第9步的结果是最后8字节块的加密结果(放弃所以以前的密文块)。
The result of the encryption of the last 8-byte block (discarding all previous cipher blocks) is the outcome of Step 9.
实际使用的安全系统中,信息进行加密后,只有借助一段数字密钥才能解密密文。
For a truly secure system, the message will be encrypted in a way that requires a mathematical key to unlock it.
拉维和他的同事凯文·奈特把翻译当做加密问题,好像外国文字也是用英文书写,只不过使用了某种高级的加密方式。
Ravi and his colleague Kevin Knight treat translation as a cryptographic problem, as if the foreign text were simply English written in an advanced cipher.
加密的文件系统(efs)是J 2文件系统级别的加密(通过单独密钥存储库)。
The Encrypted file system (EFS) is a J2 filesystem-level encryption through individual key stores.
根据des算法对密钥和纯文本统一处理以生成一个加密的(密文)形式的纯文本数据。
The key and the plain text are processed together according to the DES algorithm to produce the encrypted (cipher text) form of the plain text data.
现在,如果你有一些消息,那么你只需要将该消息的字节翻译成一个数“M”,若要对这个消息进行“加密”形成“密文”的话,你就这么计算
Now, if you have some message, you just need to interpret its bytes as a number "M." If you want to "encrypt" a message to create a "ciphertext", you'd calculate
在Axis2文章中可以找到对签名和加密的详细讨论,以及为WS - Security生成和使用自签名证书的详细信息。
See the Axis2 article for a more-detailed discussion of signing and encrypting in general and for details of generating and using self-signed certificates for WS-Security.
正如在“Axis2WS - Security签名和加密”一文中讨论的,非对称加密由于可处理密匙对,因此是一种很有用的工具。
As discussed in "Axis2 WS-Security signing and encryption," asymmetric encryption is a useful tool because it works with key pairs.
如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。
If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.
由于敏感数据被加密,任何直接对数据库文件进行分析的攻击方式,都只能看到密文。
Because the sensitive data is encrypted, any direct attack on the database file analysis, can only see the ciphertext.
如果相同的块加密两次使用相同的密钥,由此产生的密文块是相同的。
If the same block is encrypted twice with the same key, the resulting ciphertext blocks are the same.
在我们可以加密,我们需要知道的密文所需的缓冲区大小。
Before we can encrypt, we need to know the size of the buffer required for the cipher text.
同时,传统的加密技术所得到的密文容易被攻击者发现,影响了信息的安全性。
Meanwhile, it is easy to discover cryptograph by traditional encryption technology by attacker and it affects security of information.
提出了把秘密同态理论应用于加密数据库中重要或敏感的信息,从而可以实现直接对数据库密文进行操作的方法。
It is proposed to apply the theory of private homomorphism to encrypt the database important or sensitive information, thus realizing direct operation of encrypted message.
此外,证明了方案中加密算法在DDH假设和适应性选择密文攻击下是安全的。
The encryption algorithm in the scheme is semantically secure against adaptive chosen cipher-text attacks based on the DDH assumption.
同时对这种加密算法的明文密码空间、密文密码空间和加密强度等作了初步的分析。
Therefore the decryption time and difficulty can be greatly increased, and the cipher can be protected from decryption in this algorithm.
分析表明,该文所设计的加密算法不但能抵抗唯密文攻击,而且能有效地抵抗选择明文攻击。
The analysis indicates that the encryption algorithm not only can effectively resist cipher-text-only attack but also chosen-plaintext attack.
根据加密数据库的特点,分析了建立密文索引需要考虑的主要因素。
According to the characters of the ciphertext database, the major factors to create a ciphertext index are analyzed.
用户密钥加密运算后生成的密文存入密钥存储表密钥字段,用输入的密钥解此密文。
The key file was generated with encrypted user key to store in the field of key in key storage table, and the key file was decrypted with the inputted user key.
本文研究提出一种统计规律不明显的非线性随机序列的发生方法及其对信息作非线性移位的加密算法,可以有效地提高密文的安全性。
This paper describes a new method in which a non-linear successive-displacement can be produced, and provides an algorithm of information bit-moving encryption.
还有那两卷加密档案。库泰格是对的。瑞度里安水晶纸有够重。但她和尤洛特一样激动。肯定有什么重要的东西藏在这些密文里面。
Andthose two cryptic volumes. Kwuteg had been right in one thing. Riduliancrystal paper was heavy. But she shared Ulot's excitement. Somethingimportant was concealed in those lines of cipher.
同时对这种加密算法的明文密码空间、密文密码空间和加密强度等作了初步的分析。
The paper also tentatively discusses several related encryption algorithms to improve the security and analyzes the plaintext key space, ciphertext key space and encryption strength.
这个过程包括16轮,可以运行在四种不同的模式,加密模块单独或使每个密文块依赖所有前面的块。
The process involves 16 rounds and can run in four different modes, encrypting blocks individually or making each cipher block dependent on all the previous blocks.
分发的子密钥通过椭圆曲线密码进行了加密,使得受托人掌握的子密钥是加密后的密文形式,增强了安全性;
The shared key distributed by the dealer is encrypted based on ECC to enhance the security. Meanwhile the length of the key of ECC is much shorter than that of RSA cryptography.
为了保证密文数据在不解密的情况下能够被检索出来,日期、数字类型的数据需要按照一定的规则转换成字符,并且加密使用的分组密码算法需要进行一些改造。
In order to enable query on ciphertext, date and numeric typed data must be transformed according some rules, and the grouping cipher arithmetic must be changed a little.
提出一种基于混沌迭代的加密算法,这种加密算法根据混沌迭代确定的位置将明文填入一个较大的密文空间。
The plain text is filled into a larger cipher text space according to the position determined by the chaotic iteration.
这些加密都可以对输入数据量很大并且长度可变的明文进行加密,但是只有在明文的前 个分组处理完毕后才输出密文的第 个分组。
Three are ciphers that can take input plaintexts of large and varying lengths and will output the ith block of the ciphertext after having processed only the first i blocks of the plaintext.
用户密钥加密运算后生成的密文存入密钥存储表密钥字段,用输入的密钥解此密文。
The key file was generated with encrypted user key to store in the field of …
详细阐述了其加密原理和密文索引结构,对重复性数据的加密处理和算法抗攻击性进行了分析。
The encryption principle and index structure of encryption data are developed. The encryption processing of duplicate data and algorithm exposure are analyzed.
详细阐述了其加密原理和密文索引结构,对重复性数据的加密处理和算法抗攻击性进行了分析。
The encryption principle and index structure of encryption data are developed. The encryption processing of duplicate data and algorithm exposure are analyzed.
应用推荐