All important plans were sent to the police in cipher.
所有重要计划均以密码送往警方。
这是密码电报。
The concrete example of this scenario in Cipher Text is the record editor.
在这种情况下,在密文具体的例子是记录编辑器。
Stream cipher and block cipher are main cipher systems in image encryption algorithm based on bit operation.
流密码与分组密码是基于位运算的图像加密算法中两种主要密码体制。
The listener deciphers what you said according to his own reference of blueness and transmits it to you in his own cipher.
听者根据他自己对蓝色的理解来破解你的话,再用他自己的密码传达给你。
I use a block cipher algorithm for encryption that requires the clear data bytes to be in blocks of 8 bytes, so I pad the last incomplete block with some characters.
我对需要将明文数据字节放在8字节块的加密使用块密码算法,所以我用一些字符填充最后一个不完整的块。
Or it could be a cipher, in which text is converted into other text using some algorithm.
或者可以是密码的形式,通过某种算法将某种文本转换为其他文本。
If they do not have a cipher suite in common, then secure communication is not possible and CICS closes the connection.
如果它们没有共通的密码组合,那么就不可能实现安全通信,CICS会结束连接。
You can set a minimum as well as a maximum encryption level by editing the list of cipher suites in the CIPHERS attribute on the IPCONN and TCPIPSERVICE resource definitions.
通过编辑IPCONN和TCPIPSERVICE资源定义上的CIPHERS属性中的密码组合列表,您可以设置加密级别的最小值和最大值。
In the IPCONN and TCPIPSERVICE definitions in the CICSB region, set the cipher related attributes.
在CICSB区域的IPCONN和TCPIPSERVICE定义中,设置与密码相关的属性。
Switch to the SSL TAB view, and specify a cipher specification (in this case, use RC4_MD5_US).
切换到SSL选项卡视图,然后指定一个密码规范(在这个例子中使用RC4_MD5_US)。
It then passes the extracted Base 64 encoded cipher value, the decryption key, and the algorithm name to a method named decrypt (examined in Cryptography).
接着它将抽取出的用Base 64编码的密码值、解密密钥以及算法名称传递给名为Decrypt的方法(见密码术中的研究)。
All values in a specific column of a database table are encrypted with the same password provided by the user, the same encryption algorithm, and the same cipher mode.
一个数据库表中某个特定列中的所有值都以用户提供的相同密码、相同的加密算法和相同的加密方式进行加密。
Ravi and his colleague Kevin Knight treat translation as a cryptographic problem, as if the foreign text were simply English written in an advanced cipher.
拉维和他的同事凯文·奈特把翻译当做加密问题,好像外国文字也是用英文书写,只不过使用了某种高级的加密方式。
You continue chaining blocks in this manner, one after the other, to produce a cipher text form of each of the blocks.
以这种方式继续一块接一块地生成每一个块的密文形式。
One byte of cipher text is generated for every byte of plain text contained in the message.
对包含在信息中的普通文本的每一个字节产生密码文本的一个字节。
The listener then deciphers this according to his own reference of blueness and transmits it to you in his own cipher.
然后听者根据他自己对蓝色的理解来破解你的话,再用他自己的密码传达给你。
Represents the cipher mode used in the symmetric algorithm.
表示对称算法中使用的密码模式。
And then compile it and run it to cipher the message in hello.txt.
然后,编译这个程序并运行它来加密hello . txt中的消息。
When you establish an SSL connection between CICS TS and TXSeries, the client and server exchange information about which cipher suites they have in common.
在CICSTS与TXSeries之间建立SSL连接时,客户端与服务器根据它们共有的密码组合交换信息。
Next I create a Cipher class object and initiate it in encryption mode.
接着创建cipher类对象,并以加密方式对它初始化。
A Cipher class object is created and initiated in the decryption mode.
这样就用解密方式创建并初始化了cipher类对象。
For the J2ME-based Kerberos client, I'll only support one encryption algorithm, which is DES (data encryption standard) in CBC (cipher block chaining) mode.
对这个基于J2ME的Kerberos客户机,我将只支持一种加密算法,即CBC(密码分组链接cipher block chaining)模式下的DES(数据加密标准)。
In the history of cryptography, the Enigma was a portable cipher machine used to encrypt and decrypt secret messages.
在密码学的历史上,谜是一轻便的密码机可将秘密通讯电文加密和解密。
Thee tweet is a substitution cipher, in which each letter is swapped for another.
这则推特消息是一个替代密码。每一个字母都被另一个替代。
In this paper, we point out some properties of the differential sequence, discuss the applications of differential cryptanalysis in sequence cipher attack and provide an attack sample.
给出了差分序列的若干性质,对差分分析方法在序列密码中的应用作了一些探讨,并给出了攻击实例。
In many cipher system, the pseudo random sequence generator is an important part in system security.
在许多密码系统中,伪随机序列生成器是系统安全的一个重要组成部分。
Set forth a cipher synchronization scheme in the connectionless oriented IP layer, also present the state transform map of this secure protocol.
给出了面向非连接通信协议IP层的密码同步的解决方案和安全协议的运行状态图。
I will not write down his real name even in this bothersome Yiddish - letter cipher.
即使是用难以辨认的意弟绪语字母的密码,我也不愿意在这里写下他的真实姓名。
I will not write down his real name even in this bothersome Yiddish - letter cipher.
即使是用难以辨认的意弟绪语字母的密码,我也不愿意在这里写下他的真实姓名。
应用推荐