密鑰結構 的英文怎麼說
中文拼音 [mìyàojiēgòu]
密鑰結構
英文
key structure- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 鑰 : 鑰名詞(鑰匙) key
- 結 : 結動詞(長出果實或種子) bear (fruit); form (seed)
- 構 : Ⅰ動詞1 (構造; 組合) construct; form; compose 2 (結成) fabricate; make up 3 (建造; 架屋) bui...
- 結構 : 1 (各組成部分的搭配形式) structure; composition; construction; formation; constitution; fabric;...
-
In sna products, a key used to encipher operational keys that are to is used at a node
在系統網路體系結構( sna )產品中,對將要在某個網點上使用的操作鍵標進行加密的一種鍵(也稱鍵標,也就是密鑰) 。The first kind of algorithm is based on s - box controlled by key, the algorithm distinguishes most of other block ciphers, its visible quality is that its s - box is not regular and fixative, but controlled by block cipher ' s key. the second kind of algorithm is based on smn ( d ) array code, it makes full use of the visible quality of smn ( d ) array code possessing big code distance ( d ). the thesis discusses the two algorithms " reversibility, security and their qualities, the
第一種是基於「 s -盒由密鑰控制」的變結構分組密碼,該演算法區別于其它大部分分組密碼最大的特點是它的s -盒不是固定不變的而是由密鑰控制產生;第二種是基於smn ( d )陣列編碼的變結構分組密碼,該演算法充分利用了smn ( d )陣列編碼具有碼距大的特點;文中對這兩個演算法的可逆性、安全性及其性能等進行了探討和分析,分析結果認為這兩個變結構演算法正確、有效且安全。In this dissertation we make a study of subliminal channels that conclude the progress, the application, the model, the construction, the stego - key, the capacity, the security, the way to realize subliminal - freeness, and so on
本文對閾下通道技術進行了比較全面的總結和研究,包括閾下通道的發展狀況,應用前景,閾下通道的模型,構造方法,隱匿密鑰,容量,安全性以及封閉方法等。Also we study the ecc crypto theory in the field of public crypto system, in which the ecc encrypt principle, safety, reliability, as well as the structure of ecc based on galois field is focused on
研究了公鑰加密系統中的橢圓曲線加密理論,詳細闡述了有限域上橢圓曲線的結構及其基本運算; 3This protocol is verified by applying the expanded ban logic, and its reparability is proved as well in the same chapter, and a hierarchical key distribution system model is given out and the corresponding expanded protocol, which we call authentication based hierarchical reparable key distribution protocol, is proposed as well
研究了層次化密鑰分配模型以及基於鑒證的可修復密鑰分配協議在這種模型下的擴展。軍隊、政府、企業內部都是典型的層次化組織結構,我們提出的基於鑒證的層次化可修復密鑰分配協議非常適宜這些系統的應用。After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages
在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。In this paper, members serving system, popular web developing technology and pki ( public key infrastructure ) are introduced firstly. then, after analyzing the system in detail the author makes the conclusion that using mvc architecture based on jsp technology to build members serving system is a good method. furthermore, the method of system analysis and design using uml with rational rose tools is introduced
文中將首先介紹期貨交易所會員服務系統,當今流行的電子商務平臺的開發技術,及pki公開密鑰基礎設施技術,之後從期貨交易所會員服務系統的功能需求出發,經過詳盡的分析確定以jsp技術為基礎的mvc框架結構,並結合使用rationalrose工具描述了如何利用uml語言進行系統分析與設計。Key agreement scheme for dynamic secure multicast based on connected dominating set
結構的動態安全組播密鑰協商方案This paper is at introduction foundation of cryptography, analyzes x. 509 certificate, has explained the principle of pki and function of each part, and combines the author ' s project development, explains the running environment and systematic characteristic of jy _ ca, it is to divide jy _ ca into ca initial module, certificate requisition module, certificate signature module, certificate revocation module, certificate inquiry module, privat key recovery module and management module. the realization of each module has been explained briefly at the same time
本文在介紹密碼學知識的基礎上,剖析了x . 509證書的證書結構,詳盡闡述了pki的原理和各個組成部分的功能,並結合作者的項目開發,對jyca的運行環境和系統特點作了整體說明,把jyca劃分為ca初始化模塊、證書申請模塊、證書簽發模塊、證書吊銷模塊、證書查詢模塊、密鑰恢復模塊及管理模塊,同時對各個模塊的實現要點作了扼要說明。The platform puts emphasis on the implementation of m - gdh. 2 protocol, and realizes such functions as follows : peer to peer network connection, dynamically displaying network topology, key generation, secure communication, help - online and so on
