key encryption technology 中文意思是什麼

key encryption technology 解釋
密鑰加密技術
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • encryption : 編成密碼
  • technology : n. 1. 技術,工程,工藝。2. 製造學,工藝學。3. 術語(匯編)。
  1. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密碼rijndael演算法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加密模塊,所得的結果再加入到反饋端,參與下一分組輸入的異或運算,迭代結束時的rijndael加密結果即為所求的hash函數值。
  2. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,網路及其安全服務的實現(包括嵌入式協議棧usnet的選取、底層驅動程序的設計和安全協議ipsec的分析與實施) 。
  3. This article describes the situation of information security theory and technology, and discusses the theories of ca, information encryption, and public key system

    本文介紹了目前信息安全理論和技術發展狀況,對ca認證理論、信息加密以及公共密鑰管理等方面的技術進行了分析和論述。
  4. With the development of internet and electronic commerce, there is a high demand for information security. with the traditional encryption technology, the distribution of key still has n ' t a perfect solution. pki technology based on public key system resolves it through issuing the certificates by ca ( certification authority )

    但是在傳統的信息加密技術中,密鑰的分發一直沒有得到很好的解決,而基於公鑰體制的pki ( publickeyinfrastructure ,即公鑰基礎設施)技術通過簽證機關(即ca : certificationauthority )發布證書的方式較好地解決了這一問題。
  5. The paper mainly discussed the pki foundation technology knowledge and the concept, discussed the base knowledge and the basic principle of the modern cryptography. the article introduced and compared main algorithm characteristic, the speed, the encryption intensity of each kind of encrypt. elaborated the public key system in the pki system application : digital envelope, digital signature, as well as digital certificate definition, form and use

    論文主要論述了pki基礎技術的一般知識和概念;討論了現代密碼學的基本知識和基本原理;對各種加解密演算法的主要特點、速度、加密強度進行了簡要的介紹和比較;論述了公開密鑰體制在pki體系中的應用:數字信封、數字簽名,以及數字證書定義、格式及用途。
  6. In the electronic filing process, the return information will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key

    報稅表資料在傳送到稅務局前,系統會使用強化加密技術128 - bit secure socket layer ssl ,以「對稱密碼匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密碼匙」將資料作站對站式加密。
  7. In the return filing process, the return data will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key so that data confidentiality can be preserved

    系統會使用強化加密技術128 - bit secure socket layer ssl ,以「對稱密碼匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密碼匙」將資料作站對站式加密,以達保密效果。
  8. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。
  9. With these foundation, the paper puts forward several solution schemas of key technologies in mois, such as 3 - tiers system architecture optimization, binary file compression & encryption, tree relationship data process, active notice delivery mechanism and network environment adaptability, and makes some ex ploring research about intelligent software agent and text mining technology

    在此基礎上,給出了若干mois關鍵技術的解決方案,包括三層體系結構優化方案、二進制格式文件壓縮加密方案,層次化關系數據的處理技術、主動式通知傳遞機制和網路環境適應性方案等,並對智能軟體代理和文本挖掘技術作了探索性研究。
  10. Encryption arithmetic and key technology in database encryption

    加密演算法及其實現
  11. The key technologies, in my research, include how to organize and implement " multi - layered " structures, how to achieve " work flow " in " office automatization ", how to implement the technology on the information communion, encryption and protection, the technology on business guidance and audit, and the technology on the information protection and sharing

    「 oracle分散式數據庫遠程數據的維護和安全性的研究」要解決的關鍵技術有多層次架構的實現與如何組織、工作流技術在辦公自動化中如何實現、信息加密與保護技術的實現、業務監控與審計技術、信息保護和共享技術等地實現是解決這一問題的基本要素。
  12. Section 2 studies the database access management technology based on microsoft sql server 2000 which is the nuclear technology of database management module in data synchronization system sever, and emphisizes on ole db database access technology. section 3 introduces two kinds of block cipher algorithm used in data synchronization system. : gost algorithm and rijndael algorithm, meanwhile offers interfaces in which encryption algorithm can be userdefined. this is the necleus of encryption module in data synchronization system server and client. section 4 studies network transmission management technology. this section mainly explores programming model and the network interface technology using completion ports to develop server which is the key technology of network transmission management module in data synchronized system server and client. section 5 introdues the brief using approach in data synchronized system server and client as well as some improvement suggestion

    第二部分研究了基於microsoftsolserver2000的數據庫訪問管理技術,著重介紹oledb數據庫訪問技術。它是數據同步系統服務器端數據庫管理模塊的核心技術。第三部分介紹了數據同步系統中利用的兩種分組密碼演算法: gost演算法和rijndael演算法,同時給出了一個用戶可以自定義加密演算法的介面。
  13. This paper first introduce the new technology bluetooth, then discuss the security of bluetooth at link layer including the management of link key ( classify 、 generate and transfer ) 、 pairing 、 authentication and encryption. at last discuss the security hole in bluetooth such as initialization key 、 unit key 、 authentication and bluetooth device address and the methods to solve the problem

    文中首先簡要介紹了藍牙這一新技術;接著討論了藍牙鏈路層的安全問題,包括鏈路字的管理(分類、生成及傳遞) 、配對過程、鑒權過程和加密過程。
  14. The encryption technology is the key to assuring information safety

    密碼技術是保證信息安全的核心。
  15. Key encryption technology

    密鑰加密技術
  16. Because of the properties of asymmetric key encryption technology, the recipient can then verify that the message was really from the sender by using the sender s public key because it is publicly available to verify the message digest for example,

    因為非對稱密鑰加密技術的特點,接收方可以使用發送方的公開密鑰(因為可以公開得到)驗證消息摘要(比如,
  17. A special form of symmetric - key encryption system was proposed by the national institute of standards and technology ( nist ) and national security agency ( nsa )

    (美國)國家標準與技術局和國家安全局提出了一種特殊形式的對稱鑰匙加密系統。
  18. Finally, we analyzed the security of this system completely which can be used to provide service involving confidentiality, integrality, certificate - based identity authentication and digital signature, etc. this system is consisted of two sub - systems : center of certificate mangement and client based military email transferring component, proposing two methods namely " two - level encryption " and " certification carrying " to ensure the confidentiality of system as well as identity authentication and key distribution with offline method. it uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no - denying of email tranfer, which forms a complete military email transferring system

    該系統包括證書管理中心和用戶端軍用電子郵件傳輸組件兩個子系統,提出了「兩級加密」和「證書攜帶」兩種方式,以確保系統的機密性及離線方式下的身份認證、密鑰分發,利用雜湊函數實現郵件傳輸的完整性,採用數字簽名技術實現了郵件傳輸的不可否認性,形成了一個完整的軍用電子郵件傳輸系統。
  19. Based on the technology of ssl and public key encryption, we put forward and implement the secure web server which is based on pki infrastructure

    在ssl和公鑰密碼技術的基礎上,我們提出並實現了基於pki體系的安全web服務器。
  20. At present four kinds of technologies have mainly been adopted to realization of vpn, including tunneling technology, encryption & decryption technology, key management technology and user & facility identity authentication technology

    目前vpn的實現主要採用四項技術:隧道技術、加解密技術、密鑰管理技術和使用者與設備身份認證技術。
分享友人