secure hash 中文意思是什麼

secure hash 解釋
安全的單向散列函數
  • secure : adj ( curer; curest)1 安心的;不必擔心的;有把握的。 2 可靠的。3 安全的。4 堅固的;牢固的。5 必...
  • hash : n 1 切碎的食物〈尤指肉丁和洋芋丁〉。2 拼湊起來的東西;大雜燴。3 重申,復述,推敲。4 〈蘇格蘭語〉...
  1. The algorithm have the good one - way property, high sensitivity to initial values and good security due to the intrinsic characteristic of chaotic system and rijndael algorithm. the simulation experiment demonstrates the convenience and good hash performance ; 3 ) a new scheme of digital voice secure communication was proposed based on chaotic modulation without additional synchronization. the modulation sequence generated by chaotic logical mapping was used to encrypt the digital voice signal

    混沌系統和rijndael演算法的固有特點使該演算法具有較好的安全性、對初值有高度的敏感性以及較好的單向性能,並且易於實現,是一種有效的單向hash函數; 3 )研究了一種無需同步的基於混沌調制的數字語音保密通信系統的方案,利用邏輯映射產生混沌調制序列,以該序列作為密碼對數字語音進行加密處理,為了更好的隱匿信號特徵,混沌調制在小波分解的基礎上,對不同的通道使用不同的參數進行,並借鑒混沌掩蓋對信息信號進行了限幅處理,使密文完全隨機化。
  2. For digitally signing large files, the files are first compressed the fixed - length hash is calculated in a secure manner using these algorithms, and then signed with the private key

    要數字簽署大型文件,首先使用這些演算法用一種安全的方式壓縮(計算固定長度的哈希碼)文件,然後再用私鑰簽署。
  3. Furthermore, the scheme is improved, and it is shown that the improved scheme is more secure than the original by analyzing the security of the improved scheme, and has only one exponentiation modulo p and two hash - function evaluations for verification

    此外,對原方案進行了改進,通過對改進方案的安全性分析得出結論;改進方案此原方案更安全,並且消息恢復過程只需要計算一次大數模冪乘和兩次單向函數。
  4. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於數字證書和數字簽名技術的身份認證協議和密鑰交換協議,能夠有效地防止中間人的竊取和篡改,提高了身份認證的可靠性和密鑰交換的安全性;利用openssl標準庫函數實現系統的數據加密模塊,實現對稱加密、非對稱加密以及信息摘要的常用演算法。
  5. This platform utilizes several techniques, including cryptographic algorithms, one - way hash function, digital certification, secure protocol, watermarkng and etc. based on this platform, a new authentication and key exchange protocol is presented and has been well applied to this transmission platform

    該傳輸平臺使用了多項技術,包括密鑰演算法、單項散列函數、數字證書、安全協議和數字水印等技術。針對該傳輸平臺,提出了一個新的認證和密鑰交換協議,並在傳輸平臺得到了很好的應用。
  6. Are secure, one - way hash functions that convert arbitrary length data into fixed - length check sum hash code

    是一個安全的、單向的哈希函數,把任意長度的數據轉化成固定長度的校驗和/哈希碼。
  7. Crypt _ e _ hash _ value the password change was not issued on cluster % 1 ! ws ! because the cluster service was unable to establish a secure network connection between nodes

    驗證群集網路的完整性和/或安全性。對于特定於節點的錯誤,需要手動更改失敗節點上的群集服務帳戶密碼,然後該節點才能重新加入群集。
  8. Then we construct a secure double - length hash function based on rijndael with a collision resistance of ( 2228 ), which can take any message in practical as the input and output a 512 - bit hash value as the fingerprint of it

    在此基礎上,提出了一個安全的基於分組密碼演算法rijndael的雙倍長度hash函數,它能接收任何實際長度的輸入,產生512位的hash值。
  9. This article brings forward an application of a new encryption algorithm and secret hash digital signature that aim at the insecure factors. at the base of these algorithms we can realize the secure credit card system, which can accelerate the development of credit card. in this paper we firstly discuss the general concepts of applied cryptography, and then introduce the mostly used modern encryption methods and technologies

    本文首先介紹了應用密碼學的基本概念,然後介紹了目前常用的加密技術,認真分析了對稱密鑰加密方法、公開密鑰加密方法等加密技術的優缺點,提出了一種新型的分組加密方法? ?排列碼加密解密演算法以及基於該演算法的保密散列數字簽名演算法,並將其應用於信用卡系統,從而在一定程度上降低了信用卡因遺失、被盜、假卡等因素造成的損失。
分享友人