secret-key cryptography 中文意思是什麼

secret-key cryptography 解釋
密鑰加密
  • secret : adj 1 秘密的;機密的;隱秘的。2 僻遠的。3 隱藏的;看不見的。4 神秘的;奧妙的;不可思議的。5 隱居...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • cryptography : n. 密碼學,密碼翻譯術;密寫術。
  1. The same key is used for both encryption and decryption, hence " symmetric key cryptography. " symmetric key cryptography is sometimes called secret key cryptography, as the security of the ciphertext depends upon the key being kept secret

    由於加密和解密都使用相同的密鑰,因此這種演算法被稱作「對稱密鑰加密」 。對稱密鑰加密有時也被稱為秘密密鑰加密,因為密文的安全取決於密鑰能否被保密。
  2. The lack of an effective solution to the problem of secret key management inhibited the wide use of secret key cryptography in security practice. the emergence of public key cryptography solves the key management problem whereas it introduces another problem, the verification of public key authenticity

    秘密密鑰密碼體制存在密鑰管理的問題,而公鑰密碼體制在有效解決密鑰管理問題的同時卻又帶來了公鑰真實性的問題。
  3. First , we introduce some basic cryptography theories such as secret - key cryptography , public - key cryptography and hash algorithm. second , we give the concepts of x. 509 certificate, crl ( certificate revocation list ) and certification path, and following this, we give some examples of certificate and authentication architectures. finally, we present an example of implementation of the certificate and key management system and some application cases of this system

    論文首先簡單介紹了秘密密鑰密碼體制、公開密鑰密碼體制、 hash函數以及基於x . 509的公鑰證書等基礎密碼學理論;其次,論文描述了幾種典型的證書體系和鑒別機制;最後給出了一個電子政務證書管理系統的具體實現例子。
  4. Contemporary, with the basic of ca authentication, digital signature, public - key cryptography and secret - key cryptography, this thesis bring forward a basic model of user registration and c / s, b / s resource accessing under the mechanism that using cryptography to transfer and memory the user ' s password

    同時,在結合pki模式中ca認證、數字簽名以及公開密鑰與對稱密鑰演算法技術的基礎之上,提出了密文傳輸和存儲口令機制下的用戶注冊和c s 、 b s模式資源訪問的基本模型,以實現c s和b s的安全機制。
  5. There isn t anything defective about cryptography that uses a shared secret key, provided a secure means of distributing the key exists

    只要有可能,您都應該避免將它用作您唯一的防禦線。這並不意味著含糊的安全性沒有用武之地。
  6. Of course, functions that are almost one - way are pretty useful, as all public key functions are, at their essence, one - way functions with " trap doors. " functions that are good candidates for public key cryptography are those that are easy to compute in one direction, but very difficult to compute in the other direction unless you know some secret

    當然,幾乎是單向的函數是非常有用的,因為從本質上講,所有的公鑰函數都是帶「天窗」的單向函數。公鑰密碼學的良好候選函數,是那些在一個方向上容易計算,而在另一個方向上除非您知道某些秘密否則極難計算的函數。
  7. Secret - key encryption symmetric cryptography

    私鑰加密(對稱加密)
分享友人