secret key encryption 中文意思是什麼

secret key encryption 解釋
密鑰加密
  • secret : adj 1 秘密的;機密的;隱秘的。2 僻遠的。3 隱藏的;看不見的。4 神秘的;奧妙的;不可思議的。5 隱居...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • encryption : 編成密碼
  1. Another problem that eliminates many encryption systems is fundamental to their design : they utilize a secret encryption key, a unique mathematical value used to encode text, which must be known to both parties client and server in any transaction

    (這太容易做到了,所以我們說: 「我們不用鉛筆和紙來做這件事。我們的許多筆記都用鋼筆寫。我們不需要擦除更多東西。 」
  2. When you use super encryption, you can encrypt just the payment information with the accounts department s secret key to produce an element - encrypted xml file

    使用超級加密時,您可以用會計部門的秘鑰只加密支付信息,以產生元素加密的xml文件。
  3. 6. presenting an authorization - based encryption algorithm, which using two encryption parameters, a public secret key and a private secret key, and converting user password into pc to save in database by exclusive - or logical operation

    ( 6 )提出了一種針對cms用戶權限的加密演算法,該演算法具有公匙和私匙兩個加密參數,通過異或等邏輯運算將用戶口令加密成偽碼再進行存儲。
  4. Receivers use a combination of the sender ' s public key and their own private encryption key to unlock the secret code for that message and decipher it

    接收者利用發送者的公開密鑰和他們自己的秘密密鑰的結合,解開該報文的秘密編碼,並解密之。
  5. The same key is used for both encryption and decryption, hence " symmetric key cryptography. " symmetric key cryptography is sometimes called secret key cryptography, as the security of the ciphertext depends upon the key being kept secret

    由於加密和解密都使用相同的密鑰,因此這種演算法被稱作「對稱密鑰加密」 。對稱密鑰加密有時也被稱為秘密密鑰加密,因為密文的安全取決於密鑰能否被保密。
  6. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算法,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器里,和以idea加密演算法為基礎設計的密碼流發生器( ksg )產生的密碼序列進行加解密運算,並且研究了此加密過程的密碼同步問題。
  7. Public - key algorithms, on the other hand, are asymmetrical, using different keys, a public key, and a secret key, for encryption and decryption

    公開鑰匙演算法則是不對稱的,採用不同的密鑰,一個公開的鑰匙和一個秘密的鑰匙,用於加密和解密。
  8. Both systems are used to decrease the damages due to the compromise of secret key. a new strong ( t, n ) - key - insulated public - key encryption scheme based on the cdh assumption is proposed according to the ( t, n ) - key - insulated public - key encryption model and security definition presented by yevgeniy - jonathan - moti. the new scheme has been proved against chosen - cipertext attack in random oracle

    採用yevgeniy - jonathan - moti提出( t , n )密鑰隔離公鑰加密的一般模型和安全性定義,提出基於cdh假設的強( t , n )密鑰隔離公鑰加密方案,並依據其安全性定義證明新方案在隨機神諭模型下是抗選擇密文攻擊的。
  9. Gets or sets the secret key for the data encryption standard

    獲取或設置數據加密標準(
  10. The. net framework provides the following classes that implement secret key encryption algorithms

    . net framework提供以下實現私鑰加密演算法的類:
  11. After the authentication, ssl will actually use secret key encryption to secure the channel, but the details of that aren t relevant to this discussion

    在身份驗證之後, ssl將真正使用保密的密鑰加密來保護通道,但其細節與本討論無關。
  12. In a real world scenario, alice and bob use public key asymmetric encryption to transfer a secret symmetric key and use secret key encryption for the remainder of their session

    在一個實際方案中,小紅和小明使用公鑰(不對稱)加密來傳輸私(對稱)鑰,而對他們的會話的其餘部分使用私鑰加密。
  13. The encryption method make the secret message into confused code, and only some one who hold the right key can access the secret information

    而通常加密方法則不同,它是把消息變成了一些人類無法識別的亂碼,擁有正確密鑰的人才能解密出信息。
  14. Typically, public - key encryption is used to encrypt a key and iv to be used by a secret - key algorithm

    公鑰加密通常用於加密一個私鑰演算法將要使用的密鑰和iv 。
  15. This protocol uses the theory of pu blic - key to build a security channel, and then uses the secret session - key to encrypt the data. the security protocol can assure that the data is transported in security through the link. finally, the author described two cipher algorithm which used in t he encryption module

    該協議結合單鑰加密體制和雙鑰加密體制的優點,利用雙鑰體制對通信雙方進行身分認證並確定每次會話的會話密鑰,然後使用會話密鑰對傳輸數據進行加密,從而保證了通信數據在線路上的安全性。
  16. Because of these problems, secret - key encryption is often used in conjunction with public - key encryption to privately communicate the values of the key and iv

    由於存在這些問題,私鑰加密通常與公鑰加密一起使用,來秘密地傳達密鑰和iv的值。
  17. Decryption generates the identical keystream used for encryption using the transmitted - with - the - packet iv and the shared secret key

    解密通過使用帶信息包傳輸的iv和共享密鑰來生成用於加密的等同密鑰流。
  18. The private key system is also called the single key system, its encryption process is the same as its decryption process. the public key system is also called the double key system, its encryption process is different with its decryption process. because the public key system can publish its public key and only keep its private key secret, it has many new functions such as the digital signature and authentication, which is widely used in every area of the society

    私鑰體制又稱單鑰體制,其加密過程和解密過程相同;公鑰體制又稱為雙鑰體制,其加、解密密鑰不同,可以公開加密密鑰,而僅需保密解密密鑰,從而具有數字簽名、鑒別等新功能,被廣泛應用於金融、商業等社會生活各領域。
  19. The existing security mechanism is constituted by three parts : encryption algorithm, authentication mechanism and secret key management

    目前無線局域網的安全機制主要體現在3個方面:加密演算法wep 、認證機制、密鑰管理。
  20. Secret - key encryption symmetric cryptography

    私鑰加密(對稱加密)
分享友人