塊密碼 的英文怎麼說
中文拼音 [kuāimìmǎ]
塊密碼
英文
block clipher-
The block cipher classes provided in the base class library use a chaining mode called cipher block chaining, which uses a key and an initialization vector to perform cryptographic transformations on data
基類庫中提供的塊密碼類使用稱作密碼塊鏈( cbc )的鏈模式,它使用一個密鑰和一個初始化向量( iv )對數據執行加密轉換。Typically, secret - key algorithms, called block ciphers, are used to encrypt one block of data at a time
通常,私鑰演算法(稱為塊密碼)用於一次加密一個數據塊。Specifies the block cipher mode to use for encryption
指定用於加密的塊密碼模式。The block cipher mode encodes data one block at a time
塊密碼模式一次一塊對數據進行編碼。Block ciphers with long keys are stronger than stream ciphers
使用長密鑰的塊密碼比流密碼更強。However, block cipher algorithms tend to execute more slowly than stream ciphers
但是,塊密碼演算法執行起來通常比流密碼慢。Although it tends to execute more slowly than stream cipher, block cipher is more secure
盡管塊密碼的執行速度慢于流密碼,但塊密碼更安全。Because each block is heavily processed, block ciphers provide a higher level of security than stream ciphers
由於每塊都被嚴密處理,因此塊密碼比流密碼提供更高的安全級別。A simple block cipher that does not use an initialization vector will encrypt the same input block of plain text into the same output block of cipher text
,一個不使用初始化向量的簡單塊密碼將把相同的明文輸入塊加密為同樣的密文輸出塊。Firstly, a formal description of the cryptographic protocols of tpm is made using svo logic
首先,使用的svo邏輯建立可信平臺模塊密碼學協議的形式化描述,然後進行推理分析。Then logic reasoning is made on the formal description. through reasoning and analysis, some secure vulnerabilities are found in the cryptographic protocols of tpm, and repair methods are also proposed
在推理分析中,也發現了可信平臺模塊密碼學協議的一些安全漏洞,並在分析的基礎上修復了這些安全漏洞。Information technology - security techniques - data integrity mechanism using a cryptographic check function employing a block cipher algorithm
信息技術.保密技術.採用數據塊密碼運演算法的加密檢驗功能的數據集成機構Block ciphers use the same encryption algorithm for each block
塊密碼對每個塊使用相同的加密演算法。Information technology - security techniques - modes of operation for an n - bit block cipher
信息技術安全技術n位塊密碼演算法的操作方式Information technology - security techniques - hash - functions part 2 : hash - functions using an n - bit block cipher
信息技術安全技術散列函數第2部分:採用n位塊密碼的散列函數Information technology - security techniques - hash - functions - part 2 : hash - functions using an n - bit block cipher
信息技術.安全技術.散列函數.第2部分:使用n位塊密碼的散列函數Information technology. security techniques. hash - functions - hash - functions using an n - bit block cipher algorithm
信息技術.保密技術.信息函數.第2部分:使用一個n -位數據塊密碼演算法的信息函數The analysis is also made on the cryptographic protocols of tpm
因此,也對可信平臺模塊密碼學協議的安全性進行了分析。I use a block cipher algorithm for encryption that requires the clear data bytes to be in blocks of 8 bytes, so i pad the last incomplete block with some characters
我對需要將明文數據位元組放在8位元組塊的加密使用塊密碼演算法,所以我用一些字元填充最後一個不完整的塊。I have provided support for the tripledes block cipher algorithm only for demonstration
我已經對tripledes塊密碼演算法提供了支持,但只用於演示。分享友人