综合运用对称加密算法和公钥算法,既保证敏感信息的存储安全又为密钥提供安全高效的管理。
This scheme used of symmetry encryption and public key encryption which provided secured storage for sensitive data and effective key management.
JCE 提供程序必须支持生成公钥和私钥的RSA算法。
The JCE provider must support the RSA algorithm type for generating public and private keys.
两个广泛使用的公钥加密算法是RSA(根据其发明者Rivest、Shamir和Adleman 命名)和DSA(数字签名算法)。
Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).
在此基础上我们构造出快速高效的公钥密码算法,并对该算法进行了安全性和效率分析。
And from which the fast and efficient public-key cryptosystems are constructed, and their security and efficiency are analysed.
水印的嵌入和提取算法都是公开的,公钥系统取代了普通的水印密钥。
The algorithms for the watermark embedding and extracting are both open, and public key cryptosystem is utilized instead of common watermark key.
大多数公钥算法,包括RSA和ECDSA,可以容易地扩展以支持数字签名。
Most public key algorithms, including RSA and ECDSA, can be easily extended to support digital signatures.
不对称加密算法(也称为公钥算法)要求每个实体都维护一对相关密钥:私钥和公钥。
Asymmetric cryptographic algorithms, also known as public-key algorithms, require that each entity maintains a pair of related keys: a private key and a public key.
文章阐述了数字签名技术原理,并介绍了数字签名中的关键技术:公钥加密体制和哈希算法。
In this paper, the principles of digital signature is given, Meanwhile the key technology of digital signature: public key cryptography and Hash algorithms is introduced.
本文算法主要适用于软件实现,在rsa和ecc等公钥体制实现中有广泛的应用。
The proposed algorithms are suitable for software implementations on gener - al-purpose microprocessors, and can be used in public key cryptographic applications such as RSA and ECC.
介绍了曲线公钥密码算法的体制和特点,着重分析了用椭圆曲线密码算法实现SSL协议的过程。
With the presentation of ECC algorithm and its traits, the thesis specially analyses the process by using ECC to implement SSL.
要生成一个新的公钥和私钥对吗?加密服务提供程序、密钥长度和散列算法的设置都会被保留。
Do you want to generate a new public and private key pair? The cryptographic service provider, key length, and hash algorithm Settings will be preserved.
公钥加密算法和追踪算法结合在一起,可构成一个公钥广播加密方案。
A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.
智能卡上的常用公钥算法为RSA和ECC算法。
RSA and ECC are two public-key algorithms generally used on smart card.
提出一种基于图像特征和公钥密码系统的易损水印算法,在图像认证中能够定位图像被篡改的位置。
A new invisible watermarking technique which could localize tampered areas for image authentication was proposed, based on image feature and public key cryptography.
此外,文中以公钥与单钥算法相结合的方式来确保数据的安全传输和认证。
In addition, public key and symmetric key operations are employed simultaneously to ensure the secure transmission and authentication of data.
实践表明,这种基于复合加密的公钥密码系统,算法的时间复杂度和空间复杂度并未受到影响,但其安全性较早期各同类系统更高、更易被用户采纳。
It is proved that this public key cryptosystem based on compound encryption has not been influenced on time complexity and space complexity, but it has more security t.
文章对生成密钥过程中所需参数进行分析和讨论,并结合实例对RSA公钥密码算法进行了实现。
The paper analyzes and discusses the process about it, and combines the instance to implement RSA algorithm.
该算法同时可以用做加密和签名,并且具有原来的有限自念头公钥体系体例的加、解密速度快等长处。
This algorithm can be used to encrypt and implement digital signatures, and still retains merits of early FAPKC's such as the fast speed, relatively short public key etc.
该方案将对称加密算法、椭圆曲线公钥加密算法和单向函数有机结合,实现了用户使用权限和关键敏感字段的安全级别的关联。
Here we give a simpler implement, which encrypts the sensitive data at each level with a key unique to that level, whose security is based on elliptic curve discrete logarithm problem.
公钥基础设施(PKI)通过公钥算法来实现身份认证和密钥交换,但由于其采用集中管理的模式,容易成为网络访问的瓶颈。
Public key infrastructures (PKI) achieve authentication and key exchange by utilizing public key cryptography; however, the system's centralized models tend to be the bottleneck in the network.
此属性标识创建XML数字签名时涉及到的所有加密功能,包括哈希算法、公钥算法、消息身份验证代码(MAC)和填充。
This property identifies all cryptographic functions involved in creating an XML digital signature, including hashing, public key algorithms, Message Authentication Codes (MACs), and padding.
这部分描述如何创建和管理密钥以及如何使用公钥和私钥算法对数据进行加密和解密。
This section describes how to create and manage keys and how to encrypt and decrypt data using public-key and secret-key algorithms.
公钥密码是实现网络安全和信息安全的重要技术之一,而传统的公钥密码算法速度较慢。
Public key cryptography is an important technique to realize network security and information security. But the traditional public key cryptosystems are proved quite slow.
公钥密码是实现网络安全和信息安全的重要技术之一,而传统的公钥密码算法速度较慢。
Public key cryptography is an important technique to realize network security and information security. But the traditional public key cryptosystems are proved quite slow.
应用推荐