乘法分別採用了帶符號的二進製法和滑動窗口法進行快速運算。
  5. Koal network shield desktop security sets is the only software encryption system approved by the bureau of the state cipher administration committee. it uses many advanced technologies and has several patents

    格爾網盾桌面安全套件是唯一一個獲得國家密碼管理委員會辦公室批號的軟體加密系統,它採用多種先進技術,擁有多項專利。
  6. Specifically, the contribution of this paper includes : 1. provides the full solution of database encryption on any database system. the encryption of database is performed in the way that plus the encryption system over the dbms, sensitive data is encrypted in the unit of segmen. the way of database encryption is feasible and can be used for reference

    具體地,本文的貢獻有如下幾點:提供了基於任何數據庫的加密的整套解決方案,採用的是在dbms外層增加數據庫加密系統、對敏感數據實行欄位級加密的數據庫加密方式,這種方式是目前較為可行和值得借鑒的數據庫加密方式。
  7. In order to enhance the teaching effect, we have developed the network firewall, the data encryption and the email encryption system, the network monitor and control system. the students not only may operate and configure these systems actually, also carry on the network attack and defense, and obtain the experience, grasp the information security elementary knowledge, the elementary operation and the basic config method

    為提高教學效果,開發了與信息安全實驗相關的網路攻擊、網路防火墻、數據加密及電子郵件加密、網路監控等子系統,不但可以由學生實際操作、配置進行網路攻防,使學生可以在此虛擬實驗環境中獲得相關的知識和實際動手操作的經驗,掌握信息安全基礎知識、基本操作、基本配置。
  8. Improvement on the eo encryption system in bluetooth

    加密演算法的改進
  9. The embedment of the text proclaimed in writing in elliptical public - key encryption system is studied theoretically and a general algorithm is designed

    對橢圓公鑰密碼體制中的明文嵌入進行了理論研究,設計了一個通用的演算法。
  10. Elliptic curve encryption system ' s advantages are easy produce of public key and private key, saving memory capacity and net width and processing time

    而橢圓曲線密碼體制的突出優點是方便生成公鑰、私鑰對;節省內存空間;節省帶寬;節省處理時間。
  11. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通信數據加密系統,該系統將對稱加密演算法3des與非對稱加密演算法rsa相結合對數據加密,用公鑰演算法rsa和單向散列函數md5實現對文件的數字簽名,有效地實現了網路通信系統中的信息加密、數字簽名、身份認證等功能,保證了發送方所發送信息的秘密性、鑒別性、完整性及不可否認性。
  12. Asi flow encryption system

    Asi流加解密系統
  13. A special form of symmetric - key encryption system was proposed by the national institute of standards and technology ( nist ) and national security agency ( nsa )

    (美國)國家標準與技術局和國家安全局提出了一種特殊形式的對稱鑰匙加密系統。
  14. A practical design of java encryption system

    一個實用的加密系統的設計
  15. Research and implementation of database encryption system

    密文數據庫系統應用程序介面的研究與設計
  16. The research and development of usb encryption system device driver

    介面加密存儲設備驅動程序的研究與開發
  17. Study on ferroelectric liquid crystal material parameters design for phase encryption system by circuit model

    編碼系統中材料參量設計的電路實驗研究
  18. So, we design the new encryption system in order to secure the safety of data transmission in local network

    本加密系統就是基於確保局域網內部數據傳送的安全的目的來考慮和設計的。
  19. Finally the system is realized by algorithm and the data encryption system for network communication is developed in vc + + environment

    最後對系統進行了演算法實現,通過vc + +開發了網路通信數據加密系統。
  20. And use bna logic theories to prove the completeness and validity of the improved protocol. 4 on the base of former research, a new model of user authentication system is designed based on the improved kerberos protocol and public key encryption system

    並採用ban邏輯理論證明改進協議的完備性、有效性; 4 、提出了基於改進kerberos協議和公鑰密碼體制的身份認證服務的模型,並給出模型的實際應用。
分享友人