cryptographic algorithm造句
例句與造句
- Asymmetric cryptographic algorithms , also known as public - key algorithms , require that each entity maintains a pair of related keys : a private key and a public key
不對(duì)稱加密算法(也稱為公鑰算法)要求每個(gè)實(shí)體都維護(hù)一對(duì)相關(guān)密鑰:私鑰和公鑰。 - Public - key cryptographic algorithms are also known as asymmetric algorithms because one key is required to encrypt data while another is required to decrypt data
公鑰加密算法也稱為不對(duì)稱算法,原因是需要用一個(gè)密鑰加密數(shù)據(jù)而需要用另一個(gè)密鑰來(lái)解密數(shù)據(jù)。 - The purpose of the machine was to emphasize just how vulnerable des a popular , government - sanctioned cryptographic algorithm really is . to read more on the des cracker , see
具有安全性意識(shí)的程序會(huì)放棄root特權(quán)并讓操作系統(tǒng)知道它不應(yīng)再需要那些特權(quán)(至少在程序下一次運(yùn)行之前) 。 - As the core and the foundation of information security , the cryptography , especially the security of cryptographic algorithms , is the focus of correlated researches and discussions in the world
作為信息安全的核心和基石,密碼算法特別是密碼算法的安全性一直是國(guó)內(nèi)外研究和討論的熱點(diǎn)問(wèn)題。 - For example , an enterprise that has its own implementation of a cryptographic algorithm can make that implementation the default instead of the implementation shipped in the . net framework sdk
例如,某個(gè)企業(yè)可以將自己的加密算法實(shí)現(xiàn)設(shè)置為默認(rèn)實(shí)現(xiàn),而不是使用. net framework sdk中提供的算法實(shí)現(xiàn)。 - It's difficult to find cryptographic algorithm in a sentence. 用cryptographic algorithm造句挺難的
- The . net framework sdk allows computer administrators to configure the default cryptographic algorithms and algorithm implementations that the . net framework and appropriately written applications use
. net framework sdk允許計(jì)算機(jī)管理員配置默認(rèn)加密算法和算法實(shí)現(xiàn),供. net framework和正確編寫(xiě)的應(yīng)用程序使用。 - Public - key cryptography is used for strong authentication , but x . 509 is not dependent on the use of a particular cryptographic algorithm , though two users wishing to authenticate must support the same algorithm
強(qiáng)認(rèn)證使用公鑰加密方式,但是x . 509并不依賴于使用特殊加密算法,盡管兩個(gè)用戶希望認(rèn)證必須支持同一算法。 - Secondly , in order to develop and apply aes algorithm better , and design cryptographic algorithm independently , the paper deeply research the design principle and security of the aes algorithm
其次為了更好開(kāi)發(fā)應(yīng)用aes算法,并實(shí)現(xiàn)分組加密密碼算法的本土化設(shè)計(jì),對(duì)分組加密算法aes的設(shè)計(jì)原理、安全性能方面進(jìn)行了深入的研究。 - We identify two categories of operations in symmetric - key and public - key cryptographic algorithms that are not common in previous general - purpose workloads : advanced bit operations within a word and multi - word operations
我們區(qū)別對(duì)稱密鑰和公共密鑰加密算法中的兩類運(yùn)算:面向位的運(yùn)算和多字運(yùn)算,他們?cè)谝酝ㄓ秘?fù)載中并不常見(jiàn)。 - The reverse process of converting cipher text back into plain text is called decryption . a cryptographic algorithm frequently referred to as a cipher is a mathematical function to perform encryption , and vice versa , using keys
加密技術(shù)范指透過(guò)特定程序算法及密碼匙,將訊息從初始普通文本轉(zhuǎn)換為另一種不易理解的形式密碼文本。 - It uses symmetric and cryptographic algorithms like data encryption standard ( des ) , and triples des to encrypt the payload . together , the ipsec esp and ah protocols provide privacy , integrity , and authentication of ip packets
Esp利用對(duì)稱加密算法(如des ,三重des )加密有效載荷。 ah與esp一起為ip包提供機(jī)密性,完整性和身份源認(rèn)證服務(wù)。 - But at present , many mobile banking systems only use some cryptographic algorithms as security measures , without depicting the procedure of message exchanging as a secuity protocol , needless to say how to analyze it or provide the correctness proof of it
但目前很多手機(jī)銀行系統(tǒng)中只是簡(jiǎn)單的使用了若干密碼算法作為安全措施,沒(méi)有把消息交換過(guò)程抽象描述成安全協(xié)議的形式,更談不上對(duì)其進(jìn)行形式化的分析證明。 - Because of the importance of non - repudiation to electronic commerce activities and the fact that non - repudiation protocol is relatively few , this paper adopts the modern cryptographic algorithms and techniques and designs a mutually undeniable cryptographic protocol
介于不可否認(rèn)協(xié)議對(duì)電子商務(wù)活動(dòng)開(kāi)展的重要性以及不可否認(rèn)協(xié)議相對(duì)較少這一事實(shí),利用現(xiàn)有的密碼算法與密碼技術(shù),提出一種改進(jìn)的雙方不可否認(rèn)密碼協(xié)議方案。 - With the fast development of internet applications , information security has beome more and more important . the problem of the trustworthiness and security has also been more and more important . so we need best digital signature algorithm and cryptographic algorithm
隨著網(wǎng)絡(luò)逐步成為社會(huì)的主要神經(jīng),網(wǎng)絡(luò)上的誠(chéng)信問(wèn)題和安全問(wèn)題日益?zhèn)涫荜P(guān)注,數(shù)字簽名是網(wǎng)絡(luò)用戶實(shí)現(xiàn)電子簽名的主要手段,為用戶提供了誠(chéng)信和安全的保障。 - It goes without saying the importance of network and information se - curity . now , about communication and information security has come to people ' s attention . study cryptographic algorithms and protocols is a very important research subject , which is the core technique of the information security - cryptography
病毒,黑客,網(wǎng)絡(luò)犯罪給網(wǎng)絡(luò)用戶造成的危害也越來(lái)越大。網(wǎng)絡(luò)與信息安全的重要性不言而喻。因此,保密通信和信息安全越來(lái)越受到人們的重視。