• 介绍对称密码技术对称密码技术基础理论

    Introduce the basic theory of symmetrical encryption technology and asymmetrical encryption technology.

    youdao

  • 公开密钥基础设施PKI是一种利用非对称密码技术电子商务、电子政务电子事务的开展提供一整套安全保护的基础平台。

    Public Key Infrastructure (PKI) utilizes the asymmetrical cryptography technology to lay the security foundation for the electronic commerce, the electronic government and the electronic business.

    youdao

  • 介绍对称密码技术中的DESAESIDEA加密算法非对称密码技术中的RSAECC加密算法,给出混合密码算法的方案

    Introduced des, AES, and IDEA encryption algorithm, RSA, and ECC encryption algorithm, finally, produced the mix crypto-algorithm design proposal.

    youdao

  • SSL协议采用对称加密对称加密、信息摘要数字签名、数字证书密码技术

    SSL protocol USES symmetric encryption, asymmetric encryption, message digest, digital signature, digital certificate and other cryptographic techniques.

    youdao

  • 目前有几种加密技术对称密钥密码系统对称密钥密码系统。

    Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.

    youdao

  • 首先阐述密码相关概念然后传统密码技术现代对称密码算法对称密码算法及其安全性进行分析;

    Related conception is introduced at first, then the principle and security of conventional cryptology, modern symmetrical encryption algorithms and asymmetrical encryption algorithms are analysed;

    youdao

  • 密码技术主要包括对称密码算法对称密码算法协议

    It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.

    youdao

  • 目前在软件加/解密技术中应用密码体制主要分为对称密码体制非对称密码体制。

    RSA crypto-algorithm is recognized as the most mature and perfect in all asymmetrical key system at present.

    youdao

  • 第二章介绍基本应用密码算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

  • 第二章介绍基本应用密码算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定