cryptographic algorithm 中文意思是什麼

cryptographic algorithm 解釋
密碼演算法
  1. As regards cryptographic algorithm, according to database encryption requirement for cryptosystem, we adopt block cipher, which is high intensity and fast, based on analysing and comparing several popular cryptographic algorithm ; and resolve cipher message expansion problem through making improvement of block cipher with " cipher message whmovement "

    在數據的加密演算法上,本文在分析比較目前常用的加密演算法的基礎上,依據數據庫加密對密碼系統的要求,採用了保密強度大且速度快的分組密碼;並用「密文挪用法」對分組密碼進行改進,解決了加密后數據擴張的問題。
  2. Application of cryptographic algorithm in bluetooth security mechanism

    加密演算法在藍牙安全機制中的應用
  3. The uniform resource identifier that describes the cryptographic algorithm associated with the

    值關聯的加密演算法的統一資源標識符( uri ) 。
  4. Md5 message - digest algorithm 5 ; rfc 1321 is a widely used cryptographic hash function with a 128 - bit hash value

    Md5 (消息摘要演算法5 ; rfc 1321 )是一種廣泛應用的加密散列函數,使用了128位的散列值。
  5. Generally, mathematical theory and deduction are used to explore the weakness of cryptographic algorithms, so that the complicated mathematical knowledge and enormous consumption are needed. at the same time, as a result of the design scientifically, there is no practical significance to conquer the cryptographic algorithm by mathematical methods

    長期以來,人們一直專注于使用數學方法尋找密碼演算法的漏洞,這不僅需要極高的數學造詣而且會耗費巨大的資源;同時,由於密碼演算法的科學設計,從數學角度破譯密碼演算法基本不具有現實意義。
  6. An investigation of the rijndael algorithm which is the advanced encryption standard of usa is taken in this thesis. we have focused on developing the cryptographic properties of the rijndael sbox from the viewpoint of boolean function, walsh spectrum and algebraic structures, on the attacks against the reduced variants of rijndael, and on the optimized implementations of rijndael. the key contributions follow below

    本文對美國高級加密標準rijndael演算法進行了比較深入的研究,內容包括:從布爾函數、 walsh譜和代數結構的角度對其s盒密碼性質進行的研究,簡化演算法的攻擊方法以及演算法的優化實現問題,主要成果有: 1 、提出求解布爾函數表達式的兩種新方法,具有簡潔、易於編程實現、準確而快速的特點,應用於des演算法獲得與公開文獻相符的結果,應用於rijndael演算法首次求出其s盒布爾函數表達式。
  7. The difficulties of elliptic curve discrete logarithm problem and safety of 3 - des encryption is analyzed in detail. this cryptographic system applies a key exchange scheme based on ecc and trusty data encryption algorithm

    文章最後分析了該密碼系統的安全性,對橢圓曲線離散對數問題的難解性以及三重des加密演算法的安全性作了較詳細的分析。
  8. The paper discusses the development of web, browser / server mode conception and the content and mechanism of network security based on web, and also describes the basic conception and system of cipher theory, symmetric - based data encryption standard and advanced encryption standard and asymmetric - based rsa. it presents a detailed design of secrecy net of digital government, and advances a des - and - rsa - based security model of information exchange, which makes use of symmetric cryptographic algorithm to encrypt plaintext, and introduces public - key algorithm rsa to encrypt session key to compose digital envelope and to realize digital signature

    本文論述了web的發展及其browser / server模式概念,以及基於web的網路安全的內容與機制;闡述了密碼學的基本概念、分類,對稱密鑰密碼體制des與aes以及公開密鑰密碼體制rsa ;最後,利用一種基於des和rsa的信息交換安全模型,詳細地給出了一個數字政府的保密網系統設計方案。
  9. If you publicly release a regular cryptographic hash for a document, anyone can verify the hash, assuming they know the hashing algorithm

    如果您公開發布一個文件的有規律密碼雜湊,則任何人都可以檢驗該雜湊,假設他們知道雜湊演演算法的話。
  10. Data cryptographic techniques. data integrity mechanism using a cryptographic check function employing a block cipher algorithm

    數據密碼技術.採用字組數字演算法使用密碼檢查功能檢驗數據整體性機構
  11. Information technology - security techniques - data integrity mechanism using a cryptographic check function employing a block cipher algorithm

    信息技術.保密技術.採用數據塊密碼運演算法的加密檢驗功能的數據集成機構
  12. Desx extended des was created by the cryptographic security firm rsa security as a modification of the standard des algorithm that supports additional key material, making the algorithm more resistant to brute force attacks than standard des

    Desx (擴展的des )是由加密安全公司rsa security在改進標準des演算法的基礎上創造的,由於該演算法支持更長的密鑰,因而比標準des演算法更能抵抗惡意攻擊。
  13. Performs a cryptographic transformation of data using the rijndael algorithm

    使用rijndael演算法執行數據的加密轉換。
  14. Cryptographic analysis of a group key management scheme based on a public - key encryption algorithm

    對一種基於公鑰加密演算法的組密鑰管理方案的密碼分析
  15. Algorithm provided by the cryptographic service provider

    演算法的實現執行不對稱加密和解密。
  16. Creates a cryptographic object used to perform the symmetric algorithm

    創建用於執行對稱演算法的加密對象。
  17. The interfering signal is produced by cryptographic algorithm, with good restoration resistance

    干擾信號由密碼演算法產生,具有良好的抗還原性能。
  18. Public - key cryptography is used for strong authentication, but x. 509 is not dependent on the use of a particular cryptographic algorithm, though two users wishing to authenticate must support the same algorithm

    強認證使用公鑰加密方式,但是x . 509並不依賴于使用特殊加密演算法,盡管兩個用戶希望認證必須支持同一演算法。
  19. Great breakthrough has been achieved in critical technologies applied in electronic information protector, e. g. scrambling cryptographic algorithm, broadband modulation, broadband amplification, etc. with strong acquisition resistance, the protector can effectively protect the electronic information from interception

    電子信息保護器,在加擾密碼演算法、寬帶調制、寬帶放大等關鍵技術上取得了重大突破,具有極強的抗徵收能力,能夠有效地保護電子信息不被徵收截取。
  20. The reverse process of converting cipher text back into plain text is called decryption. a cryptographic algorithm frequently referred to as a cipher is a mathematical function to perform encryption, and vice versa, using keys

    加密技術范指透過特定程序演算法及密碼匙,將訊息從初始普通文本轉換為另一種不易理解的形式密碼文本。
分享友人