RSA security is based on complex problem of large number factoring, and factorization algorithms that attack RSA system in use are introduced simply.
RS A密码系统的安全性是基于大数分解困难问题。文中简要地介绍了目前攻击RSA密码系统的常用大数分解算法。
Targets have included Citigroup, Lockheed Martin and even RSA Security, which makes password tokens that big companies use to protect themselves from intrusion.
攻击的目标包括花旗集团、洛克希德·马丁(Lockheed Martin),甚至连给大公司制作令牌密码来防御入侵的RSA公司无法避免。
Talking TOKENS in support of federal regulations regarding disabilities, RSA Security provides a talking token that with the press of a button audibly announces the authentication code.
为支持关于无力的联邦规则讲话表征,RSA安全提供一个说话的表征以由于一个按钮的新闻媒体可听见地宣布证明密码。
The Jericho Forum plans to release a paper about cloud architecture, its benefits and security concerns during the RSA Conference next week in San Francisco.
Jericho论坛将于下星期在洛杉几举行,届时还将推出一份关于云架构、云收益和云的安全隐患的系列文件。
Then computer security firm RSA had their servers breached, an attack that may have led to the hacking of defence giant Lockheed Martin, an RSA client.
然后从事电脑安全的企业RSA,它的服务器被黑客破坏,这个攻击或许导致RSA大客户LockheedMartin的 电脑防御系统失效。
Lotus Notes was the first important commercial product to use RSA cryptography, and from that point on, users considered security as a prime feature of Lotus Notes.
LotusNotes是采用rsa加密的第一种重要的商业产品,此后用户将安全看作是Lotus Notes的主要特点之一。
The malware that led to the hacking of security giant RSA may have been a "zero-day attack" – ie, it had never been seen before – but the method of infection was nothing new.
恶意软件导致安全巨人RSA公司遭到“zero-day attack”攻击(指系统有缺陷,被黑客抓住而发起的攻击)--通过IE,以前没有发生过这种事--但是攻击的技术却是老套。
"This is a loud message for the commercial world, which is wake up, this isn't all happiness and goodness and new business," said Sam Curry, vice-president of security firm RSA.
“这是向商界发出的响亮信息:醒醒吧,现实不完全是皆大欢喜、善行和新业务,”安全公司RSA副总裁萨姆·克里(SamCurry)表示。
New security functionality in Lotus Domino 7 included stronger keys for encryption (1024-bit RSA keys and 128-bit RC2).
LotusDomino7中新增安全功能包括更强的加密密钥(1024位RSA和128位RC2)。
Recently the computer-security company RSA (a division of EMC) was penetrated by an intrusion which appears to have stolen the secret sauce behind the company's SecureID.
近期,计算机安全公司RSA(美国EMC分公司)的网络遭到非法侵入,侵入者目的像是要窃取公司安全ID后的秘密系统。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
RSA cryptosystem, a public-key cryptosystem that being used widely today, seems to have difficulty to meet the user's need of higher security.
现在广泛使用的RSA公钥密码系统已很难满足未来人们对信息高安全性的需求。
The new scheme is secure under condition of intractability assumption of quadric remain and the security of RSA.
新方案效率高,在二次剩余困难假设和RSA安全的条件下是安全的。
RSA algorithm is a sort of public-key cipher algorithm with high security is used in both data encryption and digital signature.
RSA算法是一种既能用于数据加密也能用于数字签名的公钥算法,具有较高的安全性。
Finally, by setting up RSA digital signature of remote digital proof, the security of network transmission and validity of digital signature is assured.
最后,通过建立远程数码打样的RSA数字签名方案,保证了网络传输数据的安全性以及数字签名的有效性。
RSA Public Cryptogram algorithm is based on Theorem of Euler, whose security depends on the difficulty about the factor decomposed of great number.
RSA公钥密码算法的基础是欧拉定理,它的安全性依赖于大素数因式分解的困难性。
The scheme saves about 1/2 computation cost of the original scheme. The authors also analyze its security under strong RSA.
新方案的计算量约是原方案的1/2。在强RSA假设下,文中分析了改进方案的安全性。
Based on trapdoor one-way function, this paper presents a RSA -based probabilistic public-key algorithm with security and efficiency and the correctness of algorithm was proved.
根据单向陷门函数的陷门性质,文章设计了一种安全有效的基于RSA的概率公钥密码算法,并对其正确性进行了证明。
Lastly, the pape research security, reliability, validity of threshold RSA signature schemes and the system capability.
最后分析了系统采用门限签名方案的安全性、可靠性、正确性,以及系统性能。
This paper discusses on the problem of realizing the information security of network communication by using DES and RSA hybrid encryption technology.
探讨了采用DES和RSA混合加密方式来实现计算机网络通信中的信息安全的问题。
Its (security) is based on the intractability of the integer factorization problem as RSA, and it is able to resist the chosen-ciphertext attack against RSA and easy to be implemented.
它与RSA算法相似,其安全性基于大数因式分解的难度,能够抵抗对于RSA的选择密文攻击,并且易于软件实现。
A dynamic password authentication which is based on the Chinese remainder theorem and RSA public-key cryptography are represented. Finally analysis is made on the scheme security and feasibility.
最后提出一种基于公钥密码和中国剩余定理的动态口令验证方案,进行方案安全性及性能的分析。
Point out that ECC has many advantages over RSA and DSA, especially on security, speed, memory requirement, bandwidth requirement.
指出ECC与RSA、DSA等传统公钥密码体制在安全性、速度、内存需求、带宽需求等方面各自所具有的优势。
At the same time, same security level as RSA has can be achieved by ellipse curve-based zero knowledge proof with the key much shorter in length than that of RSA.
同时基于椭圆曲线上的零知识证明可以用比RSA短得多的密钥,达到与RS A同等级别的安全性。
This paper introduces the process about encryption and decryption of RSA encryption algorithm, and analyzes testing prime number and producing privacy key and security of RSA algorithm.
论述了RSA加密算法的过程,分析了算法中素数测试、密钥产生和现阶段的安全性。
Kinds of typical algorithms widely used are listed, such as DES, RSA and MD5, and we also discuss the security of them.
本章中还列举了DES、RSA、MD 5,等目前已经得到广泛使用的几种成熟算法,也讨论了这些典型算法的安全性。
Speak of add secret technology, have to carry company of RSA information security.
谈到加密技术,就不能不提rsa信息安全公司。
The shared key distributed by the dealer is encrypted based on ECC to enhance the security. Meanwhile the length of the key of ECC is much shorter than that of RSA cryptography.
分发的子密钥通过椭圆曲线密码进行了加密,使得受托人掌握的子密钥是加密后的密文形式,增强了安全性;
The realization based on RSA is introduced and the security is analyzed.
给出了基于RSA算法的具体实现,并分析了安全性。
The realization based on RSA is introduced and the security is analyzed.
给出了基于RSA算法的具体实现,并分析了安全性。
应用推荐