流密碼 的英文怎麼說
中文拼音 [liúmìmǎ]
流密碼
英文
stream cipher-
If the " harry potter " books stand as the essential popular read for young people, then " the da vinci code " has captured the crown for grown - ups
如果說《哈里波特》系列從書代表了年輕人的主流閱讀趣味,那麼《達芬奇密碼》就贏得了成年人的青睞。At last this module is synthesized using 6s06dpdm technology library. 3, the algorithm used in key module to the performance of data security is thoroughly analyzed. considering both performance of enciphering and degree of complexity of realization, steam cipher algorithm is used
3 、對數據通信安全性起決定作用的加密模塊所採用的加密演算法進行了深入的分析,綜合加密性能和實現的復雜度的考慮,採用了流密碼的加密演算法。Using fumy cipher, transmission data are kept secret that can prevent others from reading or writing data without permit. it can ensure data security
為了確保數據傳輸的安全性,運用流密碼對數據進行加密傳輸,防止外來者的攻擊,未經授權進行非法數據讀寫操作。The stream cipher mode encodes data one bit at a time
流密碼模式一次一位對數據進行編碼。Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management
該文針對電子郵件服務系統中存在的安全隱患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦公模式、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、密碼管理的應用需求等進行了詳細的分析和設計。Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa
本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。Fluid - inclusion is only mark of fossil ore - forming fluid and is the key that can understand the mechanism of ore - forming processes. by means of fluid - inclusions methods, we can acquire some important information of physics and chemistry in ore - forming processes, retrace the locus of ore - forming processes and clarify the mechanism of ore - forming processes
流體包裹體是成礦流體留下的唯一痕跡和解開成礦流體以及成礦作用機理的密碼,通過流體包裹體研究,可以獲得成礦作用過程中許多重要的物理化學參數,重塑成礦作用演化的軌跡,闡明成礦作用的機理。Block ciphers with long keys are stronger than stream ciphers
使用長密鑰的塊密碼比流密碼更強。A multidimensional chaotic stream cipher design based on parameters switching
一種基於參數切換的高維混沌流密碼設計Chosen - ciphertext attack for chaotic self - synchronizing stream cryptosystem
時空混沌自同步流密碼系統的選擇密文攻擊However, block cipher algorithms tend to execute more slowly than stream ciphers
但是,塊密碼演算法執行起來通常比流密碼慢。Although it tends to execute more slowly than stream cipher, block cipher is more secure
盡管塊密碼的執行速度慢于流密碼,但塊密碼更安全。Because each block is heavily processed, block ciphers provide a higher level of security than stream ciphers
由於每塊都被嚴密處理,因此塊密碼比流密碼提供更高的安全級別。The authors noted that stream ciphers like rc4 are vulnerable if two messages are encrypted with the same iv and secret key
作者指出:如果用相同的iv和秘鑰加密兩條消息,那麼流密碼(如rc4 )容易受到攻擊。A new non - linear stream cipher algorithm with ability of self synchronization is presented. this algorithm is also realized using verilog hdl and is simulated
文章提出了一種帶有自同步功能的非線性流密碼加密演算法,並用verilog語言進行參數化的描述。Meanwhile, the implementation of such block cipher as rijndael with shifting registers is designed with performance as good as that of he method of table - lookup
將移位寄存器實現高效流密碼的思想用於分組密碼rijndael演算法的實現,獲得與查表法相當的效率。This dissertation mainly investigate important measure indexes ? inear complexity, k - error linear complexity and period, on the security of stream ciphers, design several fast algorithms for determining the linear complexity and k - error linear complexity of periodic sequences
本文主要研究流密碼安全性重要的度量指標- -線性復雜度、 k -錯線性復雜度和周期等,設計出若干計算周期序列的線性復雜度和k -錯線性復雜度的快速演算法,得到如下主要結果: 1They wanted to issue a series of strong security cipher standards, including not only block cipher, but also stream cipher, hash function, message authentication code, digital signature, public key cipher and so on
緊接著, 2001年1月,歐洲啟動了規模更大的nessie工程,希望推出一套不僅包括分組密碼,還包括流密碼、 hash函數、消息認證碼、數字簽名和公鑰加密等在內的強安全性的密碼標準。Logical cipher contactless ic card chip is the most current in the entire world and our country, so this design direction is it, and the algorithm of cipher adopt stream cipher corresponding and compatible with philips mifare card
非接觸ic卡中邏輯加密型是目前世界和國內應用比較廣泛的,故本設計的方向選擇了非接觸邏輯加密型ic卡,加密演算法採用了和philips的mifare卡相兼容的流密碼加密演算法。A two - dimensional one - way coupled map lattice is proposed for cryptography of self - synchronizing stream cipher, which n ^ 2 space units produce chaotic stream outputs in parallel
摘要提出了由單向二維耦合的映象格點組成新的時空混沌自同步流密碼系統,它能夠產生並輸出n ^ 2個平行混沌流密碼。分享友人