one-way hash function 中文意思是什麼

one-way hash function 解釋
單向赫序函數
  • one : adj 1 獨一個的,單一的。 one hand 一隻手。 one shot 只出一期的雜志。 O swallow doesn t make a sum...
  • way : n 1 路,道路,通路。2 路程;距離。3 (要走的)路線;途中,路上;進行,前進;【法律】通行權。4 方...
  • hash : n 1 切碎的食物〈尤指肉丁和洋芋丁〉。2 拼湊起來的東西;大雜燴。3 重申,復述,推敲。4 〈蘇格蘭語〉...
  • function : n 1 功能,官能,機能,作用。2 〈常 pl 〉職務,職責。3 慶祝儀式;(盛大的)集會,宴會。4 【數學】...
  1. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密碼rijndael演算法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加密模塊,所得的結果再加入到反饋端,參與下一分組輸入的異或運算,迭代結束時的rijndael加密結果即為所求的hash函數值。
  2. This platform utilizes several techniques, including cryptographic algorithms, one - way hash function, digital certification, secure protocol, watermarkng and etc. based on this platform, a new authentication and key exchange protocol is presented and has been well applied to this transmission platform

    該傳輸平臺使用了多項技術,包括密鑰演算法、單項散列函數、數字證書、安全協議和數字水印等技術。針對該傳輸平臺,提出了一個新的認證和密鑰交換協議,並在傳輸平臺得到了很好的應用。
  3. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通信數據加密系統,該系統將對稱加密演算法3des與非對稱加密演算法rsa相結合對數據加密,用公鑰演算法rsa和單向散列函數md5實現對文件的數字簽名,有效地實現了網路通信系統中的信息加密、數字簽名、身份認證等功能,保證了發送方所發送信息的秘密性、鑒別性、完整性及不可否認性。
  4. The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time

    保密散列數字簽名演算法利用rsa公鑰密碼體制的原理、 md5單向散列函數和排列碼加密的思想,構造了一種能夠快速實現數據保密、數字簽名的簽名方案。
  5. The secret hash digital signature is a new signature method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time, which is more secret, occupies less space and runs in higher speed

    保密散列數字簽名演算法結合了rsa公鑰密碼體制、 md5單向散列函數和排列碼加密解密演算法的思想,實現了一種速度快、保密性強的數字簽名方案。
  6. This paper tries to make use of the cellular automata ’ s sensitivity to the initial state called avalanche effect, by swiftly diffusing and confusing the plaintext to be hashed, a cellular automata based one - way hash function is proposed

    本文試圖利用細胞自動機某些演化規則對于初態的雪崩效應,通過對散列明文信息實現快速擴散與混淆來構造單向hash函數。
  7. The paper analyzes the one - way hash function ( sha - 1 ) and study the process of gaining keks from ak using sha - 1. this paper discusses the state models of key management protocol in bpi + system and key usage

    分析討論了單向散列函數的安全散列演算法( sha - 1 ) ,研究了ak進行必要的填充后使用sha - 1得到密鑰加密密鑰( kek )的過程。
  8. We embed copyright watermark utilizing variance modulation on dc coefficients of dct transform ; and in the spatial domain, we embed authentication watermark gemerated from one - way hash function, lossless compression and least - significant - bit embedding

    在頻域中,我們採用了方差調製法,對版權水印進行嵌入;在空域中,我們採用了單向散列函數、無損壓縮和最低有效位等方法,對認證水印進行嵌入。
分享友人