• RC4 is a stream cipher algorithm operating on each byte of data; like the RC2, it supports key lengths of 40 bits, 64 bits, and 128 bits.

    RC 4一个密码算法数据每个字节进行操作RC 2一样,它支持长度40、64位和128位的密钥

    youdao

  • It then passes the extracted Base 64 encoded cipher value, the decryption key, and the algorithm name to a method named decrypt (examined in Cryptography).

    接着抽取出的用Base 64编码密码解密密钥以及算法名称传递名为Decrypt方法(见密码术中的研究)。

    youdao

  • The key and the plain text are processed together according to the DES algorithm to produce the encrypted (cipher text) form of the plain text data.

    根据des算法密钥文本统一处理以生成个加密(密文)形式的纯文本数据。

    youdao

  • Key: Key is a means of converting a plain-text into cipher-text and vice versa.

    密钥:密钥种在明文密文之间相互转换方式。

    youdao

  • DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits.

    美国国家数据加密标准(the United States DataEncryption Standard),一个密码算法8字节密钥56位。

    youdao

  • First, it introduces the basic principle of the encryption of data, including key and two kinds of cipher system. Then, the chat system developed by us is given as an example.

    首先介绍数据加密基本原理包括密钥密码体制然后给出自行开发交谈系统作为示例。

    youdao

  • Big problem is that user going to always have unlimited access to cipher and the key (s) now how I can secure the whole thing?

    问题用户总是可以无限制地访问密码密钥现在如何保护整个事情

    youdao

  • For any cipher, the most basic method of attack is brute force, which involves trying each key until you find the right one.

    对于任何密码攻击基本方法包括每个直到找到正确

    youdao

  • But user of the system whom I do not trust has access to the system, cipher and the key.

    但是不信任系统用户可以访问系统,密码密钥

    youdao

  • If unauthorized users know anything about the structure of a block of your plain text, they can use that information to decipher the known cipher text block and possibly recover your key.

    如果未经授权用户知道文本结构任何信息他们就可以利用信息解密已知密码文本块,有可能重新获得您的密钥

    youdao

  • Nonlinear combined sequences as a kind of the important key sequence generators, its design and analysis are always hotspot and difficulty of stream cipher.

    非线性组合序列作为一类重要密钥生成器设计分析一直序列密码研究一个重要方向。

    youdao

  • The acceleration mechanism can be used in acceleration of clock-controlled sequence generator and key preset of stream cipher generator.

    加速机制应用于钟序列发生器序列密码发生器密钥预置

    youdao

  • The general design rules of block cipher is discussed by analyzing the encryption process, key generating, encryption function and decryption process of des algorithm.

    文中以DES加密算法为例,分析DES加密过程密钥计算、加密函数解密过程基础上,探讨分组密码的设计原则

    youdao

  • By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.

    利用RS两锁密码协议构造一种非对称公钥叛逆者追踪方案。

    youdao

  • The concept of data expanding rate is presented to evaluate the public key cipher algorithms based on bag question.

    给出了数据膨胀概念,并对如何评判背包公钥密码的方法进行描述。

    youdao

  • RSA algorithm is one of the most important public-key cipher algorithms.

    RSA算法最为重要公开密钥密码算法之一

    youdao

  • In this paper we survey the new advances in the research on computer cipher, focusing on block cipher, sequence cipher, public key cipher and chaos cipher.

    本文综述计算机密码学分组密码序列密码,公钥密码,混沌密码等方面研究进展

    youdao

  • RSA algorithm is a sort of public-key cipher algorithm with high security is used in both data encryption and digital signature.

    RSA算法用于数据加密也能用于数字签名公钥算法,具有较高安全性

    youdao

  • The data Encryption Standard is a block cipher, meaning a cryptographic key and algorithm are applied to a block of data simultaneously rather than one bit at a time.

    数据加密标准密码意义一个密钥算法应用于一个数据块同时不是一个比特。

    youdao

  • At present RSA is one of the most important public-key cipher algorithms.

    RSA目前重要公开密钥密码算法之一

    youdao

  • With the application of symmetric cipher and asymmetric cipher, a cryptographic key management scheme for hierarchy is presented and a workgroup cryptographic key management scheme is presented.

    结合单钥加密双钥加密理论,分别给出了纵向的等级安全管理密钥管理方法横向的协同工作安全管理的工作组密钥管理方法。

    youdao

  • In order to keep pace with the accreditation of wireless network and cipher code, the wireless public key system is researched.

    为了适应无线网络认证加密需要,无线公钥体系进行了研究。

    youdao

  • This paper offers a compound chaotic system based mutiple model used as sequence cipher, which has a high encryption speed, a large key space and is difficult to crack.

    本文提出一种基于模型混合混沌系统具有加密速度快,密空间容易破解的优点。

    youdao

  • My X system USES public key to decrypt a cipher and do some work based on that.

    X系统使用公钥解密一个密码根据一些工作

    youdao

  • So what he can do is change the cipher, create another set of keys encrypt using private key and replace the cipher and public key both.

    因此可以更改密码创建另一密钥使用加密替换密码公钥

    youdao

  • A dual-key cipher lock for bike consists of cipher box, lock box and keys.

    自行车钥匙密码锁是由密码部件、盒部件、钥匙等部件组成。

    youdao

  • Method for transmitting data between split type terminal mainframe and handset includes: split type terminal mainframe generates register cipher key which is sent to handset by bluetooth technology;

    分体式终端主机子机之间数据传输方法包括:分体式终端的主机生成注册密钥通过蓝牙技术将所述注册密钥发送至子机;

    youdao

  • Method for transmitting data between split type terminal mainframe and handset includes: split type terminal mainframe generates register cipher key which is sent to handset by bluetooth technology;

    分体式终端主机子机之间数据传输方法包括:分体式终端的主机生成注册密钥通过蓝牙技术将所述注册密钥发送至子机;

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定