Applying the modern cryptographical technology constructs two digital copyright protection schemes. 利用现代密码技术构造了两个数字版权保护方案。
In this paper, based on security, we discuss the cryptographical application in the key technology of e-commerce's security which includes data encryption, secure authentication signature, PKI, SSL and SET. 针对安全问题,讨论了密码技术在数据加密、安全认证、公钥基础设施PKI、电子商务常用安全协议SSL和SET等一系列保障电子商务安全的关键技术中的应用。
To implement Access VPN, this dissertation use SOCKS protocol, Kerberos Protocol and domestic cryptographical algorithm. 针对远程访问VPN密码系统的实现,我们采用SOCKS协议做为VPN实现协议,使用Kerberos协议来进行身份认证,使用国内专用密码算法来进行数据的加解密。
Since the order of a Jacobian group can be constructed to have a much large prime factor over a small base field, and there exist a lot of hyperelliptic curves suitable for cryptographical applications, hyperelliptic curve cryptosystems has gotten much attention more and more. 但由于可以在一个很小的基域上构造具有较大素数因子阶的Jacobian群,且可应用于密码体制的超椭圆曲线比较丰富,这使得超椭圆曲线密码体制也逐渐受到人们的重视。
At last, how to implement the cryptographical equipment of MPLS network is discussed. 最后讨论TMPLS网络密码设备的实现。
The problem of digital copyright protection is taken into account by more and more people. Cryptographical technology is one of the key solutions to this problem. 数字版权保护问题越来越受到人们的重视,密码技术是解决这一问题的关键技术之一。
The Research on Chaos-base Cryptographical Algorithm and Its Key Technologies 基于混沌的密码算法及关键技术研究
Chapter 2 clarifies the cryptographical foundation, which includes the symmetrical cipher technology, unsymmetrical cipher technology and digital envelope. 第2章介绍了密码学的理论基础。包括对称密码技术,非对称密码技术和数字信封技术,并详细分析了DES算法和RSA算法。
After it's first proposition, pulic key cryptosystem was widely used to design cryptographical application, such as key agreement, identity authentication, data integrality, digital signature, electronic election, electronic business, electronic government programme, etc. 自从公钥密码体制被提出以来,它就被广泛用于许多实用密码系统中,比如密钥协商、身份认证、数据完整性保护、数字签名、电子选举、电子商务、电子政务等等。
It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key. 现代密码学认为,任何加密体系的加密和解密算法都可以公开,其安全性在于密钥的保密性。
VPN cryptographical system is concerned with cryptographical technology, authentication technology and VPN implementation protocols. VPN密码系统的构建涉及几个方面的技术,包括加密技术、认证技术、实现协议等。
Theoretical analysis and computer simulation also indicate that the proposed pseudo random generator has good cryptographical properties. 分析表明,该发生器具有良好的密码学特性。
In the strand spaces, atomic behavior of the attackers is the definition of the attackers trace description. It summed up the attackers discarding information, generating information, linking information and cryptographical computational capabilities. 在串空间理论中,攻击者具有的原子行为用定义的攻击者迹描述,它总结了攻击者丢弃消息、生成消息、连接消息,以及攻击者的密码运算能力。
By analyzing, the mechanisms used in the common RFID secure schemes can be sorted in three types: physical mechanism, cryptographical mechanism, and political mechanism. 研究总结了一般RFID安全方案所采用的三种机制:物理机制、密码机制和政策机制。
It guarantees privacy, integrity and authenticity of information exchanged between a Web server and a Web browser based on a multiple of public key cryptographical techniques and symmetrical encryption techniques. SSL协议以多种公钥密码技术和对称加密技术为基础,实现Web服务器和Web浏览器之间的信息交换的秘密性、完整性和认证性的通信目标。