Ensure that a sufficiently robust encryption algorithm, such as triple DES or AES, is used to encrypt all confidential information stored on the system.
确保充分健全的加密算法,比如三重DES或者AES,用来加密所有存储在系统上的机密信息。
All the information necessary for decryption is present within the XML encryption tags: the name of the encryption algorithm, the type of data that was encrypted, and the name of the encryption key.
XML加密标记中存在着解密需要的所有信息:加密算法的名称、加密的数据类型以及加密密钥的名称。
An information encryption method is proposed based on digital holographic technique and phase retrieve algorithm.
提出了一种基于数字全息技术和相位恢复算法的信息加密方法。
According to the complexity of key generation and management process, this paper presents an encryption algorithm based on fingerprint to enhance the security of the digital information.
根据密钥产生和管理过程的复杂性,为增强数字信息安全性,提出一种基于指纹的数字信息加密算法。
Not changing the Video Conference protocols in existence, we embed a good encryption algorithm (Permutation Code) in the system to safeguard the information of Multimedia.
在不改变现有协议的前提下,嵌入性能良好的加密解密算法(排列码算法)来保障信息的安全;
An encryption algorithm based on data-scrambling is presented. Firstly, we extract odd number bits of the important information to form a new information.
提出一种基于数位置乱的加密体制,该方案中首先采用置乱算法将明文信息的奇数位提取出来组成一个新的信息;
The drawback is that anyone can have access to the information written on them, unless you protect the documents with a strong encryption algorithm.
其缺点是,任何人都可以访问对他们写的,除非你保护了强加密算法,文件中的信息。
This paper describes a new method in which a non-linear successive-displacement can be produced, and provides an algorithm of information bit-moving encryption.
本文研究提出一种统计规律不明显的非线性随机序列的发生方法及其对信息作非线性移位的加密算法,可以有效地提高密文的安全性。
And last elucidates the structure of the secure system. By aiming at PKI, information secure core technology and analyses the RSA algorithm and sorts of the tech of info exchanging encryption.
最后就信息交换加密技术的分类及RSA算法作以分析,并针对PK I技术这一信息安全核心技术,论述了其安全体系的构成。
MD5 algorithm is used to implement the authentication process. DES algorithm combined with asymmetric encryption and digital signature to ensure the safety of information transmission.
MD 5算法用来实现身份认证过程,DES算法结合非对称加密和数字签名技术来保证信息的安全传输。
Based on the analyzing of public_key cryptosystem, a practical algorithm of RSA is studied. A network information encryption and decryption system of end to end is developed.
基于对公钥密码体制的分析,研究了RSA密码体制的实现算法,开发了端对端的网络传输信息加密解密系统,在实际网络环境条件下进行的测试证明了其安全性和可靠性。
Based on the analyzing of public_key cryptosystem, a practical algorithm of RSA is studied. A network information encryption and decryption system of end to end is developed.
基于对公钥密码体制的分析,研究了RSA密码体制的实现算法,开发了端对端的网络传输信息加密解密系统,在实际网络环境条件下进行的测试证明了其安全性和可靠性。
应用推荐