鑒別密鑰 的英文怎麼說

中文拼音 [jiànbiéyào]
鑒別密鑰 英文
authentication key
  • : Ⅰ名詞1 (鏡子 古代用銅製成) ancient bronze mirror2 (可以作為警戒或引為教訓的事) warning; objec...
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  1. Authority procedure in dedicate mode checks the ms ' s validity, and if it is valid, a safe cipher key for the use of channel encrypting is given

    專用模式下的權過程用於網路檢查ms提供的識是否真實,並給ms一個安全的
  2. The traditional means, such as key, password, cryptogram, id card and even ic card, have fallen behind the needs of economic activity and social security. this is because that they would be forgeable, falsifiable, stolen or decodable

    傳統的個人身份手段如匙、口令、碼、身份證件,甚至ic卡等識方式,由於它們具有可假冒、可偽造、可盜用、可破譯的弱點,已不能完全滿足現代社會經濟活動和社會安全防範的需要。
  3. Parsing certificate is anthetication to a user and process of getting information. research and developing pki certificate discriminator make us iucubrate pki and standard algorithm in cryptography so it is significance both in theory and practice

    解析數字證書就是對用戶身份的認證和用戶公的提取過程,研究和開發pki數字證書器,促使對pki體系和碼學標準演算法的深入研究,具有理論和實踐上的雙重意義。
  4. Then it discusses hmac algorithm and generation of message authentication keys

    研究消息碼的hmac演算法和消息的產生。
  5. First , we introduce some basic cryptography theories such as secret - key cryptography , public - key cryptography and hash algorithm. second , we give the concepts of x. 509 certificate, crl ( certificate revocation list ) and certification path, and following this, we give some examples of certificate and authentication architectures. finally, we present an example of implementation of the certificate and key management system and some application cases of this system

    論文首先簡單介紹了秘碼體制、公開碼體制、 hash函數以及基於x . 509的公證書等基礎碼學理論;其次,論文描述了幾種典型的證書體系和機制;最後給出了一個電子政務證書管理系統的具體實現例子。
  6. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加機制的研究,首先介紹了數字集群通信系統的安全保機制,講述了單向和雙向權的過程、單呼和群呼的空中介面加過程及其的選用和管理,特介紹了端到端加;然後介紹了幾種常用的加演算法,通過分析其優劣,提出了端到端加的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加方案的設計,其具體過程為將經過數字信號送入加器里,和以idea加演算法為基礎設計的碼流發生器( ksg )產生的碼序列進行加解運算,並且研究了此加過程的碼同步問題。
  7. The parameters negotiated by ike include the arithmetic of encrypt and verification, the key used in encrypt and verification, the protecting pattern of communication ( transfers or tunnel pattern ) and the exist time of key

    Ike協商的安全參數包括加演算法、加鑒別密鑰、通信的保護模式(傳輸或隧道模式) 、的生存期等。
  8. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份。即第一通過用戶口令驗證;第二利用雙方的公數字證書對握手連接信息進行數字簽名驗證。
  9. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通信數據加系統,該系統將對稱加演算法3des與非對稱加演算法rsa相結合對數據加,用公演算法rsa和單向散列函數md5實現對文件的數字簽名,有效地實現了網路通信系統中的信息加、數字簽名、身份認證等功能,保證了發送方所發送信息的秘性、性、完整性及不可否認性。
  10. Then we do some research about the basic protocols, the elliptic curve diffie - hellman protocol is improved as it can ’ t make identity authentity and can ’ t resist third party ’ s attacks ; at the same time, the signature equation of elliptic curve digital signature algorithm is reconstructed, and the improved kp + lqalgorithm is applied into verification stage, the whole speech of the protocol is improved greatly

    接著,研究和分析了基於ecc的各類碼協議。針對交換協議不能進行身份以及存在第三方攻擊的問題,對其加以改進;同時,對數字簽名協議中的簽名方程重新構造,並將優化的kp + lq演算法用於驗證過程,提高了協議的執行效率。
  11. The private key system is also called the single key system, its encryption process is the same as its decryption process. the public key system is also called the double key system, its encryption process is different with its decryption process. because the public key system can publish its public key and only keep its private key secret, it has many new functions such as the digital signature and authentication, which is widely used in every area of the society

    體制又稱單體制,其加過程和解過程相同;公體制又稱為雙體制,其加、解不同,可以公開加,而僅需保,從而具有數字簽名、等新功能,被廣泛應用於金融、商業等社會生活各領域。
分享友人