We adopt encryption and decryption technology based on Permutation Code. 我们采用排列码加密算法进行加密、解密。
Then supplies realization of Encryption Chip based on Permutation Code by EDA, and integrates the modular of signal gathering so the chip can be used in voice communication encryption. 通过EDA设计技术实现排列码加密算法,并在加密芯片中集成了信号采集模块,可以使该芯片应用到语音通讯加密当中。
Application of the Encryption and Decryption Method of Permutation Code on the Firewall 排列码加密解密方法在防火墙中的应用
As regards cryptographic algorithm, according to database encryption requirement for cryptosystem, we adopt permutation code algorithm, which is high intensity and fast, based on analyzing and comparing several popular cryptographic algorithm. 在数据的加密算法上,本文分析比较了目前常用的加密算法,依据数据库加密对密码系统的要求,采用了加密强度大且速度快的排列码算法。
Safe Video Conference System Based on Permutation Code 基于排列码算法的安全视频会议系统
Research on Permutation Sequence Code for Ultra Wide Band 超宽带系统PSC码的研究
Any column of the matrix can be permuted randomly, and the permutation between columns should satisfy the form which is the automorphism group of the binary cyclic Turbo code generated by the feedback polynomial. 该矩阵的任意一列可采用随机交织方式,而列间交织方式必须是按由反馈多项式生成的循环码字集的自同构群构成。
Research on Permutation Code Based Combined Security Algorithm Applied in the Data Transmission System 基于排列码的安全算法在数据传输系统中的研究
This paper will discuss the application of RF card in access control system, a series of new technology including Permutation Code is used to solve the safety problem. 本文对射频卡技术在门禁系统中的应用进行了研究,将包括排列码加密技术在内的一系列安全技术应用于门禁系统中,重点解决了系统的安全问题。
The Research of Encrypted NIC on the Basis of Permutation Code Algorithm 基于排列码算法的加密网卡的研究
Not changing the Video Conference protocols in existence, we embed a good encryption algorithm ( Permutation Code) in the system to safeguard the information of Multimedia. 在不改变现有协议的前提下,嵌入性能良好的加密解密算法(排列码算法)来保障信息的安全;
Research on the Access Control System Based on Permutation Code 基于排列码的门禁系统研究
Study of "Permutation Code" for the Application in Routers 排列码加密解密算法应用在路由器上的研究
The permutation code encryption and its key management and digital signature by RSA contribute to the high intensity combination security algorithm which is verified by both theory analysis and simulation results with high running speed. 理论和实验结果均表明,应用排列码算法加密明文数据并结合RSA算法进行密钥管理和数字签名可以得到加密强度很高的安全算法且算法的运行速度也很快。
Compare DBS AES with Permutation Code, we found use encryption and decryption technology based on Permutation Code, can ensure the encrypted software can't be pirated. 对比DES、AES,说明使用排列码加密算法,是可以保证被加密的软件安全性的。
The Application and Analysis of Genetic Algorithm Based on Permutation Code 排列序编码的遗传算法性能分析及应用
The system makes full use of the principle of public key, message digest and permutation code accomplished rapidly data encryption and data transmission, digital signature. 应用这种安全算法的网络数据传输系统利用公钥密码体制的原理、消息摘要和排列码加密算法的思想,构造了一种能够实现数据快速加密、快速传输、并具有数字签名功能的安全传输系统。
Permutation code broke through the traditional concept of block algorithm, and improved the encrypt intensity greatly. 排列码加密解密算法突破了传统的分组密码的旧观念,使加密强度有了较大幅度的提高。
Network based data transmission security is one of the critical task in information security field. In this paper, a permutation code security algorithm based on the block cipher that is widely used in the data transmission system is put up after carefully studied the current encryption methods. 基于网络的数据传输安全问题是信息安全领域的重要课题之一,本文在分析现有数据加密方法的基础上,在数据传输系统中应用一种基于分组密码新概念的新算法&排列码加密算法。
FAR can mitigation ROP attacks by random permutation of functions in code segments of binaries, which makes assumption on addresses of short sequences made by attackers incorrect. 该方法随机重排二进制文件中的函数,从而使代码中指令序列的地址的实际值与攻击者的设想不一致,从而防御ROP攻击。