密码分析学
- 与 密码分析学 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Second, in the viewpoint of crypto analysis, the practical requirement for the cryptographic function is to construct the function that can resist all the known crypto analysis and attacks. In advanced, the main cryptographic properties are compared, and the relation among these cryptographic properties is analyzed, including the trade-off ones. Get the conclusion that the construction of cryptographic Boolean function is to find out the proper Boolean function in the whole vector space under the restriction of several cryptographic properties required for the security system.
然后本文从密码分析的角度,讨论了密码函数的实际需求,即构造能够抵抗已有密码分析与攻击的布尔函数;分析了布尔函数的主要的密码学性质,并比较了这些性质之间的相互关系,包括制约的关系;得出了构造布尔函数的实质的结论,即在向量空间中构造全体布尔函数,以所需的若干密码学性质作为限制条件,用有限域上的多项式、Walsh谱、Hadamard矩阵等数学工具找出适当的布尔函数用于加密体制的设计。
-
Based on these, we construct a class of nonlinear sequence generators, show that they have better cryptographical properties, and furthermore they can resist on the attack of cipher by cryptology analysis So they can be used as key sequence generators..
在此基础上自主设计了一类非线性序列生成器,证明了其具有良好的密码学性质,并且通过密码分析,表明它能抵抗现有的几种密码攻击,因此这类非线性序列适于做密钥流生成器。
-
Marian Adam Rejewski (help·info; 16 August 1905 – 13 February 1980 was a Polish mathematician and cryptologist who in 1932 solved the plugboard-equipped Enigma machine, the main cipher device used by Germany.
在进行这项工作期间,他从根本上发展了密码分析学。之前,密码分析方法利用自然语言中的模式与统计特性,例如字母的频率分析。然而雷耶夫斯基在他对Enigma密码的攻击中第一次应用了纯数学的方法。
-
For evaluating the security of cryptographic device in the risk environment full of electromagnetic analysis adversaries,by enhancing the adversary's ability in the classical cryptographic black box model, two novel adversaries,the key recover adversary and the indistinguishability determined adversary who takes the advantage of electromagnetic emissions,were defined within the framework of physical observable cryptography model.
为在充斥电磁分析旁路攻击敌手的危险环境下评估密码设备的安全性,通过将密码学标准黑盒模型中的敌手能力进行加强,在物理可观测密码术模型的框架内,定义了具有电磁泄漏信息分析能力的密钥恢复敌手与不可分辫性判定敌手。
-
This thesis includes eight chapters: chapter 1 introduces the development background and target; chapter 2 expatiates the primary algorithms of cryptography; chapter 3 explains feasibility research report; chapter 4 shows the requirement analysis report; chapter 5 summarizes the preliminary design report; chapter 6 includes detailed design report and partial source codes; chapter 7 discusses the software testing report; chapter 8 acquires a whole-length summarization.
本文共分为8章:第1章介绍密码学综合实验系统的开发背景与目标;第2章阐述了密码学的主要加解密算法及原理;第3章为该系统的可行性研究报告;第4章是需求分析报告;第5章叙述了系统的概要设计;第6章介绍了系统的详细设计及部分编码;第7章为该系统的软件测试报告;第8章是对全文的总结。
-
UCSA maps each symbolic cryptographic operation in Dolev-Yao model to an ideal functionality in the UC framework, resulting in simpler proofs for cryptographically soundness at the same time.
UCSA框架将Dolev-Yao模型中密码学抽象操作与UC框架中的理想功能进行了结合,使得通过形式化分析方法可以证明安全协议的在密码学环境下的一些性质。
-
In this paper, the author first introduces some basic conception of Cipher technology and Shannon model of secret communication, then the paper discusses and analyses the advantages and problems of symmetric algorithm and dissymmetrical encryption.
在介绍密码学基本概念以及Shannon保密通信模型的基础上,分析了对称密码算法和公钥密码算法的优点及其在应用中注意的问题,最后对密码算法的发展及其应用的未来做出展望。
-
Codon partition schemes were compared in phylogenetic analyses at subfamily level for Gyrinidae and at family level for Hydradephaga based on partial mitochondrial COⅠ gene sequences.
利用PAUP和MrBayes软件,对线粒体COⅠ基因序列3个密码子位置的数据模块分别进行了豉甲科和水生肉食亚目在亚科或科水平上的系统发育学分析,结果表明第二密码子数据模块获得了理想的分析结果。
-
The HFE cryptosystem presented by Jacques Patarin in 1996 has long been regarded as the most promising one of multivariate cryptosystems,and is a promising public key cryptosystem with many practical applications:very fast or very short digital signatures,fast public key encryption,etc.
多变量密码系统设计与分析是近年来密码学研究领域中的一个非常活跃的研究方向,其中基于有限域上多变量二次方程组的求解问题设计密码系统并对其进行分析是这一方向的一个重要内容。
-
This is an elementary introduction to cryptoanalysis for beginners.
这是为新手作的关于密码分析学的一个基本的介绍。
- 推荐网络例句
-
As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.
每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。
-
Maybe they'll disappear into a pothole.
也许他们将在壶穴里消失
-
But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.
但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。