Run an md5 algorithm against the binary class files.
对二进制类文件运行md5算法。
The MD5 algorithm is the DE facto hashing standard for digests.
MD 5算法是事实上的标准摘要哈希算法。
Use this algorithm for improved security over the MD5 algorithm.
使用这个演算法可以改善MD 5演算法的安全性。
A web site update auto-checking system is designed by the MD5 algorithm.
通过MD 5算法设计了一个网站更新自动检测软件。
Attack technology of MD5 algorithm is analyzed and researched deeply in this paper.
本论文对MD5算法的攻击技术进行了深入的分析和研究。
Now the MD5 algorithm will falsely verify that the signature matches the new contents.
因此MD 5算法会错误地认为签名与新内容是匹配的。
This text has described the analysis, design and its realization course on MD5 algorithm.
本文论述了对MD 5校验算法的分析、设计及其实现过程。
The SHA algorithm is more secure, producing a 160-bit output compared to the MD5 algorithm's 128-bit output.
与MD 5算法的128位输出相比,sha算法更安全,它产生160位输出。
It can also use a password encrypted with the MD5 algorithm as opposed to the plain text password of LILO.
它还使用一个通过MD 5算法加密的密码,而不是LILO的纯文本密码。
To validate credentials, the user password is hashed using the MD5 algorithm and compared to the stored value.
为了验证认证,会使用MD 5演算法杂凑使用者密码,并与储存值做比较。
This paper introduces the MD5 algorithm and security analysis. A new keyed hash algorithm based on MD5 is proposed.
介绍了MD 5算法及对它的安全性能分析,提出了一个基于MD5的键控散列算法。
To make an attack, the attacker needs to buy several SSL certificates from CAs who sign certificates with the MD5 algorithm.
要实现攻击,攻击者需要先从使用MD 5算法签署证书的CA购买若干ssl证书。
The design of a simulation system security log user interface, using MD5 algorithm users log on password security authentication.
设计一个模拟的系统用户安全登录界面,采用MD5算法实现用户登录口令的安全认证。
Security researchers have recently demonstrated exploits against the MD5 algorithm which allowed them to forge usable certificates.
安全调查人员最近证明,利用MD5算法允许他们伪造可用的证书。
MD5 algorithm is an authentication method used in a broad research field. The data encryption techniques are summarized in this paper.
MD 5报文摘要算法是一种应用广泛的身份认证算法,该文首先对数据加密技术进行了简要的概述。
This paper introduces MD5 algorithm, then gives the whole framework and schemes of design and implementation of important modules in IP-CORE.
文章介绍了MD5算法,给出了IP核的整体架构及其重要模块的设计实现方案。
The authors analyzed the principle of the MD5 algorithm in details, and discussed a improved method that the application of MD5 algorithm in distanced-identity authentication.
作者详细分析了MD5算法的实现原理,然后提出MD 5算法在远程身份认证的实际应用和实现。
A large number of security questions appear while storing data, the data that usually store needing at present are encrypted then stored, it is a good choice to use MD5 algorithm.
针对数据在存储的时候存在大量的安全问题,目前通常将需要存储的数据进行加密然后再存储,应用MD 5算法是一个不错的选择。
MD5 algorithm is used to implement the authentication process. DES algorithm combined with asymmetric encryption and digital signature to ensure the safety of information transmission.
MD 5算法用来实现身份认证过程,DES算法结合非对称加密和数字签名技术来保证信息的安全传输。
This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.
这种攻击并不意味着整个互联网或者SSL安全已经被突破,但的确意味着厂商应该不再用MD 5作为签名算法。
The GUI tools do not expose controls that enable selection of the certificate signing algorithm, and they default to MD5 signatures.
但GUI工具不能公开那些支持选择证书签名算法的控件,因此默认支持MD 5签名。
Instead, the clear-text passwords are hashed using an MD5 hash algorithm by the plug-in applications and are stored in this hashed form in the database.
插件应用程序使用MD 5散列算法对明文密码进行散列计算,并在数据库中存储散列形式的密码。
Changing to a more complex algorithm, say from MD5 to SHA-2, 16 does little to restore password integrity.
变更为更复杂的算法,比方说从MD 5变更为SHA - 2,16对恢复秘密的完整性没什么作用。
For added benefit, using a one-way encryption algorithm or hash, like MD5 14 or Blowfish, 15 will make decrypting the password impossible.
为了更多的利益,利用单向加密算法或散列,像MD 514或Blowfish,15将使密码的解密成为不可能。
I'll explain the use of message digest algorithms in the next article of this series, but for now just note that I'm going to use the MD5 message digest algorithm in the Kerberos client.
我将在本系列的下一篇文章中解释消息摘要算法的使用,但是现在只要知道我要在Kerberos客户机中使用MD 5消息摘要算法。
The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing algorithm (SHA-1).
类型属性指出了hash算法,例如消息摘要算法5 (MD5)或安全哈希算法(SHA - 1)。
The MD5 password encryption algorithm further improved security by allowing more robust passwords. An example of a shadow password entry is below.
MD 5密码加密算法支持更为可靠的密码,从而进一步提高了安全性。
Each check attribute constitutes an MD5 hash (a message digest algorithm commonly used in generating cryptographic hashes) of the following concatenated string.
每个check属性组成了以下连接字符串的MD 5散列(一种通常用于生成加密散列的消息摘要算法)。
Based on RSA algorithm of unsymmetrical cryptographic system and MD5 message-digest algorithm, the paper presents a digital signature scheme based on IC card.
在基于非对称加密系统中的RSA算法和MD 5报文摘要算法上,提出了一种基于IC卡的数字签名方案。
Based on RSA algorithm of unsymmetrical cryptographic system and MD5 message-digest algorithm, the paper presents a digital signature scheme based on IC card.
在基于非对称加密系统中的RSA算法和MD 5报文摘要算法上,提出了一种基于IC卡的数字签名方案。
应用推荐