encryption, data造句
例句與造句
- We apply the elgamal and dsa algorithm on the curve , and give the method of data encryption , data decryption and data signatuxe based on the elliptic curve
參考現(xiàn)有的公鑰密碼算法: elgamal 、 dsa算法的原理,說明基于橢圓曲線的數(shù)據(jù)加密、解密與數(shù)字簽名的方法。 - In order to guarantee the security and the reliability , the technologies of identification and validating , access control , auditing , data encryption , data backup online and so on , are adopted
為保證系統(tǒng)的安全性和可靠性,系統(tǒng)采取了身份識別與驗(yàn)證、訪問控制、審計(jì)、數(shù)據(jù)加密、在線備份等措施。 - The emphasis of the paper is to present a solution to security problems in wlan , which is based on the fundamental topological structure of infrastructure . the design includes four main modules : data encryption , data integrality code , key management and authentication
該方案基于有中心的無線局域網(wǎng)拓?fù)浣Y(jié)構(gòu),包含了數(shù)據(jù)加密、數(shù)據(jù)完整性認(rèn)證、密鑰管理和身份認(rèn)證等四個(gè)基本模塊。 - It contains the architecture , algorithms , and protocols etc . main contributions of the work are as follows : firstly , the security architecture , requirements , mode , and algorithms , protocols flows of 3g needed are formalized ; second , the radio access encryption , data confidentiality and data integrity technology are also deeply discussed ; third , a detailed analysis of the standardized fs and f9 is given ; at the same time , the two algorithms are realized ; next a scheme to implement fd - f5 algorithms 3g needed is proposed on the basis of 3g architecture , we also analyzed its practicability ; then according to provable security theorem and the differential and algebraic cryptanalysis , we analyze the kasumi algorithm to know the security level of it ; two systems to implement the security in the network - domain are given aiming at resolving the security problem in the fixed network : one is a global system ; the other is called two - tiered key management system by use of ipsec , ike
首先概要的總結(jié)了3g的安全結(jié)構(gòu),安全需求,安全模式以及算法和協(xié)議流程,對無線接入網(wǎng)的安全實(shí)現(xiàn)、數(shù)據(jù)加密的實(shí)現(xiàn)、數(shù)據(jù)的完整化保護(hù)等進(jìn)行了深入的探討,詳細(xì)的闡述了其中用到的標(biāo)準(zhǔn)化算法f8 , f9 ,并對這兩個(gè)算法進(jìn)行了實(shí)現(xiàn)。然后在此基礎(chǔ)上提出了實(shí)現(xiàn)3g中需要的算法f0 - f5的方案,并分析了其可行性;根據(jù)可證明的安全理論詳細(xì)分析了kasumi算法,從而對標(biāo)準(zhǔn)化算法有了一個(gè)理性的認(rèn)識,更加清楚的知道了它的安全度;接著利用數(shù)學(xué)、差分等方法對kasumi進(jìn)行了實(shí)際的分析,證明其是安全的。文章接著在無線接入網(wǎng)的安全體制基礎(chǔ)上進(jìn)一步給出了兩種實(shí)現(xiàn)網(wǎng)絡(luò)域內(nèi)安全的密鑰管理體制,解決了固定網(wǎng)內(nèi)的安全:一個(gè)是宏觀的安全體制;一個(gè)是two - tiered (兩階)安全體制,后一種體制是在ipsec , ike的基礎(chǔ)上提出和完善的。 - Block cipher is an important branch of cryptology , it has many attractive features such as high rates , easy for standardization , and efficient for both software and hardware implementations . block ciphers are usually core components in information and internet security for data encryption , data signature , authentication and key management
分組密碼是密碼學(xué)的一個(gè)重要分支,它具有速度快、易于標(biāo)準(zhǔn)化和便于軟硬件實(shí)現(xiàn)等特點(diǎn),通常是信息與網(wǎng)絡(luò)安全中實(shí)現(xiàn)數(shù)據(jù)加密、數(shù)字簽名、認(rèn)證及密鑰管理的核心體制。 - It's difficult to find encryption, data in a sentence. 用encryption, data造句挺難的