• 文件输入输出明文密文进行测试

    Using a file input and output ciphertext expressly to carry out the test.

    youdao

  • 接着,接收应用程序一接收到消息对其解密密文转换明文

    The receiving application then decrypts the message upon receipt, converting from ciphertext back to plain text.

    youdao

  • 密钥:密钥种在明文密文之间相互转换方式。

    Key: Key is a means of converting a plain-text into cipher-text and vice versa.

    youdao

  • 如果完整明文对应密文可是实现破译功能得出加密密钥

    If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.

    youdao

  • 下面有关明文密文密钥关系表示法

    The following is a notation for relating plaintext, ciphertext, and keys.

    youdao

  • 分析表明,该文所设计的加密算法不但抵抗密文攻击而且有效地抵抗选择明文攻击。

    The analysis indicates that the encryption algorithm not only can effectively resist cipher-text-only attack but also chosen-plaintext attack.

    youdao

  • 同时这种加密算法明文密码空间、密文密码空间加密强度等作了初步的分析。

    Therefore the decryption time and difficulty can be greatly increased, and the cipher can be protected from decryption in this algorithm.

    youdao

  • 同时对这种加密算法明文密码空间密文密码空间加密强度等作了初步的分析

    The paper also tentatively discusses several related encryption algorithms to improve the security and analyzes the plaintext key space, ciphertext key space and encryption strength.

    youdao

  • 通过使用动态密码明文修补使其密文长度明文长度相等

    The ameliorated algorithm ensures the length of cipher text is equal to the length of plain text by patching it with dynamic cipher.

    youdao

  • 提出基于混沌迭代加密算法,这种加密算法根据混沌迭代确定的位置将明文入一个较大密文空间

    The plain text is filled into a larger cipher text space according to the position determined by the chaotic iteration.

    youdao

  • 这些加密可以输入数据量很大并且长度可变明文进行加密,但是只有明文分组处理完毕输出密文的第 个分组。

    Three are ciphers that can take input plaintexts of large and varying lengths and will output the ith block of the ciphertext after having processed only the first i blocks of the plaintext.

    youdao

  • 相对公钥密码算法接收方可以在不知道明文的情况下,直接密文执行融合,节省解密带来的能量消耗

    Corresponding to public key cryptographic algorithm, it can save energy consumption because the receiver can aggregate cryptograph directly instead of obtaining explicit terms.

    youdao

  • 结果表明方法在穷举量为241恢复出输入输出变换子密钥信息以及密文对应明文信息。

    Result shows that this method can obtain the sub-keys and the corresponding plaintexts when the computing complexity of the improving attack is about 241.

    youdao

  • 结果表明方法在穷举量为241恢复出输入输出变换子密钥信息以及密文对应明文信息。

    Result shows that this method can obtain the sub-keys and the corresponding plaintexts when the computing complexity of the improving attack is about 241.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定