symmetric encryption 中文意思是什麼

symmetric encryption 解釋
對稱加密技術
  1. According to the research, the major work done is as following : < 1 > analyzes the symmetric - key encryption algorithm des and dissymmetric - key encryption algorithm rsa, and makes them easy to realize in hardware. < 2 > according to the algorithms and the thought of reconfigurable computing, the dissertation accomplishes the design of 64 - bit des system architecture and the design of 256 - bit ~ 1024 - bit rsa system architecture. < 3 > using the top - down high level design methodology and the hdl language, accomplishes the description of the des / rsa designs, the simulation and the synthesis

    本論文主要的研究工作: < 1 >對現有的對稱加密演算法des演算法和非對稱加密演算法rsa演算法進行分析,使其易用硬體實現; < 2 >基於可重構思想和特點,完成64位des演算法和256位1024位模長rsa演算法的可重構硬體的設計; < 3 >採用自頂向下的設計方法,利用hdl語言對des / rsa設計進行功能描述,並完成軟體模擬,綜合和布線; < 4 >在可重構計算驗證平臺上進行演算法驗證,並對設計的可重構和設計的進一步優化進行討論。
  2. This upgrade adds support for the aes advanced encryption standard symmetric key cipher to those accessible from

    這次的升級添加了對aes ( advanced encryption standard )對稱密鑰加密演算法的支持,可以通過
  3. Such asymmetric transformations are very costly compared to encryption and decryption using a symmetric key

    此類非對稱轉換較比使用對稱密鑰進行加密和解密的方法,其開銷更大。
  4. Cryptography is one of the key technologys to protect confidential information as it is transmitted from one location to another. there are two primary encryption methods in use today : symmetric - key cryptography and public - key cryptography

    加密是確保安全的關鍵技術之一,本文討論了幾種典型的加密演算法,包括分組加密、公鑰加密、散列函數。
  5. The same key is used for both encryption and decryption, hence " symmetric key cryptography. " symmetric key cryptography is sometimes called secret key cryptography, as the security of the ciphertext depends upon the key being kept secret

    由於加密和解密都使用相同的密鑰,因此這種演算法被稱作「對稱密鑰加密」 。對稱密鑰加密有時也被稱為秘密密鑰加密,因為密文的安全取決於密鑰能否被保密。
  6. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。
  7. The paper discusses the development of web, browser / server mode conception and the content and mechanism of network security based on web, and also describes the basic conception and system of cipher theory, symmetric - based data encryption standard and advanced encryption standard and asymmetric - based rsa. it presents a detailed design of secrecy net of digital government, and advances a des - and - rsa - based security model of information exchange, which makes use of symmetric cryptographic algorithm to encrypt plaintext, and introduces public - key algorithm rsa to encrypt session key to compose digital envelope and to realize digital signature

    本文論述了web的發展及其browser / server模式概念,以及基於web的網路安全的內容與機制;闡述了密碼學的基本概念、分類,對稱密鑰密碼體制des與aes以及公開密鑰密碼體制rsa ;最後,利用一種基於des和rsa的信息交換安全模型,詳細地給出了一個數字政府的保密網系統設計方案。
  8. In addition, the grid application must handle both symmetric and asymmetric encryption schemes

    此外,網格應用程序必須處理對稱及非對稱的加密方案。
  9. In a real world scenario, alice and bob use public key asymmetric encryption to transfer a secret symmetric key and use secret key encryption for the remainder of their session

    在一個實際方案中,小紅和小明使用公鑰(不對稱)加密來傳輸私(對稱)鑰,而對他們的會話的其餘部分使用私鑰加密。
  10. A special form of symmetric - key encryption system was proposed by the national institute of standards and technology ( nist ) and national security agency ( nsa )

    (美國)國家標準與技術局和國家安全局提出了一種特殊形式的對稱鑰匙加密系統。
  11. The message is encrypted by using a message encryption key with a symmetric encryption algorithm such as triple des

    使用通過對稱加密演算法(如三重des )生成的消息加密密鑰來加密消息。
  12. When a symmetric key is encrypted with a password instead of the public key of the database master key, the triple des encryption algorithm is used

    當使用密碼(而不是數據庫主密鑰的公鑰)對對稱密鑰進行加密時,便會使用triple _ des加密演算法。
  13. Symmetric encryption algorithm based on pairing function

    數據加密中的公開密鑰演算法
  14. Provides a symmetric encryption algorithm to encrypt message text

    提供對稱加密演算法來加密消息文本。
  15. Symmetric encryption and decryption

    對稱加密和解密
  16. A symmetric key is one key that is used for both encryption and decryption

    對稱密鑰是加密和解密都使用的一個密鑰。
  17. To communicate a symmetric key and iv to a remote party, you would usually encrypt the symmetric key and iv using asymmetric encryption

    為了將對稱密鑰和iv傳送給遠程方,通常使用不對稱加密來加密對稱密鑰和iv 。
  18. Secret - key encryption symmetric cryptography

    私鑰加密(對稱加密)
  19. In symmetric cryptography systems, a single key that is used for both encryption and decryption

    在對稱密碼術系統中同時用於加密和解密的單個密鑰。
分享友人