cryptographic system 中文意思是什麼

cryptographic system 解釋
密碼記錄系統
  • cryptographic : 關于暗號的, 用密碼寫的
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. Cryptographic technique applied in network testing system

    的網路測試系統中的應用
  2. Fairly good chaos map, which is of high performance and be implement easily is selected. with the introducing of appropriate perturbation aimed to change the initial conditions, we may enlarge the chaotic sequence period under finite precision in practical applications. mixed chaotic model is constructed by combining logistic sequences and m - sequences in form of exclusive - or. and we, by adding two mixed chaotic model, constructed double chaotic system to generate the key generator, which provides with excerllent cryptographic properties

    本文利用混沌技術,通過對混沌映射的選取,選取出了易於實現,且性能優良的混沌映射;通過初始參數的加擾,使有限精度下混沌的短周期行為得以改善;通過利用混沌序列與m序列異或構成了混合混沌序列,在混合混沌序列的基礎上構造出了雙混沌系統,從而提高系統的抗破譯能力,設計出了混沌序列密鑰生成器。
  3. The security of any cryptosystem depends on the security of the cryptographic keys used in the system

    任何密碼系統的安全都以密鑰的安全性為根本前提。
  4. Then it introduces the main algorithms including the construction of elliptic curve, points operating, data types conversions, triple encryption, et al. in the end, the security of the cryptographic system is analyzed

    然後給出了該方案所涉及主要操作的演算法描述,其中包括橢圓曲線的產生、點運算、數據類型轉換、基於cbc的三重加密演算法等。
  5. The difficulties of elliptic curve discrete logarithm problem and safety of 3 - des encryption is analyzed in detail. this cryptographic system applies a key exchange scheme based on ecc and trusty data encryption algorithm

    文章最後分析了該密碼系統的安全性,對橢圓曲線離散對數問題的難解性以及三重des加密演算法的安全性作了較詳細的分析。
  6. Safeguarding information in a secure telecommunication system by cryptographic or protected distribution system means from point of origin to point of destination

    在安全的通訊系統中,從起點到終點通過加密的或安全的分散式系統保護信息的安全措施。
  7. The paper discusses the development of web, browser / server mode conception and the content and mechanism of network security based on web, and also describes the basic conception and system of cipher theory, symmetric - based data encryption standard and advanced encryption standard and asymmetric - based rsa. it presents a detailed design of secrecy net of digital government, and advances a des - and - rsa - based security model of information exchange, which makes use of symmetric cryptographic algorithm to encrypt plaintext, and introduces public - key algorithm rsa to encrypt session key to compose digital envelope and to realize digital signature

    本文論述了web的發展及其browser / server模式概念,以及基於web的網路安全的內容與機制;闡述了密碼學的基本概念、分類,對稱密鑰密碼體制des與aes以及公開密鑰密碼體制rsa ;最後,利用一種基於des和rsa的信息交換安全模型,詳細地給出了一個數字政府的保密網系統設計方案。
  8. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。
  9. On the base of researching in several application security systems, this paper did much work on researching in symmetrical cryptographic system, public key cryptographic system, digital signature system and the digital certificate application technology in the contemporary cryptography, and issued a suitable security application framework taking account of the characteristics of the rfmdms, several key technologies in constructing were discussed also

    本文在對國內外各種安全應用系統調查研究的基礎上,圍繞現代密碼學中對稱式密碼系統、公開密鑰密碼系統、數字簽名系統、數字證書應用技術等進行了深入研究,並結合rfmdms體系結構方面的特點,提出了適合rfmdms的安全應用系統框架,而且對系統實現中的關鍵技術進行了研究。
  10. It is observed that the system has high practical security, fast encryption ( decryption ) speed and excellent reliability against strong channel noise, and its overall cryptographic properties are considerably better than known chaotic cryptosystems

    研究表明,該系統具有高安全性、快加密(解密)速度和強抗通道噪聲能力,它的密碼性質優于所有已知的混沌密碼系統。
  11. A cryptographic system in which units of plain text of regular length, usually letters, are arbitrarily transposed or substituted according to a predetermined code

