secret key 中文意思是什麼

secret key 解釋
暗鑰, 密鑰
  • secret : adj 1 秘密的;機密的;隱秘的。2 僻遠的。3 隱藏的;看不見的。4 神秘的;奧妙的;不可思議的。5 隱居...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. Represents the secret key for the symmetric algorithm

    表示對稱演算法的機密密鑰。
  2. Wep uses a secret key shared between the communicators

    Wep使用通信器之間共享的秘鑰。
  3. When you attempt a swing using the secret, key the downswing by pushing your right knee inward both to the left and toward the ball

    當你要嘗試這個揮桿秘訣的時候,記住用右膝移向左側及移向球位來規范你的下揮桿。
  4. To simulate the preparation of the secret - key, a gaussian random number generator in fpga is designed, which based on the analysis of ziggurat algorithm

    為了模擬密鑰的制備,在分析ziggurat演算法的基礎上完成了高斯隨機數發生器的fpga實現。
  5. Typically, secret - key algorithms, called block ciphers, are used to encrypt one block of data at a time

    通常,私鑰演算法(稱為塊密碼)用於一次加密一個數據塊。
  6. Ssl encrypts messages like most cryptographic algorithms with a secret key

    有幾個操作系統(諸如trusted solaris )確實做了分隔。
  7. The crux of secret communication is the secrecy of secret key. it has been pointed out that declassification can be realized by reconstructing phase space

    實現保密通信的關鍵是密鑰的保密性,己有文獻指出,可以利用相空間重構理論實現保密通信的解密。
  8. The paper mainly designs the electronic official document transport system, analyzes the framework, key technologies and securities. this paper put forward to the scheme about these key technologies, such as the user ' s certificate exchange, secret key management, red - header document and seal processing, files " inputting, and datum compressing. the paper introduces the detailed implement of the project with a demonstration

    對電子公文傳輸系統的功能需求、關鍵技術以及安全性進行了深入研究和分析,本文重點對電子公文系統中的傳輸子系統作了詳細的需求分析和系統結構設計,該設計全面考慮了電子公文在傳輸過程以及收發文過程的機密性、完整性、真實性以及不可否認性等特性,提出保障系統的機密性、完整性、真實性及不可否認性的解決方案。
  9. ( 3 ) the embedded watermark can be extracted only by using a secret key

    ( 3 )採用密鑰以加強水印的秘密性。
  10. Understand secret key, public key, one - way hash functions

    了解秘鑰、公鑰、單向散列函數
  11. The secret key transmission method adopting ternary optical fiber communication was proposed

    6 、提出了利用三值光纖通信實現密鑰安全傳送的方法。
  12. When performed the cryptographic computation, the smart card will leak information, namely timing of operations, power consumptions, electromagnetic emissions, etc. power analysis attacks use this information to break the secret key

    晶元在執行加密運算時硬體本身會泄露一些信息,如能量消耗、電磁輻射等。能量分析攻擊利用此信息進行分析,便可獲得和密碼相關的一些有用信息。
  13. The accounts department will need to decrypt the payment information in the purchase order using a pre - exchanged secret key

    會計部門要使用一個預先交換的秘鑰對采購訂單中的支付信息解密。
  14. When you use super encryption, you can encrypt just the payment information with the accounts department s secret key to produce an element - encrypted xml file

    使用超級加密時,您可以用會計部門的秘鑰只加密支付信息,以產生元素加密的xml文件。
  15. The models of unconditional security from quantum channels and noisy channels are two typical methods now. two parties begin the secret - key agreement over a public channel

    目前最典型的方法是利用有擾通道或量子通道建立無條件安全模型,通信雙方在公共通道上進行密鑰協商。
  16. Information - theoretically secure secret - key agreement is the key to make perfect security. the models of unconditional security from quantum channels and noisy channels are two typical methods now. once the secret - key has been agreed over a public channel, one can use the key to encrypt messages by using one time pad

    現在通常的做法是通信雙方使用有擾通道或量子通道建立無條件安全模型,然後在公開認證通道上交互信息進行密鑰協商,通信雙方把協商之後的安全的密鑰作為雙方共享的密鑰使用一次一密體制進行保密通信。
  17. The authors noted that stream ciphers like rc4 are vulnerable if two messages are encrypted with the same iv and secret key

    作者指出:如果用相同的iv和秘鑰加密兩條消息,那麼流密碼(如rc4 )容易受到攻擊。
  18. A hash - based message authentication code hmac can be used to determine whether a message sent over an insecure channel has been tampered with, provided that the sender and receiver share a secret key

    在發送方和接收方共享機密密鑰的前提下,基於哈希的消息驗證代碼( hmac )可用於確定通過不安全通道發送的消息是否已被篡改。
  19. 6. presenting an authorization - based encryption algorithm, which using two encryption parameters, a public secret key and a private secret key, and converting user password into pc to save in database by exclusive - or logical operation

    ( 6 )提出了一種針對cms用戶權限的加密演算法,該演算法具有公匙和私匙兩個加密參數,通過異或等邏輯運算將用戶口令加密成偽碼再進行存儲。
  20. The same key is used for both encryption and decryption, hence " symmetric key cryptography. " symmetric key cryptography is sometimes called secret key cryptography, as the security of the ciphertext depends upon the key being kept secret

    由於加密和解密都使用相同的密鑰,因此這種演算法被稱作「對稱密鑰加密」 。對稱密鑰加密有時也被稱為秘密密鑰加密,因為密文的安全取決於密鑰能否被保密。
分享友人