繁體版 English IndonesiaFrancaisРусскийViệt
登录 注册

分组密码

"分组密码"的翻译和解释

例句与用法

  • In terms of the difference between encryption key and decryption key , it can be divided into symmetry cryptogram and public key cryptogram , and symmetry can be further divided into block cipher and stream cipher
    根据加密密钥和解密密钥性质上的不同,可以将密码体制分为对称密码和公钥密码两大类,而对称密码又包括分组密码和序列密码。
  • Autonomy is a notable feature of information security . so it ' s very necessary to conduct block cipher research , design and development relying on our own ability , and absorbing advanced experience at the same time
    自主性是信息安全的一个重要特点,在我国,依靠自己的力量并汲取现有的先进经验进行分组密码的研究、设计和开发也是非常必要的。
  • In traditional block cipher , the s - box is the only one nonlinear core component and it determines the strength of these cryptosystems . therefore , the construction of cryptographically strong s - boxes is of much
    在传统分组密码学中, s盒是唯一一个非线性运算部件,它的性能直接影响到整个密码系统的强度,它的设计一直是密码设计与密码分析的研究重点。
  • Then we construct a secure double - length hash function based on rijndael with a collision resistance of ( 2228 ) , which can take any message in practical as the input and output a 512 - bit hash value as the fingerprint of it
    在此基础上,提出了一个安全的基于分组密码算法rijndael的双倍长度hash函数,它能接收任何实际长度的输入,产生512位的hash值。
  • Security analyses of a variant of a new block cipher system ( called cac ) based on cellular automata theory are given using two cryptanalytic approaches . the results show that this variant of cac is very insecure under chosen - plaintext attacks
    利用两种方法对一个基于细胞自动机的分组密码系统cac的变形进行了分析,结果表明: cac的这种变形在选择明文攻击下是极不安全的。
  • ( 3 ) presented the design reference of hash algorithm and block cipher suitable for sbit processor based on die eiacp protocol . the contributions maintained above have been successfully used in some el application products . shown in appendix a
    ( 3 )根据eiacp协议的具体要求,对其中的密码算法进行了分析,给出了适合在8位普通处理器上实现的杂凑函数和分组密码算法的参考设计。
  • Cryptography technology is the core of information security , and block cipher is one of most important research in cryptography , its security , which protect data storage and transmission , ca n ' t be replaced by other types of ciphers
    密码技术是信息安全技术的核心,分组密码又是密码领域的重点研究内容之一,它在保护数据在存储与传输过程中的安全性是其它类型的密码所不能代替的。
  • They wanted to issue a series of strong security cipher standards , including not only block cipher , but also stream cipher , hash function , message authentication code , digital signature , public key cipher and so on
    紧接着, 2001年1月,欧洲启动了规模更大的nessie工程,希望推出一套不仅包括分组密码,还包括流密码、 hash函数、消息认证码、数字签名和公钥加密等在内的强安全性的密码标准。
  • In order to improve the data information ' s security and vivid practice in storage 、 handling 、 delivering , the paper is about the work ways of the divided cryptology : des 、 idea . then it discusses their different and basic principle , and the safety in usage
    通过对近代分组密码算法: des算法, idea算法,讨论它们各自的不同基本原理和应用中的安全性,以提高数据信息的存储、处理、传输的安全性与实用灵活性。
  • Because of the properties of the high - speed , easy - standardization , easy - implementation by the software or hardware , and so on , block cipher has become the core scheme of the data encryption , digital signature , authorization , key management in information and network safety
    分组密码以其速度快、易于标准化和和便于软硬件实现等特点,成为信息与网络安全中实现数据加密、数字签名、认证及密钥管理的核心体制。
  • 更多例句:  1  2  3  4  5
用"分组密码"造句  
英语→汉语 汉语→英语