After completion encryption/ decryption operation, the encrypted data is returned. All encryption/ decryption operations are performed in "source encryption equipment", which assure the security of information. 它通过USB接口将要加密的数据传到加密机,在加密机中实现数据加解密,加解密过程脱离操作系统,有效地保证信息了的安全。
Before the history of appearing Public-key cryptography, all the encryption and decryption algorithms including the original manual calculations, implemented by mechanical equipment or computer, they are based on these two basic tools: replacement and substitution. 在公钥密码体制以前的整个密码学史中,所有的密码算法,包括原始手工计算的、由机械设备实现的以及由计算机实现的,都是基于代换和置换这两个基本工具。
When the users apply for the license, the system uses digital signatures, content Hash value verification, encryption key storage, user certificates, the binding of licenses and terminal equipment and other security technology to ensure the process of license download and use security. 用户申请许可证下载时,使用数字签名,内容Hash值验证,密钥加密存储,用户证书,许可证与终端设备绑定等多种安全技术,保证许可证下载和使用过程中的安全性。
Proposed mechanism for the enhanced WEP encryption and decryption process, the key update mechanism that addresses the previous 802.11 wireless networking equipment for the transition of WEP authentication solution. 提出了对于WEP的增强机制的加解密过程、密钥更新机制方案,解决了对以前用于802.11无线网络设备WEP认证过渡解决方案。
Applying the chaotic encryption algorithm into embedded system equipment has vast potential for future development. 而混沌加密具有这方面的优势,因此将混沌加密算法应用于嵌入式系统的设备中有着广阔的应用前景。
The system comprises the design of operating interface, systematic functions, database, and encryption, further categorized into three layers of systemic structure of control center, sub-control center, and head-end equipment. 系统设计主要围绕操作界而设计、系统功能设计、数据库设计、编码实现等内容来进行,系统为三层系统体系架构,包括总控中心、分控中心和前端设备。