在加密算法列表框中可以选择对称算法,使用该算法可以加密 SOAP消息正文中包含的服务数据对象。
The encryption algorithm list box lets you choose the symmetric algorithm to be used to encrypt the service data object contained within the SOAP message's body.
加密算法通过在消息上执行一连串的数学操作从而对消息进行加密或解密,转换的是消息的外观而非其内容。
Encryption algorithms encrypt or decrypt messages by performing a sequence of mathematical operations on the message, transforming its appearance but not its content.
确保充分健全的加密算法,比如三重DES或者AES,用来加密所有存储在系统上的机密信息。
Ensure that a sufficiently robust encryption algorithm, such as triple DES or AES, is used to encrypt all confidential information stored on the system.
而且谁会希望在一个第三方网站上通过加密算法同时运行12个email帐号,我可不想那样。
And who wants to run off to a third party website and run a dozen email addresses through an encryption algorithm one at a time? Not me.
因为OpenBSD项目是在加拿大进行的,所以其中应用的加密技术不受美国的出口限制,这使得该分发版可以充分利用各种现代的加密算法。
Because the OpenBSD project is based in Canada, no United States export restrictions on cryptography apply, allowing the distribution to make full use of modern algorithms for encryption.
使用加密算法的保密性由这样一个事实保证,即生成与哈希值匹配的明文在计算上是不可行的。
The encryption using crypto algorithms is ensured by the fact that it is computationally infeasible to generate plaintext that matches the hash value.
选择在IPSec隧道中加密数据所用的加密算法和散列算法。
Select Encryption algorithm and hashing algorithm you want to use in your IPSec tunnels to encrypt the data.
大部分Web开发者和用户仍然忽略了基于浏览器的加密算法带来的在Web应用程序引入传统软件的隐私和安全性的机会。
Web developers and web users are still largely ignoring the opportunity offered by browser-based cryptography to bring the privacy and security of traditional software programs to web applications.
在加密和数字签名中,所有的事情都最终归结为生成密钥的加密算法。
In encryption and digital signatures, everything ultimately boils down to the cryptography algorithms used to generate keys. Here are the criteria on which the key generation algorithms are based.
而随机数在信息安全领域有着重要的应用,各种加密算法都需要随机数来生成加密参数或密钥。
In the security field, random number generator has important applications such as generating the key or the parameters of the encryption.
混沌密码算法是一种快速加密算法,在安全性要求较高的领域中,有着非常广阔的应用前景。
As a fast encryption algorithm, the chaotic cryptographic method has quite wide applications in the field of security.
此外,证明了方案中加密算法在DDH假设和适应性选择密文攻击下是安全的。
The encryption algorithm in the scheme is semantically secure against adaptive chosen cipher-text attacks based on the DDH assumption.
在传输方面,采用已通过国家密码管理委员会认证的硬件芯片加密算法的数据加密传输技术实现硬件加密。
The data encryption transmission technology realized by hardware chip was adopted to realize hardware encryption, which was authenticated by the national cryptogram management committee.
文中以DES加密算法为例,在分析DES加密过程、密钥计算、加密函数和解密过程的基础上,探讨分组密码的设计原则。
The general design rules of block cipher is discussed by analyzing the encryption process, key generating, encryption function and decryption process of des algorithm.
针对现有流媒体加密算法在安全性、通用性和实用性方面存在的缺陷,提出一种全新的基于混沌参数可变序列的流加密算法。
Aiming at the current faults of algorithm for video encryption which existed in security, compatibility and practicality, it was proposed a chaos based algorithm for video encryption.
文章主要讲述了AES加密算法,在分支编码本(OCB)模式下的AES加密机制原理,AES算法在WLAN中的应用,以及现有的一些针对AES算法的攻击方法。
This paper describes AES and Rijndael algorithm, a ciper suite based on the AES and Offset Codebook (OCB) mode, the implementation of AES in WLAN, and some attacks on the ciper AES.
在简化pki系统的研究中,本文首先介绍基于身份的加密算法,然后结合单向哈希链,提出一种基于IBE的改进PKI系统。
In the research of simplifying PKI system, this paper proposes an improved PKI system based on the combine of the IBE and the one-way hash chain.
加密算法在成为加密标准到今天,经历了长期的考验。
DES (Data encryption standard) encryption arithmetic has stood the long test from when it became the encryption standard to now.
第七章对加密算法和密钥,以及在一卡通系统的产生、使用与管理提出了安全性的研究。
In chapter 7, it produces researches of encryption algorithm, secret-key's produce, and its use, management security.
基于网络的数据传输安全问题是信息安全领域的重要课题之一,本文在分析现有数据加密方法的基础上,在数据传输系统中应用一种基于分组密码新概念的新算法—排列码加密算法。
In this paper, a permutation code security algorithm based on the block cipher that is widely used in the data transmission system is put up after carefully studied the current encryption methods.
同时对椭圆曲线加密算法和本文所采用的算法对加密效果进行了分析,发现本文所采用的算法在保密效果和加密速度方面要优于椭圆曲线加密算法。
We contrast the result of Elliptic Curve Cryptographic Algorithms and the algorithm given in this paper, the latter is better in the effect and speed of encryption.
在派生类中重写时,获取一个使用指定的加密算法加密XML 的转换。
When overridden in a derived class, gets a transform that encrypts XML using the specified cryptographic algorithm.
最后,给出该协议在使用了加密算法后,在安全性方面的性能,以及整个系统需要完善和改进的工作。
At last, we provide the performance of the Arithmetic, and the works to be complemented are given.
在派生类中重写时,获取指定的非对称加密算法。
When overridden in a derived class, gets the specified asymmetric cryptographic algorithm.
数字签密是一种带加密功能的数字签名,它是公钥加密算法和数字签名在更高层次上的结合。
Digital signcryption is a new kind of digital signature which integrates public key encryption and signature simultaneously in a logic step.
加密算法的安全性在很大程度上取决于暴力破解的不可行性。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
基于级联空间混沌系统的选择图像加密算法是在将上述算法结合选择图像加密后提出的。
We combine the above algorithm with selective image encryption and propose a selective image encryption based on couple chaotic systems.
在论文中首先介绍了加密算法的数学基础,理论上说明了RSA算法的原理,以及RSA算法中参数的选择。
In the paper first the encryption algorithm is introduced based on the mathematical and theoretical introduction of the RSA algorithm theory, RSA algorithm and the parameter choices.
该机制通过非对称加密算法、随机密钥加密用户备份信息,以及“一次一密”加密数据库等手段有效解决传统密钥恢复机制在密钥产生、存储、备份、恢复过程中的安全问题。
In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.
摘 要:鉴于加密算法在卫星网络中的重要作用,评估加密算法在卫星网络中实际应用的安全性具有现实意义。
Absrtact: Whereas important functions of cipher in satellite network, research on cipher security in satellite network has realism sense of evaluating cipher security in satellite network.
应用推荐