encryption and cryptography 中文意思是什麼

encryption and cryptography 解釋
加密和密碼術
  1. Later in this article, it is common for developers to use cryptography, but misapply it in ways that destroy the security of the system, or to use encryption that is too weak and can easily be broken

    ) ,開發人員都普遍使用密碼技術,卻以破壞系統安全的方式濫用它;或者使用加密技術,但這些加密技術又太薄弱,很容易被破壞。
  2. It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key

    現代密碼學認為,任何加密體系的加密和解密演算法都可以公開,其安全性在於密鑰的保密性。
  3. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  4. In this paper, two kinds of public - key cryptography of data transport are presented rsa encryption algorithm and diffie - hellman encryption algorithm

    本文介紹了數據傳輸中公開密鑰演算法中的兩種- rsa加密演算法和diffie - hellman加密演算法
  5. In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc

    作者所作的主要工作有: ( 1 )研究了基於大素數域上的橢圓曲線密碼在加密解密、密鑰交換、數字簽名等方面的密碼協議並分析了每種協議的安全性能; ( 2 )在現有基於身份的數字簽名方案的基礎上提出了基於身份的群簽名系統並討論了群簽名在數字現金中的應用; ( 3 )給出了橢圓曲線密碼在電子拍賣系統、密鑰認證系統方面的實現方案。
  6. The paper mainly discussed the pki foundation technology knowledge and the concept, discussed the base knowledge and the basic principle of the modern cryptography. the article introduced and compared main algorithm characteristic, the speed, the encryption intensity of each kind of encrypt. elaborated the public key system in the pki system application : digital envelope, digital signature, as well as digital certificate definition, form and use

    論文主要論述了pki基礎技術的一般知識和概念;討論了現代密碼學的基本知識和基本原理;對各種加解密演算法的主要特點、速度、加密強度進行了簡要的介紹和比較;論述了公開密鑰體制在pki體系中的應用:數字信封、數字簽名,以及數字證書定義、格式及用途。
  7. To protect the multimedia data, a mixed encryption algorithm together with two advanced cryptography - des ( data encryption standard ) and blowfish based on fingerprint watermark is studied. in this algorithm, the fingerprint data of people is embedded into the encrypted data

    為了對多媒體數據進行保護,研究了一種基於指紋水印數據的混合加密方案。該加密方案中混合了流行的保密性較高的des ( dataencryptionstandard )演算法和blowfish演算法。
  8. Cryptography is one of the key technologys to protect confidential information as it is transmitted from one location to another. there are two primary encryption methods in use today : symmetric - key cryptography and public - key cryptography

    加密是確保安全的關鍵技術之一,本文討論了幾種典型的加密演算法,包括分組加密、公鑰加密、散列函數。
  9. The same key is used for both encryption and decryption, hence " symmetric key cryptography. " symmetric key cryptography is sometimes called secret key cryptography, as the security of the ciphertext depends upon the key being kept secret

    由於加密和解密都使用相同的密鑰,因此這種演算法被稱作「對稱密鑰加密」 。對稱密鑰加密有時也被稱為秘密密鑰加密,因為密文的安全取決於密鑰能否被保密。
  10. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。
  11. In view of the commonly - used block cipher and public key cryptography, this article focuses on the improvement we have made for the algorithms about aes, dbs, ecc and rsa. based on the dsp chip tms320c6201 from ti company, we have accomplished the speed of 0. 92 usec per aes encryption / decryption, 1. 335 usec per dbs encryption / decryption, and 3

    針對目前信息安全體系中常用的分組密碼和公鑰密碼演算法,本文著重改進了des 、 aes的快速演算法實現,並在基於ti公司dsp晶元tms320c6201的系統中實現了0 . 92usec加(解)密一個aes分組, 1 . 335usec加(解)密一個des分組, 3 . 585usec加(解)密一個tdea分組;同時通過改造,使montgomery約化更易於進行并行處理,並通過改進橢圓曲線密碼( ecc )底層運算和倍點演算法,使得rsa和橢圓曲線密碼的實現速度得到了極大的提高。
  12. For this purpose, after deeply researched encryption and comparison, we use combination encryption technique to optimize cryptography

    為此,我們深入研究加密演算法,對多種演算法進行了優劣性比較,用組合密碼技術來優化和強化加密演算法。
  13. System cryptography : use fips compliant algorithms for encryption, hashing, and signing

    :系統加密:使用fips兼容的演算法來加密、哈希計算和簽名
  14. After studying ms - pptp protocol, we think that the security of a vpn is based on the security of its authentication and encryption protocols. if a vpn ' s cryptography is weak, then its security is no better than a non - private virtual network routed over the internet. since companies are relying upon vpns to extend trusted internal permiters to remote offices, breaking the security around such a tunnel is tantamount to defeating all of the security around the internal permiter

    本文對ms - pptp協議實現進行了深入的分析、研究,認為:認證和加密協議的安全決定了vpn的安全性,如果vpn認證和加密手段是脆弱的,那它的安全性並不比在internet上使用非vpn傳輸數據高,因為一個組織依靠vpn擴展其可信的內部邊界,允許外部分支訪問內部網路,破壞隧道的安全性等於破壞了所有內部網路。
  15. Provides programming elements for public key cryptography standards pkcs, including methods for signing data, exchanging keys, requesting certificates, public key encryption and decryption, and other security functions

    包含authenticode x . 509 v . 3證書的公共語言運行庫實現。此證書用唯一明確標識證書持有者的私鑰簽名。
  16. Namespace provides programming elements for public key cryptography standards pkcs, including methods for signing data, exchanging keys, requesting certificates, public key encryption and decryption, and other security functions

    System . security . cryptography . pkcs命名空間提供了公鑰加密標準( pkcs )的編程元素,包括用於對數據簽名的方法、用於交換密鑰的方法、用於請求證書的方法、用於公鑰加密和解密的方法,以及用於其他安全性功能的方法。
  17. The block cipher is one of the two aspects of the modern applied cryptography systems. it has some characteristics - the fast speed, the easy standardization, convenient implement by software and hardware, and so on. the block cipher always is the main parts of the data encryption, digital signature, authentication and key management in the security of information and network

    分組密碼是現代密碼體制發展的兩個方向之一,它具有速度快、易於標準化和便於軟硬體實現等特點,通常是信息與網路安全中實現數據、數字簽名、認證和密鑰管理的核心體制,因此分組密碼在計算通信和信息系統安全領域中具有廣泛的應用。
  18. This article brings forward an application of a new encryption algorithm and secret hash digital signature that aim at the insecure factors. at the base of these algorithms we can realize the secure credit card system, which can accelerate the development of credit card. in this paper we firstly discuss the general concepts of applied cryptography, and then introduce the mostly used modern encryption methods and technologies

    本文首先介紹了應用密碼學的基本概念,然後介紹了目前常用的加密技術,認真分析了對稱密鑰加密方法、公開密鑰加密方法等加密技術的優缺點,提出了一種新型的分組加密方法? ?排列碼加密解密演算法以及基於該演算法的保密散列數字簽名演算法,並將其應用於信用卡系統,從而在一定程度上降低了信用卡因遺失、被盜、假卡等因素造成的損失。
  19. He then continues with his last implementation of xml encryption and makes use of jca jce classes to support cryptography

    接著他繼續上一次的xml加密實現,並利用jca / jce類支持密碼術。
  20. In symmetric cryptography systems, a single key that is used for both encryption and decryption

    在對稱密碼術系統中同時用於加密和解密的單個密鑰。
分享友人