permutation code造句
例句與造句
- 四 、 we adopt encryption and decryption technology based on permutation code
四、我們采用排列碼加密算法進(jìn)行加密、解密。 - In this paper we mainly study the realization of digital signature card based on permutation code
本文主要研究基于排列碼加密解密算法的數(shù)字簽名智能卡的實(shí)現(xiàn)。 - Permutation code broke through the traditional concept of block algorithm , and improved the encrypt intensity greatly
排列碼加密解密算法突破了傳統(tǒng)的分組密碼的舊觀念,使加密強(qiáng)度有了較大幅度的提高。 - Compare dbs aes with permutation code , we found use encryption and decryption technology based on permutation code , can ensure the encrypted software ca n ' t be pirated
對(duì)比des 、 aes ,說(shuō)明使用排列碼加密算法,是可以保證被加密的軟件安全性的。 - The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm , md5 one - way hash function and permutation code at the same time
保密散列數(shù)字簽名算法利用rsa公鑰密碼體制的原理、 md5單向散列函數(shù)和排列碼加密的思想,構(gòu)造了一種能夠快速實(shí)現(xiàn)數(shù)據(jù)保密、數(shù)字簽名的簽名方案。 - It's difficult to find permutation code in a sentence. 用permutation code造句挺難的
- The system makes full use of the principle of public key , message digest and permutation code accomplished rapidly data encryption and data transmission , digital signature
應(yīng)用這種安全算法的網(wǎng)絡(luò)數(shù)據(jù)傳輸系統(tǒng)利用公鑰密碼體制的原理、消息摘要和排列碼加密算法的思想,構(gòu)造了一種能夠?qū)崿F(xiàn)數(shù)據(jù)快速加密、快速傳輸、并具有數(shù)字簽名功能的安全傳輸系統(tǒng)。 - We regulate a command - response pair for the encryption / decryption operation based on permutation code , combining rsa and md5 used in cos safety module , and bring forward a safety transmission process for documentation
并給排列碼加密解密操作賦予相應(yīng)的命令應(yīng)答對(duì),結(jié)合智能卡操作系統(tǒng)的安全模塊中的rsa算法和md5算法,提出了使用這種數(shù)字簽名卡進(jìn)行文件安全傳輸?shù)倪^(guò)程。 - The permutation code encryption and its key management and digital signature by rsa contribute to the high intensity combination security algorithm which is verified by both theory analysis and simulation results with high running speed
理論和實(shí)驗(yàn)結(jié)果均表明,應(yīng)用排列碼算法加密明文數(shù)據(jù)并結(jié)合rsa算法進(jìn)行密鑰管理和數(shù)字簽名可以得到加密強(qiáng)度很高的安全算法且算法的運(yùn)行速度也很快。 - The secret hash digital signature is a new signature method that combines the ideas of rsa public - key algorithm , md5 one - way hash function and permutation code at the same time , which is more secret , occupies less space and runs in higher speed
保密散列數(shù)字簽名算法結(jié)合了rsa公鑰密碼體制、 md5單向散列函數(shù)和排列碼加密解密算法的思想,實(shí)現(xiàn)了一種速度快、保密性強(qiáng)的數(shù)字簽名方案。 - It ' s worth notice that , because the efficiency of public - key cipher is low , we introduce symmetric cipher , permutation code , and asymmetric cipher , rsa algorithm into the system to advance the efficiency of the whole system
值得指出的是,由于公鑰密碼體制效率較低,所以該系統(tǒng)采用對(duì)稱密碼算法和公鑰密碼算法相結(jié)合,采用排列碼加密解密算法和rsa算法相結(jié)合,充分利用兩者的優(yōu)點(diǎn),彌補(bǔ)其不足。 - In this paper we firstly discuss the general concepts of compter security and cryptology , and then describe the mostly used modern encryption methods and technologies . we detail the advantages and disadvantages of symmetric algorithm , public - key algorithm and one - way hash function . at last we put forward a new block cipher - permutation code , and describe the secret hash digital signature and online electronic contracting with the trusted third party system
本文首先討論計(jì)算機(jī)安全和密碼學(xué)的一般概念,然后介紹現(xiàn)代加密手段常用的方法和技術(shù),詳細(xì)討論了對(duì)稱加密方法、公開(kāi)密鑰加密方法和單向散列加密方法的優(yōu)點(diǎn)和不足,進(jìn)而提出了一種新型的分組加密算法?排列碼加密算法,并在此基礎(chǔ)上實(shí)現(xiàn)了保密散列數(shù)字簽名算法和有可信第三方參與的網(wǎng)上電子簽約。 - Firstly , we discuss the general concepts of computer security and cryptology and describe the mostly used modem encryption methods and public key technologies including other typical algorithms . secondly , we put up a new combined security algorithm applied in the data transmission at network system on the base of introducing permutation code encryption ( a new type of block cipher ) , and design the transmission system
本文首先討論了數(shù)據(jù)加密技術(shù)中主要的數(shù)據(jù)加密方法,詳細(xì)討論了傳統(tǒng)密碼加密方法和公開(kāi)密鑰加密方法及其他典型加密方法,并介紹了一種新型的分組密碼算法?排列碼加密算法,進(jìn)而提出了一種應(yīng)用于網(wǎng)絡(luò)數(shù)據(jù)傳輸中的安全算法。 - The fundamentals and basic flow of genetic algorithm are discussed in detail . associated with the production mode and characteristics of wall - paper industry , its production scheduling belongs to the hybrid flow shop ' s problem . applied based - on permutation coding genetic algorithm and used minimal production time as target function , it is solved the problem of low efficiency of wall - paper production equipments " utility that is caused by manpower scheduling and improved the production efficiency
2 )對(duì)生產(chǎn)調(diào)度問(wèn)題的研究現(xiàn)狀和研究方法做了綜述和整理,深入探討了遺傳算法的基本原理和基本流程,并結(jié)合墻紙行業(yè)的生產(chǎn)模式和生產(chǎn)特點(diǎn),指出其屬于混合flowshop問(wèn)題,采用基于置換編碼的遺傳算法,并以最小生產(chǎn)時(shí)間作為目標(biāo)函數(shù),較好的解決了由人工調(diào)度帶來(lái)的墻紙生產(chǎn)設(shè)備使用效率偏低的問(wèn)題,提高了生產(chǎn)效率。 - Network based data transmission security is one of the critical task in information security field . in this paper , a permutation code security algorithm based on the block cipher that is widely used in the data transmission system is put up after carefully studied the current encryption methods
基于網(wǎng)絡(luò)的數(shù)據(jù)傳輸安全問(wèn)題是信息安全領(lǐng)域的重要課題之一,本文在分析現(xiàn)有數(shù)據(jù)加密方法的基礎(chǔ)上,在數(shù)據(jù)傳輸系統(tǒng)中應(yīng)用一種基于分組密碼新概念的新算法?排列碼加密算法。 - In this paper , against so many kinds of hazards in e - mail application , not changing the e - mail protocols in existence , we embed a good encryption algorithm , permutation code in the system to safeguard the information of e - mail , introduce public - key cipher to implement transfer of session keys safely , implement authentication and integrity of information , and introduce essential key management mechanism
本文針對(duì)電子郵件面臨的種種安全威脅,在不改變現(xiàn)有電子郵件協(xié)議的前提下,嵌入性能良好的排列碼加密解密算法來(lái)保障郵件信息的安全,同時(shí)采用公鑰密碼體制來(lái)保障密鑰的安全傳遞,并實(shí)現(xiàn)消息的身份認(rèn)證及數(shù)據(jù)完整性;還引入了必要的密鑰管理機(jī)制。