cryptograph n.密碼;密碼打字機;暗碼記錄法。vt.譯成密碼。
n. 密碼;密碼打字機;暗碼記錄法。 vt. 譯成密碼。 “cryptographer“ 中文翻譯: n. 密碼員(包括譯電員;編碼員);暗號使用者。 “cryptogranitic“ 中文翻譯: 隱晶花崗狀“cryptographers“ 中文翻譯: 密碼學家“cryptograndoside“ 中文翻譯: 隱冠藤糖苷“cryptographic“ 中文翻譯: 關于暗號的, 用密碼寫的; 關于暗號的,用密碼寫的; 密碼的; 隱晶文象的; 隱晶文象狀; 用密碼寫的“cryptogrammic“ 中文翻譯: 密碼的“cryptographic algorithm“ 中文翻譯: 密碼算法“cryptogramma brunoniana“ 中文翻譯: 高山珠蕨“cryptographic capability“ 中文翻譯: 保密能力“cryptogram telephone“ 中文翻譯: 話密機
cryptographer |
|
When we applied the properties of quantum mechanics to information , classical limit of information theory could be exceeded in many ways , and we can accomplish many unimaginable tasks for classical information processing , such as fast factoring , tele - portation , absolutely secure cryptograph etc . the naissance of quantum information provided with reliable physical foundation for future revolution of information as well as new principle and method for development of information in 21 century 將量子系統的特性應用到信息領域中,可以在許多方面突破經典信息理論的極限,實現經典信息處理難以想象的功能,如大數因子分解、隱形傳態、絕對安全的密碼等。量子信息科學的誕生為未來信息科學的革命性變革提供了可靠的物理基礎,為信息科學在21世紀的發展提供了新的原理和方法。 |
|
In this paper we study the security mechanism based on ip , because ipsec protocol is a security mechanism based on cryptograph , we discussed cyptograhical algorithm firstly , then we analyze the cryptographical modes in the enviroment of ip communications 本文對基于ip的安全機制? ? ipsec協議進行了研究, ipsec協議是基于加密機術的安全機制。本文首先研究了加密算法,重點研究了高級加密標準( aes )算法及其在ipsec協議中的應用,并對ip環境下的加密模式做了一定的分析。 |
|
Pki ( public key infrastructure ) technique adopting digital certificate , certification authority , security protocol of network communication based on cryptograph of nowdays , it can provide multifarious service of safty for varying user in terms of varying needs of safty . so it is a better solution to the task Pki ( pubickeyinfrastructure ,公共密鑰基礎)技術,采用建立在現代密碼學基礎之上的數字證書、 ca認證中心、網絡通訊加密協議等,為不同的用戶按不同安全需求提供多種安全服務,較好地為這一課題提供了解決方案。 |
|
In chapter 5 , the thesis analyses the hidden trouble of security hi usually c / s pattern , advances a measure of transferring and memorizing the user ' s password in cryptograph form to solve the trouble that user ' s password can be eavesdropped and intercepted possibility when it was transferred and memorized 其次,文章在第五章分析了一般c s模式中存在的安全性隱患,提出用密文形式傳輸和存儲用戶口令的方法,解決用戶口令在傳送和存儲時有可能被竊聽或截取的問題。 |
|
Abstract aiming at the defects of diffusion function with lower diffusing speed and needing multiple round iteration to resist differential attack in the image encryption algorithm based on chaotic block cipher , a new chaotic image encryption algorithm based on output ? cryptograph mixed feedback was proposed 摘要針對現有基于混沌分組密碼的圖像加密算法中,擴散函數擴散速度慢、需要多輪迭代才能抵抗差分攻擊的缺點,提出了一種新的基于密文和輸出混合反饋的混沌圖像加密算法。 |
|
The main sections of this paper are as followed : in the first chapter , some basic concepts and terms of cryptology are introduced , including the classification of cryptology , the sttucture of a typical cryptosystem , the methods of cryptograph analysis and classfy the cryptograph algorithins using different methods 本論文主要由以下幾個部分組成:第一章介紹了密碼學的一些基本概念和術語。主要包括密碼學的分類、典型密碼系統的結構、密碼分析的方法,并說明了密碼算法的不同分類方法。第二章主要介紹常用的密碼算法。 |
|
On the whole , bb84 + quantum cryptographic key distribution project is far from a termless absolute secure one in the perspective of theory , because the efficiency is enhanced on the sacrifice of security decreased . what ' s more , some works are done to strengthen the cryptograph in the field of identity authentication and other sectors , and the enhancement of efficiency strongly supports the cryptograph 綜合來看, bb84 +量子密鑰分配方案并不是一個理論上無條件絕對安全的方案,他在安全性能上的降低得到的代價卻是效率的極大提高,并且此方案在身份認證和其他環節上對其有所降低的安全性能作了保密加強的工作。 |
