该程序将然后计算并显示密文。
这样将明文变成形式为一串数字密文。
本文的目的是寻求打破一密文的机制。
The objective of this article is to find a mechanism for breaking a cipher text.
随后,他需要类似功能的密文的地方。
Then followed the local governments who needed seals for similar function.
当解密的密文的最大长度是在字节模长度。
When decrypting the maximum length of the cipher text is the length of the modulus in bytes.
提出两个抗选择密文攻击的门限密码系统。
Two threshold cryptosystems secure against chosen ciphertext attacks are proposed.
建立密文数据库是实现数据安全的有效方法。
An effective method to realize database security is to establish encrypted database.
下面是有关明文、密文和密钥关系的表示法。
The following is a notation for relating plaintext, ciphertext, and keys.
密文块是通过8轮的替换和模加运算得到的。
The cipher blocks are obtained by 8 rounds of substitution and the Modulo-Plus function.
密文的大小是一个常量,并且与环的大小无关。
The size of the ciphertext was a constant and independent of the size of the ring.
回想在前面的讨论中说过,CBC要求密文块链接。
Recall from my earlier discussion that CBC asks for cipher-block chaining.
密钥:密钥是一种在明文与密文之间相互转换的方式。
Key: Key is a means of converting a plain-text into cipher-text and vice versa.
以这种方式继续一块接一块地生成每一个块的密文形式。
You continue chaining blocks in this manner, one after the other, to produce a cipher text form of each of the blocks.
最后,串接所有密文块以得到全部纯文本数据的密文形式。
At the end, you concatenate all of the cipher text blocks to arrive at the cipher text form of the complete plain text data.
在我们可以加密,我们需要知道的密文所需的缓冲区大小。
Before we can encrypt, we need to know the size of the buffer required for the cipher text.
接着,接收应用程序一接收到消息就对其解密,将它从密文转换回明文。
The receiving application then decrypts the message upon receipt, converting from ciphertext back to plain text.
只有国王的特殊密文,当时称为“西”,这代表了最高权威。
Only the king's special seal was then called 'Xi', which represented the highest authority.
通过使用动态密码对明文的修补,使其密文长度与明文长度相等。
The ameliorated algorithm ensures the length of cipher text is equal to the length of plain text by patching it with dynamic cipher.
根据加密数据库的特点,分析了建立密文索引需要考虑的主要因素。
According to the characters of the ciphertext database, the major factors to create a ciphertext index are analyzed.
第9步的结果是最后8字节块的加密结果(放弃所以以前的密文块)。
The result of the encryption of the last 8-byte block (discarding all previous cipher blocks) is the outcome of Step 9.
如果相同的块加密两次使用相同的密钥,由此产生的密文块是相同的。
If the same block is encrypted twice with the same key, the resulting ciphertext blocks are the same.
如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。
If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.
新方法中的推导规则既简单便捷同时又具有分析签名和分析密文的能力。
This approach provides a set of inference rules for reduction and analysis of signature and cryptograph.
在高密度随机背包困难性假设下,可以证明方案在唯密文攻击下是安全的。
Under the assumption that the random high-density knapsack problem is infeasible, the proposed schemes are provably secure against ciphertext-only attack.
根据des算法对密钥和纯文本统一处理以生成一个加密的(密文)形式的纯文本数据。
The key and the plain text are processed together according to the DES algorithm to produce the encrypted (cipher text) form of the plain text data.
此外,证明了方案中加密算法在DDH假设和适应性选择密文攻击下是安全的。
The encryption algorithm in the scheme is semantically secure against adaptive chosen cipher-text attacks based on the DDH assumption.
同时,传统的加密技术所得到的密文容易被攻击者发现,影响了信息的安全性。
Meanwhile, it is easy to discover cryptograph by traditional encryption technology by attacker and it affects security of information.
该方案被认为是抗适应性选择密文攻击的实用方案之一,但缺乏严格的安全性证明。
This scheme is regarded as one of practical schemes against adaptively chosen ciphertext attacks, but it is absent of rigorous proofs.
该方案被认为是抗适应性选择密文攻击的实用方案之一,但缺乏严格的安全性证明。
This scheme is regarded as one of practical schemes against adaptively chosen ciphertext attacks, but it is absent of rigorous proofs.
应用推荐