加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The traditional optical encryption methods are classified into two kinds, one is based on the joint transform correlator, the second is based on the matched filter.
传统的光学加密方法分为两类,一种是基于联合变换相关器的加密方法,第二种是基于
-
To address the latter issue, security analyst Bruce Schneier, chief technologist for BT Counterpane , uses whole-disk encryption on his laptop and then a second layer: He encrypts individual files on the machine separately, with a different password.
BT Counterpane 首席技术专家,布鲁斯 Schneier 安全分析师为了解决后面的问题,在他的笔记本电脑上进行整盘加密,然后进行第二个层次:他在机器上分别用不同的密码加密个人文件。
-
Encryption and cryptographic software has been used in many different ways to make systems more secure.
加密和加密软件已经被用在许多不同的方式,使系统更安全。
-
It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key.
现代密码学认为,任何加密体系的加密和解密算法都可以公开,其安全性在于密钥的保密性。
-
In this paper,a new cryptography named dynamic encryptor is put forward.
本文提出了利用动态加密器对信息进行加密的思想。
-
Encipherer uses the public key encryption which should be transmitted. The decipherer only cares about private key which transmits through the secure channel by TA, needn't to care about instead of how to produce.
加密者用TA公布的公钥对要传送的明文加密,解密者只关心TA通过安全信道传来的私钥,不用再关心它们是如何产生的。
-
Using C language RSA encryption algorithm, the use of large prime numbers decomposition of the principle of an algorithm for encryption.
详细说明:用C语言编写的RSA加密算法,利用大素数分解的原理进行加密的一种算法。
-
Then how to realize network security of J2ME based on Bouncy Castle is discussed,including to encrypt the data which are transmitted to the server and to verify the client by using digest and digital signature .
简要介绍了Bouncy Castle J2ME加密包,并具体探讨了如何用Bouncy Castle API来实现J2ME的网络安全,包括加密传输的数据和使用摘要及数字签名对客户端进行验证。
-
The main content of this thesis includes six parts. First of all, it is a comprehensive systematic introduction about RSA algorithm including the present application situation and principle of RSA algorithm----producing big prime numbers and secret keys, the encryption arithmetic for information and the decryption for secret information, which establish the theory foundation for achieving concrete; secondly, it introduces some basic conception of RSA digital signature and theory of digital signature realizing process; thirdly, it introduces the basic principle of MD5 algorithm; fourthly, it states design and realization of RSA digital signature in detail. The main modules includes producing RSA secret keys, implementation of RSA encryption algorithm and decryption algorithm, producing message digest and realizing digital signature and verification by RSA; the fifth, it carries on testing entirely, analyzing and improving for this system;The sixth, it analyses the security of RSA digital signature and points out the development direction of RSA digital signature.
本文主要研究的内容包括:第一,对RSA算法进行了全面系统的介绍,包括RSA算法的应用现状和原理—大素数的产生、密钥对的产生、对明文的加密运算和密文的解密运算,为具体实现打下了理论基础;第二,介绍了RSA数字签名的一些基本概念和数字签名的理论实现过程;第三,对MD5算法基本原理的介绍;第四,详述了RSA数字签名的设计与实现,主要实现的模块包括RSA密钥的产生,RSA加密算法和解密算法的实现,消息摘要MD的生成以及利用RSA算法实现数字签名和签名的验证;第五,对该系统进行了整体的测试和分析改进;第六,分析了RSA数字签名的安全性,指出了RSA数字签名的发展方向。
-
Checksum, CRC, hash algorism, message digest, digital autograph and public denskey system are thetechnology to transmit relative data, confidential information and veracity confirmation through compuer or internet, and couldbe applied to the government network.
校验和、循环冗余校验码、散列算法、消息摘录、数字化签名和公共密钥加密系统是可用于INTERENT网或用计算机传送的有关数据、信息加密和真实性确认的技术。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。