密码技术主要包括对称密码算法和非对称密码算法及协议。
It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.
将对称密码算法和非对称密码算法共同使用,增强了应用系统的安全性。
Using the symmetric algorithms and the asymmetric algorithms together security performance of the application system is improved.
而公钥密码算法正好可以解决这方面的问题,但在速度上远远不及对称密码算法。
The public key cryptography can just solve these problems, but it is much slower than the symmetric key cryptography.
首先阐述密码学的相关概念,然后对传统密码技术和现代的对称密码算法与非对称密码算法及其安全性进行分析;
Related conception is introduced at first, then the principle and security of conventional cryptology, modern symmetrical encryption algorithms and asymmetrical encryption algorithms are analysed;
密码学作为信息安全的基础和核心,也越来越受到人们的关注,而暴力破解对称密码算法,是密码学研究的一个重要方向。
As the basis and core of information security, cryptography also attracts more and more attention. Brute force attack on symmetric cipher algorithms is an important direction of cryptography.
本文分析了常用对称密码算法DES、3des和AES的可重构性,利用流水线、并行处理和可重构技术,提出了一种可重构体系结构。
In this paper, based on the analysis about the reconfiguration of the DES, 3des and AES, we propose a reconfigurable architecture, which combines reconfiguration technology with pipeline, par.
对称算法要求消息的发送方和接收方使用同一个秘钥;这通常被称作秘钥密码术。
A symmetric algorithm requires that both the sender and receiver of the message use the same secret key; this is often referred to as secret key cryptography.
表示对称算法中使用的密码模式。
不久前,计算机科学家和密码学家专门小组发表了一篇论文,建议用于商业安全的对称算法至少要用90位的钥匙。
A while ago an AD hoc group of computer scientists and cryptographers contributed to a paper that recommended a key of at least90bits for symmetric algorithms used in commercial security.
指出了分组密码的多次迭代使对称置换结构复杂化,可以选择对称置换作为分组密码算法的扩散部分来设计。
This paper shows that Hi-times substitute makes permutation structure more complicity, so symmetrical permutation can be chosen as the diffusion module in block cipher algorithm design.
对称加密算法从加密模式上可分为流密码(序列密码)和分组密码(块密码)两大类,几乎当前使用的所有对称加密算法都是基于分组密码模式。
It can be divided into two sorts as stream cipher mode and block cipher mode by encrypting mode. The most commonly used symmetric encryption algorithms are almost based on block cipher mode.
介绍基于对称密码系统的可证明安全理论,利用平方哈希函数实现技术,对一种可证明安全算法DFC实施改进后,安全性没有损失,但是速度得到了提高。
In this paper, based on provable security theory, a provable security cipher DFC is improved on speed without lost of security by means of fast implementation of square hash function.
介绍对称密码技术中的DES、AES、IDEA加密算法和非对称密码技术中的RSA、ECC加密算法,并给出了混合密码算法的方案。
Introduced des, AES, and IDEA encryption algorithm, RSA, and ECC encryption algorithm, finally, produced the mix crypto-algorithm design proposal.
不久前,计算机科学家和密码学家专门小组发表了一篇论文,建议用于商业安全的对称算法至少要用90位的钥匙。
A while ago, an AD hoc group of computer scientists and cryptographers contributed to a paper that recommended a key of at least 90 bits for symmetric algorithms used in commercial security.
与TCG的密码方案相比,可信密码模块(TCM)引入了对称算法,并采用ECC作为签名算法,在减少密钥存储空间的同时,提高了密码算法的运算速率。
Compared with TCG's design, TCM reduces the storage space of keys and speeds up cryptography's work by adding symmetrical arithmetic and ECC arithmetic.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
应用推荐