With SSL, the data going back and forth between client and server is encrypted using a symmetric key ( secret key) algorithm. SSL将使用对称密钥(加密密钥)算法对在客户机与服务器之间传递的数据进行加密。
An asymmetric key ( public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures. 对称密钥(公钥)算法用于交换在对称算法中使用的加密密钥,以及用于数字签名。
Analysis and design of a roll secret key encryption algorithm 滚动式密钥新型加密算法的分析与设计
The broker whispered that he knew a secret algorithm for the success, but he could not convince the mathematician. 经纪人对他耳语说他知道成功的秘密,但还是说服不了数学家。
To improve the encoding efficiency of the current visual secret sharing schemes, a novel encoding algorithm, self-adaptive multi-pixel encoding ( SME), was proposed. 为提高可视密图分存方案的编码效率,提出了基于自适应多像素编码的可视密图分存算法。
Through the secret algorithm that determines which web pages show up most prominently in its search results, it can bring a flood of traffic to other sites or cast them into the online equivalent of Siberia. 它的神秘算法,决定了哪些网页能够在它的搜索结果中占据显要位置,这使它既能给其它网站带来滚滚流量,也能把它们流放到网上的“西伯利亚”。
SECRET is a new algorithm for scalable linear regression trees. SECRET是一个关于可伸缩线形回归树的算法。
RSA meets especially the need of modern secret communication because of its simple algorithm, excellent cipher performance, and without the trouble from manage key as usual. In RSA cryptosystem, modular multiplication is core section. RSA算法是其中最具代表性的算法之一,它算法简单、保密性强、密钥管理方便,特别适合现代保密通信的需要。
The Implement of A Pair of Secret Key of Digital Signature Algorithm by Using Java Programming Language 用JAVA实现DSA数字签名算法的密钥对
A new secret recovery algorithm to enhance the security of secret sharing and recovery in threshold cryptosystems was proposed. 基于离散傅里叶变换提出了一种通用的门限密码学中恢复分享秘密的算法。
The authors designed the communication system of the teaching platform and the pseudo random number generator to generate secret keys of the algorithm. 设计了实验平台的通信系统及算法过程中产生密钥的伪随机序列发生器。
On this condition FIP 186 one-way function algorithm has been used in FIP 186 Pseudorandom bits generator, and makes it produce pseudorandom secret key K of DSA ( Digital Signature Algorithm). 在此基础上把单向函数算法用到FIP186伪随机比特生成器中,产生了DSA(DigitalSignatureAlgorithm)中的伪随机秘密密钥K。
The secret key of the encryption algorithm is the minutiae extracted from fingerprint. 该加密算法的密钥是采用指纹识别技术所提取的指纹特征信息。
Research on Dynamical Secret Key Building Algorithm in Database Encryption 数据库加密中动态密钥生成算法研究
On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method. 在研究基于RSA密钥算法智能卡认证技术的基础上,提出了基于散列函数的智能卡访问认证方法。
In studying symmetric-key ( secret key) cryptography algorithm, the disadvantages of DES and the advantages of AES are analysed. 在对称(私钥)密码算法方面,重点研究DES存在的问题和AES的特点;
A Proactive Secret Sharing Algorithm 一种主动秘密共享算法
In addition, a mask image generated by a secret algorithm is participated in the procedure of cross interleaved RS encoding to increase the security of watermarking and prevent forged watermarking. 此外该文算法使用由密码生成的掩膜图像参与水印信号的生成和检测,很好地保证了水印的安全性和保密性。
Image encryption based on truncated baker transformation is done; Encrypted image and key are transmitted from public passage and secret passage independently. Decrypted algorithm is opposite to the encrypted algorithm. 然后采用截断Baker变换对图像进行加密运算,将加密后的图像和密钥分别从公共通道和密钥通道传输,解密算法是加密算法的逆过程。这便是不作为犯罪因果关系的真相。
In the new scheme, the digital signature can not be denied or forged, and the secret key update algorithm is fast, and the sizes of key and signature are small. 新方案具有签名的不可伪造性和不可否认性、密钥进化快、签名和密钥长度短等特点。
In consideration of commercial interest, the critical technology of commercial CA is not usually disclosed at present, it also fails to well known so far that the process of key generate of CA, cryptology algorithm, and secret intensity of the course of algorithm, etc. 出于商业利益考虑,商用CA的关键技术通常并不公开,至今未能很好地弄清CA的密钥生成过程、密码算法的保密强度等。
This paper proposed a safe transmission scheme for the secret information based on IDA algorithm, expounds theoretically in detail this scheme, gives the test results, and analyzes on the advantages and disadvantages of these results. 提出了基于IDA算法的机密消息安全传输解决方案,在理论上作了详细的阐述,给出了试验结果,分析了该结果的优缺点。
The informa tion of encryption depends on safety of the secret key, but not the safety of algorithm. 加密信息的安全性取决于密钥的安全性,与算法的安全性无关,即由密文和加解密算法不可能得到明文。
The threats come from two aspects. In one aspect, when mobile code is downloaded on a host, a malicious host will reverse engineer the code to extract secret data and algorithm from it. 这种威胁来自两个方面:一方面,当移动代码被下载到主机,恶意主机将可能会逆向工程这些代码,从而窃取代码中包含的关键算法或数据。
The combination of secret algorithm and adaptive chaotic synchronization system makes a complete secret communication system completed. In the end, the system is verified by simulation. 再将混沌自适应同步系统与保密算法相结合,最终实现了一个完整的保密通信系统,并对系统进行仿真。
Using literal image as secret message and still image as cover, this algorithm combines image scrambling with digital modulation. 该算法将数字图像置乱技术中的幻方变换与数字通信中的数字调制技术相结合,以二值文字图像为待隐藏的秘密信息,以静止图像为载体。
The algorithm is a kind of secret key-changed algorithm, so its security is better. 该算法是一种变密钥的密钥流生成算法,所以其安全性好。
Meanwhile in order to facilitate the unified management of cloud computing users 'identities, the scheme deploys the secret sharing strategy in identity based public encryption algorithm ( IBE). 同时为了便于统一管理云计算用户的多种身份,采用基于身份的公开加密算法(IBE),并将秘密共享策略结合在IBE中。
The flexible secret key generation algorithm and the bidirectional communication ensure the real-time security of the lines. 灵活的密钥生成算法和双向的数据通信,保证了线路的实时安全。