    密碼一種密碼系統,其中固定長度的明文里的單元,通常為字母,被任意倒置或按事先確定的符號系統替換
  12. According to the fundamental theory of security of cryptographic system, the security of various structural encryption algorithms is researched and security model is designed in paper

    本文從密碼系統的基本安全理論出發,致力於各體制加密演算法安全性的研究和安全模型的設計。
  13. Then, a solution of terminal - based atm cryptographic system is proposed, the layout of the security services in such system is considered, and the hardware modules involved are designed and the architectures of them are presented. in addition, a point - to - point secure messages exchange protocol on atm user plane is presented and is integrated into the atm driver. finally, some real world issues are pointed out and some discussions are made

    本文在對atm網路的安全問題進行深入研究的基礎上,參考國外的研究思路,結合國內目前在atm設備開發方面的實際情況,提出了一種基於終端的atm網路安全保密系統解決方案;探討了該系統中各種安全業務的配置情況;設計了其中所涉及到的各種硬體模塊並給出了原理性結構圖;設計並開發了一種利用用戶面用戶通道實現的點到點安全消息交換協議;提出並解決了系統實現時應該考慮的一些問題。
  14. This paper analyzes security problems in computer networks and the main characteristics of current cryptography. and it discusses mathematical knowledge and main conception required by construction of elliptic curve crypsosystem. on this basis the paper presents a scheme of cryptographic system based on ecc ( elliptic curve cryptography )

    本文分析了計算機網路所存在的安全問題以及現有密碼體制的主要特點,論述了構造橢圓曲線密碼系統所需的數學知識和主要概念,在此基礎上提出了一個基於ecc (橢圓曲線密碼體制)的密碼系統方案。
  15. Among them are ip firewalling, authentication mechanisms, system logs and auditing, cryptographic protocols and apis, kernel - level vpn support, and many more

    其中有ip防禦、認證機制、系統日誌和審計、加密協議和api 、內核級vpn支持,等等。
  16. Design of high - performances cryptographic service system architecture

    高性能密碼服務系統體系結構設計
  17. Based on the application of the security system in network, following modules are contained in that model : the module of the realization of intelligent cards hardware, the module of csp ( cryptographic service provider ), the module of hardware certificates, the module of administrating the certificates, the module of applications, and so on

    該系統能與微軟操作系統完全融合。根據該系統的運行環境,設計了以下一些模塊:硬體實現模塊、加密服務提供模塊、硬體證書模塊、證書管理器模塊、應用層模塊等幾個模塊。
  18. This system ' s architecture is based on the advanced pki techniques and encryptions techniques, configured with indispensable hardware for security technology to form a substantial application security platform. this integrated application security platform provides the muti - platform applications systematical uniform security services, mainly including user ' s identification, confidentiality and integrity for data transmission, access control, user ' s digital sign and verification, cryptographic key management etc, to fulfill the trans - computer - type and trans - operation system control & management system, which is independent of different business applications or business procedures

    本設計方案以信息系統安全理論與系統工程學原理為基礎,在網路環境下構建了應用安全平臺,實現了一個跨硬體機型與操作系統臺的、與具體應用部署方式無關的統一的安全策略配置,實現了包括身份認證、訪問控制、數據機密性和完整性控制、應用密鑰管理服務、抗抵賴、安全審計、數據安全等安全服務。
  19. However, some of esd public services, namely, those implemented with java applet and or cryptographic functions, may not work on some platforms, due to the inherit limitations of the browser - operating system combinations

    電子公共服務。然而,由於個別瀏覽器的限制,部份須要爪哇語言及或加密保安的服務暫時未獲部份作業系統支援。
  20. Then, it introduce several cryptographic protocol based on elliptical curve, including diffie - hellman key switching, elgamal encryption and decryption, elgamal digital signature, ecdsa, etc. based on these, the author analyze kinds of security threat faced to 3g system and discuss the security rule and security objectives

    然後介紹了基於橢圓曲線的幾種密碼協議,包括diffie ? hellman密鑰交換, elgamal加解密, elgamal數字簽名, ecdsa等協議。在此基礎之上,分析了3g系統面臨的各種安全威脅並對系統的安全原則和安全目標進行了討論。
分享友人