該平臺以m - gdh . 2協議為開發重點,實現了網路對等連接、動態顯示網路拓撲結構、密鑰生成、安全通信以及聯機幫助等功能。The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed
按照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密碼rijndael演算法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加密模塊,所得的結果再加入到反饋端,參與下一分組輸入的異或運算,迭代結束時的rijndael加密結果即為所求的hash函數值。The paper analyzes the secure problem existing in the tcp / ip protocol, discusses the possibility and superiority of secure transmission in network layer, researches the architecture of protocol ipsec, presents the design thought of using ipsec to realize the secure transmission within the pbc ' s intranet under the windows. the paper gives a schema of secure transmission system in the pbc ' s intranet, realizes it using the windows kernel program technology and obeying the specifications of ndis and ipsec. the secure transmission system promotes the secure extent of the pbc ' s intranet
論文針對人民銀行內聯網面臨的信息和數據安全傳輸問題,分析了tcp / ip協議存在的安全問題,探討了在tcp / ip網路層實現安全傳輸的可能性和優越性,認真研究了ipsec協議體系結構和esp協議、 ah協議、 ike密鑰交換協議的原理,在既要保護已有投資,又要提高安全程度的前提下,提出了在windows操作系統下採用ipsec實現人民銀行內聯網安全傳輸的設計思想。The system structure of certificate authority and the function modules of the system are introduced in the system structure part. therefore the article introduces the detailed methods of establishing certificate authority and the establishment of data certificate. meanwhile, the article discusses the actual functions of digital certificate in office automatic system on web, and the key management security of the digital certificate
在系統總體結構中,主要討論了ca認證體系的體系結構和系統的主要功能模塊;在系統的具體實現中,討論了ca認證中心的建立的技術以及ca認證中心生成數字證書的方法;在系統的實際應用中,結合mthsca的特點,討論了數字證書在某摩托化步兵師網上自動化辦公系統中的具體應用;在系統安全性方面,討論了數字證書的密鑰安全管理。The service master key is the root of the sql server encryption hierarchy
服務主密鑰為sql server加密層次結構的根。This means that you do n ' t have to depend on commercial client authentication services, although you can integrate commercial client authentication into your public key infrastructure if you choose.
這意味著無需依靠商業的客戶端身份驗證服務,如果願意,還可以將商業的客戶端身份驗證集成到自己的公用密鑰結構中。Public key infrastructure, certificate services, and smart card support
公用密鑰結構、證書服務和智能卡支持Using certificate services and the certificate management tools in windows 2000, you can deploy your own public key infrastructure
使用windows2000中的證書服務和證書管理工具,可以實施自己的公用密鑰結構。Windows 2000 introduces support for kerberos v5, public key infrastructure ( pki ), and smart card logon support, providing flexible, enterprise - strength security for your entire organization
Windows2000支持kerberosv5 、公用密鑰結構( pki )和智能卡登錄,從而為整個單位提供了靈活、具有企業級強度的安全措施:The idea and theory has applied to the building of tianjin ic security system, the solution of the ic application and management is realized in the agriculture bank of tianjin, meanwhile, ic security system which has reasonable structure, security, credibility and perfect function is provided for the evolution of tianjin financial ic, " single card using everywhere in city " of tianjin city and the integration with other application of domain in this paper
建立了一套完善、適用的ic卡安全管理系統。論文針對天津農行金融ic卡應用的特點,提出了ic卡具體的密鑰結構、發行和管理以及業務應用中的安全實現方案,該方案為天津農行金融ic卡的順利發展,並最終與天津市「城市一卡通」及其它非金融應用行業的有效結合提供了結構合理、安全可靠、功能完善的ic卡安全管理體系。With a public key infrastructure, you can implement standards - based technologies such as smart card logon capabilities, client authentication ( through secure sockets layer and transport layer security ), secure e - mail, digital signatures, and secure connectivity ( using internet protocol security )
利用公用密鑰結構,可以執行一些標準的技術,例如智能卡登錄功能、客戶端身份驗證(通過安全套接字層協議和傳輸層安全保護) 、安全電子郵件、數字簽名和安全連接(使用internet協議的安全保護) 。分享友人