密鑰管理演算法 的英文怎麼說

中文拼音 [yàoguǎnyǎnsuàn]
密鑰管理演算法 英文
kma key management algorithm
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : 動詞1 (演變; 演化) develop; evolve 2 (發揮) deduce; elaborate 3 (依照程式練習或計算) drill;...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 管理 : manage; run; administer; supervise; rule; administration; management; regulation
  1. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、ike協議、加認證、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  2. While dissertate the keys management theory and rsa arithmetic in detail

    同時對論及rsa作了詳細論述。
  3. The ability of keeping the ip packet ' s integrity, secrecy, authentication, data origination, anti - relay is discussed. the relationship of ipsec component authentication header ( ah ), encapsulating security payload ( esp ) and ike ( internet key exchange ) is also talked about. this discussion of ipsec makes the impression that ipsec make ip layer security enough

    論述了ipsec在ip報文的完整性、機性、數據來源認證和抗重播等方面的能力, ipsec的基本協議? ?認證報文頭( ah )和安全封裝載荷報頭( esp )與ipsec安全體系的其它組成部分如安全策略、加和認證等如何合作,共同完成對ip報文的安全保護。
  4. To ensure data security of wlan, the design adopts rijndael algorithm ' s implementation in ocb mode to provide authenticated encryption, presents a double dynamic key management mechanism, and adopt mutual authentication based on public key system

    為了確保安全性,在方案設計中,使用了rijndael的ocb執行模式來實現認證加、提出了雙層動態機制、採用了基於公體系的雙向身份認證機制。
  5. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加機制的研究,首先介紹了數字集群通信系統的安全保機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加過程及其的選用和,特別介紹了端到端加;然後介紹了幾種常用的加,通過分析其優劣,提出了端到端加的解決方案;最後完成了基於rsa和idea的數字集群通信系統加方案的設計,其具體過程為將經過數字信號送入加器里,和以idea加為基礎設計的碼流發生器( ksg )產生的碼序列進行加解,並且研究了此加過程的碼同步問題。
  6. Universal key management system realizes its function through software encryption algorithm and key - memory issuing functions itself through master - card. sjy49 uses key management platform by hardwares. the algorithm used in the generation, diffusion, eduction and transfer of the key is approved by the state competent department. the implementation of algorithm is functioned by the encryption equipment recognized by the state competent department

    通用系統採用軟體存儲分發等採用母卡方式實現; sjy49銀行ic卡系統採用硬體化的平臺,的生成、分散、導出、傳輸等功能使用的是經國家主部門審定通過的的實現使用經國家主部門審定通過的硬體加設備。
  7. On this thesis we discuss the security of the electric document, and focus on digital signature and the protocol application on office automation, which including three departments - - - - hash algorithm, the security protocol about work flow and security key base on the public key infrastructure

    本文重點研究了在電子公文的數字簽名問題,主要從雜湊和針對公文流轉的數字簽名協議,以及基於pki公基礎設施的三個方面進行了討論,本文的主要工作包括: 1
  8. The widespread use of public - key cryptography also requires a public - key infrastructure ( pki ) to publish and manage public - key values

    而廣泛地公則又需要一個公基礎結構( pki )來公布和眾多公開
  9. Then we brought out algorithm to construct ergodic matrix according to the recursion formula ( i ) and expatiate characteristic theorems about “ ergodic matrix ” by the numbers, the difficult problem and one - way ( trapdoor ) function based on the ergodic matrix over finite field. then we put forward the concept of strong matrix based on ergodic matrix according to a problem and the algorithm of finding and constructing the strong matrix of ergodic matrix. as one - way function played an important role in cryptography, we gave a new plan to realize application pattern in cryptology

    基於單向函數在碼學中的重要性,本文構造了基於遍歷矩陣的單向函數b = q _ 1 ~ aaq _ 2 ~ b ,並在此基礎上實現了包括協議、認證協議和智力撲克協議在內的五種典型的安全協議,同時就的特點和攻擊特性進行了分析。
  10. The permutation code encryption and its key management and digital signature by rsa contribute to the high intensity combination security algorithm which is verified by both theory analysis and simulation results with high running speed

    論和實驗結果均表明,應用排列碼明文數據並結合rsa進行和數字簽名可以得到加強度很高的安全的運行速度也很快。
  11. Cryptographic analysis of a group key management scheme based on a public - key encryption algorithm

    對一種基於公的組方案的碼分析
  12. In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric - key cryptography, public - key cryptography, hash functions and key management protocols

    第二章介紹基本的應用碼學碼協議,包括對稱加、非對稱加、散列函數、數字簽名技術和協議。
  13. The existing security mechanism is constituted by three parts : encryption algorithm, authentication mechanism and secret key management

    目前無線局域網的安全機制主要體現在3個方面:加wep 、認證機制、
  14. In this paper, against so many kinds of hazards in e - mail application, not changing the e - mail protocols in existence, we embed a good encryption algorithm, permutation code in the system to safeguard the information of e - mail, introduce public - key cipher to implement transfer of session keys safely, implement authentication and integrity of information, and introduce essential key management mechanism

    本文針對電子郵件面臨的種種安全威脅,在不改變現有電子郵件協議的前提下,嵌入性能良好的排列碼加來保障郵件信息的安全,同時採用公碼體制來保障的安全傳遞,並實現消息的身份認證及數據完整性;還引入了必要的機制。
分享友人