使用加密算法的保密性由这样一个事实保证,即生成与哈希值匹配的明文在计算上是不可行的。
The encryption using crypto algorithms is ensured by the fact that it is computationally infeasible to generate plaintext that matches the hash value.
维护机密性和完整性的典型解决方案涉及使用现有的安全协议和加密算法。
Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.
MD 5密码加密算法支持更为可靠的密码,从而进一步提高了安全性。
The MD5 password encryption algorithm further improved security by allowing more robust passwords. An example of a shadow password entry is below.
大部分Web开发者和用户仍然忽略了基于浏览器的加密算法带来的在Web应用程序引入传统软件的隐私和安全性的机会。
Web developers and web users are still largely ignoring the opportunity offered by browser-based cryptography to bring the privacy and security of traditional software programs to web applications.
CA认证系统拥有高强度的加密算法,高可靠性的安全机制及完善的管理及配置策略,提供自动的密钥和证书管理服务。
Ca authentication center provides highly intensive encipher algorithm, highly liable security mechanism and management strategy, automatic generating key and certificate management.
仅通过增加加密算法的密钥长度来达到增强安全性已不再是唯一的可行方法。
It is not the only option which to increase the key length of encryption algorithm in order to enhance security.
众所周知,加密算法是鉴权认证和完整性控制的基础,因此我们还介绍了选用加密算法的原则。
As we know, the encryption is the footstone of authentication and integrity control, so we introduce the principle of choosing encryption algorithms.
根据密钥产生和管理过程的复杂性,为增强数字信息安全性,提出一种基于指纹的数字信息加密算法。
According to the complexity of key generation and management process, this paper presents an encryption algorithm based on fingerprint to enhance the security of the digital information.
给出了一种加密速度快,安全性高,加密算法和解密算法相同,且不需进行算术逻辑运算等特点的对称加密算法。
A quick and safe encryption arithmetic of symmetry is proposed, which has the same arithmetic in encryption and decryption without arithmetic logical operation.
将AES加密算法应用在双dsp平台上,通过分析处理结果,说明其能够很好地满足系统的实时性和保密性要求。
AES encryption algorithm is applied to the dual - DSP platform, the analysis of the processing results shows that it meets the real-time and secrecy requirements well.
在对加密算法实现过程进行可行性研究和分析的基础上,阐述了应用adpcm编码调制技术和UDP协议进行网络环境下实时多点语音通信的方法。
Based on the feasibility study and the analysis to the encryption algorithm, the paper presents a method of the real-time multi-point voice communication in network, which USES ADPCM and UDP.
此外,证明了方案中加密算法在DDH假设和适应性选择密文攻击下是安全的。
The encryption algorithm in the scheme is semantically secure against adaptive chosen cipher-text attacks based on the DDH assumption.
研究了一类具有良好隐蔽性的一元三次离散动力系统的混沌序列产生情况,提出了混沌序列的异或和置乱加密算法。
The chaos sequence procedure of a kind of discrete dynamic system with good concealing feature is studied, and two algorithms about chaos sequence are provided.
针对现有流媒体加密算法在安全性、通用性和实用性方面存在的缺陷,提出一种全新的基于混沌参数可变序列的流加密算法。
Aiming at the current faults of algorithm for video encryption which existed in security, compatibility and practicality, it was proposed a chaos based algorithm for video encryption.
分析了排列码加密算法的特点、加密强度及抗攻击性。
Analyse its characters encrypting intensity and ability of resist attacking.
为了增强水印信号的安全性,采用了基于混沌和位平面的水印加密算法。
In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan.
协议的执行过程中不需要第三方的参与,协议的安全性基于所采用的同态公钥加密算法。
The protocol can be implemented without the participation of the third party and its security was based on additive homomorphic public key cryptosystem.
因在计算理论方面的贡献而获奖。包括伪随机数的生成算法、加密算法和通讯复杂性。
In recognition of his fundamental contributions to the theory of computation, including the complexity-based theory of pseudorandom number generation, cryptography, and communication complexity.
论述了RSA加密算法的过程,分析了算法中素数测试、密钥产生和现阶段的安全性。
This paper introduces the process about encryption and decryption of RSA encryption algorithm, and analyzes testing prime number and producing privacy key and security of RSA algorithm.
测试数据表明,该算法比同类型的加密算法速度快,而且加密方法的变型性以及轮密钥选取的随机性将增强加密算法的抗攻击性。
Testing data shows that this encryption algorithm is faster than conventional ones and its anti-attack ability is reinforced by encryption improvement and randomization.
本文研究提出一种统计规律不明显的非线性随机序列的发生方法及其对信息作非线性移位的加密算法,可以有效地提高密文的安全性。
This paper describes a new method in which a non-linear successive-displacement can be produced, and provides an algorithm of information bit-moving encryption.
和一维元胞自动机相比,采用二维元胞自动机的加密算法拥有更大的密钥空间,系统安全性大大增强。
Compared with one-dimensional cellular automata, encryption algorithm based on two-dimensional cellular automata has a larger key space and the security of the system is greatly enhanced.
最后,给出该协议在使用了加密算法后,在安全性方面的性能,以及整个系统需要完善和改进的工作。
At last, we provide the performance of the Arithmetic, and the works to be complemented are given.
同时,该算法满足格式兼容性并具有一定的容错能力,适合作为基于网络传输的图像加密算法。
Moreover, it is format compatible and robust to transmission errors. All the attributes mentioned above make this algorithm suitable to be the encryption approach for image transmission.
为了使图像保密性更好,提出一种新的加密算法。
In order to increase the security performance, a novel encrypt algorithm is proposed.
使用各种各样的加密算法,可以保证这些活动的安全性。
All kinds of cryptographic algorithms used can insure security of these activities.
在这一过程中,不但要考虑加密算法的安全性,还需要考虑加密算法对码率的影响,以及图像传输的实时性要求。
Not only the security of algorithm, but also the compression efficiency and encryption complexity should be taken into consideration when design an encryption scheme.
混沌映射所具有的初值敏感性和随机性,使得基于混沌理论的图像加密算法成为一个研究热点。
The initial sensitivity and randomness of the chaotic map make the image encryption algorithm based on chaotic theory become a hot researching field recently.
混沌映射所具有的初值敏感性和随机性,使得基于混沌理论的图像加密算法成为一个研究热点。
The initial sensitivity and randomness of the chaotic map make the image encryption algorithm based on chaotic theory become a hot researching field recently.
应用推荐