cryptographic algorithm

网络  加密算法; 密码算法; 密码演算法

计算机



双语例句

  1. They can probe for flaws in a cryptographic algorithm before maliciously modifying them to turn a strong encryption into a weaker one.
    他们可以寻找密码算法中的缺陷,然后恶意修改它们,让强的加密算法变弱。
  2. Analyzing the characteristics and requirements of cryptographic algorithm evaluation, the component-based automation evaluation system for cryptographic algorithm is designed and implemented.
    针对密码算法测评的特点和需求,设计并实现基于组件的密码算法自动化测评系统。
  3. The Application Research of RSA Cryptographic Algorithm in Electricity Market Operation System
    电力市场运营系统中RSA密码算法的应用研究
  4. PKI ( Public Key Infrastructure) is a security infrastructure with generality which is based on the asymmetric cryptographic algorithm& technical realization and provides security service.
    是一个用非对称密码算法原理和技术实现并提供安全服务的具有通用性的安全基础设施。
  5. First countermeasures for the exponentiation computation of RSA cryptographic algorithm were summarized.
    综述了RSA密码算法中模幂运算的主要攻击方法及其防御措施。
  6. Research on the Authentication Protocol and Cryptographic Algorithm in RFID System
    基于RFID系统认证协议与加密算法的研究
  7. As a major public-key cryptographic algorithm, RSA cryptographic algorithm occupies an important position in the operator's authentication of electricity market operation system.
    RSA密码算法作为一种重要的公钥密码算法,在电力市场运营系统的身份认证中占有重要地位。
  8. A cryptographic protocol together with its cryptographic algorithm was regarded as one system, and based on compositional reasoning techniques, a formal model for the system was built.
    将密码协议与协议中用到的密码算法视为一个系统,基于组合推理技术建立了密码协议系统的形式化模型。
  9. The 3G core cryptographic algorithm: KASUMI algorithm was researched in the paper, including its principles, components and application.
    本文还对3G的核心加密算法KASUMI算法进行研究,介绍了算法的原理和构成,及其应用。并通过编程对算法进行实现与安全性测试。
  10. Design and analysis of secure cryptographic protocol is very difficult, we always suppose that the cryptographic algorithm which is used in cryptographic protocols is securely. We always ignore the effect of what kind of encrypt mode used by the cryptographic algorithm.
    密码协议的设计和安全性分析是困难的,在密码协议中总是以所使用的密码算法是安全的为前提,但是人们却忽略了密码算法的加密模式对密码协议安全性的影响。
  11. As regards cryptographic algorithm, according to database encryption requirement for cryptosystem, we adopt permutation code algorithm, which is high intensity and fast, based on analyzing and comparing several popular cryptographic algorithm.
    在数据的加密算法上,本文分析比较了目前常用的加密算法,依据数据库加密对密码系统的要求,采用了加密强度大且速度快的排列码算法。
  12. This method may test the randomness of sequence and verify security of cryptographic algorithm.
    该方法可以检测随机序列发生器产生序列的随机性,也可以用于检验密码算法的安全性。
  13. This project includes research of hardware design, research of system software design and research of implementation of cryptographic algorithm.
    该课题包括硬件设计研究、系统软件设计研究和算法实现技术研究三个方面的内容。
  14. Study on Security of Cryptographic Algorithm and Security Mechanism Applied to Electronic Transaction
    密码算法的安全性及电子交易系统中安全机制的研究
  15. Cryptographic algorithm and key are the very important part of cryptogram technology.
    密钥和密码算法的安全是密码卡的核心和关键。
  16. Application of Cryptographic Algorithm in Bluetooth Security Mechanism
    加密算法在蓝牙安全机制中的应用
  17. Through the control method of extending cryptographic application specific instruction set, a scheme of cryptographic function extension is designed, providing accelerator engines for data encryption and decryption of special cryptographic algorithm.
    通过扩展密码协处理指令集控制方式设计了一种密码功能扩展方案,为特定密码算法的数据加解密提供了协处理加速引擎。
  18. Programs for these problems and lack of use of RSA public key cryptographic algorithm, a theoretical threshold verifiable multi-secret sharing scheme and its security analysis.
    针对这些方案中存在的问题和不足,利用RSA公钥密码算法理论设计了一种可验证的门限多秘密共享方案,并对其安全性进行了分析。
  19. The private component includes the evaluation component and the cryptographic algorithm component.
    其中,私有组件分为测评组件和密码算法组件两类。
  20. Standardization of cryptographic algorithms has been carried out in many countries, which has resulted in a new high tide of cryptographic algorithm design.
    近些年来,许多国家和机构都纷纷开展了密码算法的标准化工作,从而掀起了密码算法设计的新高潮。
  21. Usually, the cryptographic algorithm can be implemented by using software or ASIC.
    密码算法的实现通常可分为软件方式和专用硬件方式两种。
  22. Identity authentication protocol, or named Identity verification protocol, is a kind of secure communication protocol for participants in computer network or distributed systems to identify the communicate object by cryptographic algorithm.
    身份认证协议,又称身份识别协议,是在计算机网络或分布系统中的参与者通过一种安全通信协议,借助密码算法,对通信实体身份进行识别的一个过程。
  23. In the Bluetooth firmware, the computation-intensive cryptographic algorithm is implemented by using DSP on Bluetooth chip.
    在功能分配上,将计算量较大的加密算法利用蓝牙芯片内部的DSP处理器实现。
  24. Finally, it is tested of cryptographic algorithm in TPM module.
    最后给出了TPM模块密码算法机制的测试示例。
  25. To remove the security risk in network transmission caused by session key of symmetric key cryptographic algorithm, the AES algorithm and RSA algorithm are combined as encryption technique in system design.
    为了消除对称密钥加密算法的会话密钥在网络传输中的安全隐患,系统设计中采用了AES加密算法和RSA加密算法相结合的混合加密技术。
  26. Data types in the proposed system are analyzed, and a unified data format for communications is designed. The data among the common component, evaluation component and cryptographic algorithm component are communicated using the unified format.
    论文分析了系统内部所用到的数据类型,设计了系统内部数据通信的统一格式,利用该数据交互格式实现了公共组件、测评组件及密码算法组件之间的数据通信。
  27. The visual programming environment we designed has been shown to fully express various cryptographic algorithm application, while the new encryption and password procedures are highly scalable.
    本课题设计的可视化编程环境通过实验检验也被证明可以充分表达各种密码算法应用程序,同时对新的密码算法和密码程序都具有高度的可扩展性。
  28. Elaborate the importance of the service security. Introduce the implement of data security strategy through asymmetric cryptographic algorithm RSA. 6.
    阐述了服务安全设计的重要性,重点论述了通过非对称加密算法RSA实现服务数据安全的方案。
  29. Public key Cryptographic algorithm is implemented by hardware for performance reason.
    出于运算性能考虑,可以采用硬件实现公钥密码算法。
  30. At the same time, the definition of function points were refined based on the coverage properties and coverage groups. Finally, the simulation examples, synthesis results and performance analysis were proposed in the RSA cryptographic algorithm application.
    同时,细化功能点定义,基于覆盖率属性和覆盖率组方式实现功能点覆盖率模型。最后给出该系统在RSA密码算法应用中的仿真实例,综合结果及性能分析。