|
In the second chapter , some conunon used cryptograph algorithins are introduced , including the algorithms used in synunetric cryptosystem and asyrnmetric cryptosystem . we describe the theory of each algorithins and compare the elliptic curve cryptosystem with the other two asyinmetrc cryptosystems to show the advantages of this algorithin 包括常用的私鑰密碼算法和公鑰密碼算法,說明各種算法的原理和優缺點,重點將橢圓曲線算法與其他幾種公鑰密碼算法比較,說明橢圓曲線算法的優勢。 |
|
In addition , the existence of quantum non - cloning theorem leads to the birth of quantum cryptograph . in principal , quantum cryptograph can provide perfect secure and unattacked secret communication system , which is guaranteed by the law of quantum mechanics 又如,在量子信息學中因為存在量子不可克隆定理,從而誕生了量子密碼學,它原則上能夠提供不可破譯、不可竊聽的保密通信體系,其安全性由量子力學基本原理所保證。 |
|
Concerning about the actual application , this project is a compromising method to enhance the transmitting efficiency with the sacrifice of decreasing the degree of cryptograph under the condition that the security is assured in actual application 這種方案的核心思想是在傳輸效率和傳輸保密性上取得更加實用性的平衡。考慮到實際應用情況,此方案在保證安全性的前提下,降低保密性能以提高傳輸效率。 |
|
The method of chaotic masking was also used to randomize the cryptograph . the computer experiments show that the chaotic encrypting system was fine in security and can resist the decipher analysis ; what ' s more , the system is easy to realize 通過仿真分析各項性能(保密性能、對參數的靈敏度等) ,結果表明該系統具有較強的自同步能力和較高的保密性能,并且易于實現。 |
|
The main reseach works we do as follows : ( 1 ) cryptograph is the effective and the only technicle to ensure data confidentiality . in this paper we expended the basic concept and class of encrpytion techniques . 本文做的主要研究工作如下: ( 1 )加密技術是實現數據機密性有效甚至是唯一的解決方案,本文首先對加密技術進行了探討,介紹了相應的加密機制并進行了分析。 |
|
Public key cryptography , combined with the traditional symmetric cryptograph and the message digest technology , can provide confidentiality , integrity and proof of origin . it ' s the foundation of many secure applications 公鑰密碼技術結合傳統的對稱密碼技術及信息摘要技術,可提供信息的保密性、完整性和信源確認,是多種安全應用的基礎。 |
|
The paper introduces a sort of encrypted algorithm which comparied with the original length of cryptograph , the length of encrypted cryptograph will base on the difference of the encrypted information piece length to minish 本文介紹了一種加密后的密文長度與原明文長度文相比,依據所選加密信息塊長度的不同而做相應減小的加密算法。 |
|
This thesis mainly analyses security in the wtls and reasons for defects , study two solutions of security in the wtls which are elliptic curve and ripemd160 cryptograph algorithm 本文主要分析了wtls的安全漏洞及其存在的原因,并在此基礎上研究了兩種解決wtls安全問題的方法? ?橢圓曲線和ripemd ? 160算法。 |
|
Last we describe the functions of the system in brief in the sixth chapter , we introduce the cryptograph protocol and the sollltion of some typical cryptosystems 第六章介紹了密碼協議與典型密碼系統的實現方案。說明了密碼協議及其在安全系統中的應用,并分析了目前廣泛應用的典型密碼系統實現方案。 |
|
In this paper , the security of the wtls is analysed . now elliptic curve and ripemd160 cryptograph algorithm is two latest methods and do not easily attack 橢圓曲線法和ripemd ? 160是兩種目前較新的加密算法,且不易被破解,本文初步分析和研究了這兩種方法。 |
|
Intrusion detection is an active technology for defense , supplies the complement for shortcoming of traditional security technology like firewall , cryptograph 入侵檢測是一種主動防御技術,它彌補了防火墻、信息加密等傳統安全技術的不足。 |
|
Cryptology is the core of the information security . modern cryptograph divides into the public key system and the private key system 密碼學是信息安全技術的核心,現代密碼體制分為公鑰體制和私鑰體制兩大類。 |