非对称算法
- 网络asymmetric algorithm
-
一旦获得私钥,就可以使用非对称算法来解密共享密钥。
Once the private key is obtained , the shared key can be decrypted using an asymmetric algorithm .
-
因此,最初的步骤是检索与对应的请求相关联的证书的私钥,以便使用非对称算法来解密共享密钥。
Therefore , the initial step is to retrieve the private key of the certificate associated with the corresponding request to decrypt the shared key using an asymmetric algorithm .
-
因而,仅仅使用随机密钥的非对称算法,Web服务安全性(WS-Security)就提供了一种相对高效又易于管理的解决方案。
Thus , by using only asymmetric algorithms on the random key , WS-Security provides both a relatively efficient solution and one that is easy to manage .
-
在SOAP消息中传递共享密钥,带有使用非对称算法(比如RSA-V1.5)加密/解密的密钥。
Passing the shared key in the SOAP message with the key encrypted / decrypted using an asymmetric algorithms such as RSA-V1.5 .
-
使用对称算法和非对称算法的两阶段过程。
A two-phase process using both symmetric and asymmetric algorithms .
-
不同的非对称算法对同样的位数提供的安全程度是不同的。
Different asymmetric algorithms provide different levels of security with the same bit size .
-
非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
An asymmetric algorithm uses a different key for encrypting or decrypting the message ; one of the keys must be kept secret , and the other key is usually made public .
-
密码技术经历了多年的发展,形成了比较完善的体系,尤其是非对称算法的出现更解决了一些长期困扰人们的难题。
Experiencing many years of development , the cryptography has formed more perfect system , in particular the advent of the asymmetric algorithm having settled the puzzling perplexes over a long period of time .
-
RSA非对称加密算法在数字签名中的应用研究
Application of RSA Asymmetrical Encryption Algorithm in Digital Signature
-
阐述了服务安全设计的重要性,重点论述了通过非对称加密算法RSA实现服务数据安全的方案。
Elaborate the importance of the service security . Introduce the implement of data security strategy through asymmetric cryptographic algorithm RSA . 6 .
-
RSA加密算法是一种非对称加密算法,在本系统中用于用户登录信息加密、解密以及门户系统和应用系统的交互。
RSA encryption algorithm is a non-symmetric encryption algorithm , in this system for user login and encryption and decryption portal system and application systems to interact .
-
然后本文进一步利用无线Mesh网的功率控制、多跳路由、多径路由的研究成果,提出了结合功率控制的多径非对称路由算法。
This thesis , on the base of the study results of multi-jump routing and multi-path routing of Wireless Mesh Networks , further proposes the asymmetrical calculating method of multi-route and multi-jump based on power-control .
-
NET框架下,使用C,综合利用对称与非对称加密算法的优点,设计编写了网上在线数据安全传输的TCP程序。
NET framework , this paper designs and codes a TCP program in C # to solve the problem of transmitting online data on network in security by using synthetically the strong points of symmetric algorithm and asymmetric algorithm .
-
通过节目加扰和多层加密机制,在CA开放的标准接口下,采用对称和非对称加密算法,完成用户的授权消息和用户管理消息的生成。
Under the open standard connection of CA , the disturbing program with the multilayered encryption mechanism , uses the symmetrical and the asymmetrical encryption algorithm , while it products the authorized user news and management news .
-
本文介绍了在网络上大行其道的注册码(序列号)软件加密方法,并给出了一个基于Visualc++60开发平台和非对称加密算法RSA的实例。
This thesis describes a software protection scheme which is based on serial number and is very popular on the internet . An implementation by Visual C + + 6.0 and RSA encryption algorithm is provided .
-
在实现过程中,本文根据DSP特性,在前人提出的算法基础上进行改进RSA非对称加密算法的实现方法,并进行了实验测试。
Based on arithmetic brought out by former , This paper ameliorate the implementation method of RSA unsymmetrical arithmetic according with the characteristic of DSP chips during the realization . And the experiment test is carried out .
-
本文研究了智能卡安全算法理论,包括对称密码算法(DES,AES),非对称密码算法(RSA,ECC),散列函数,数字签名。
The paper is studying the security arithmetic theory of smart card , including the symmetry cryptogram arithmetic ( DES , AES ), dissymmetry cryptogram arithmetic ( RSA , ECC ), hash function , Digital Signature .
-
<1>对现有的对称加密算法DES算法和非对称加密算法RSA算法进行分析,使其易用硬件实现;
According to the research , the major work done is as following : < 1 > Analyzes the symmetric-key encryption algorithm DES and dissymmetric-key encryption algorithm RSA , and makes them easy to realize in hardware .
-
介绍了通过改造T30通信协议,把对称、非对称密码算法结合到T30协议中;
The modified T30 communication protocol was introduced , which combined symmetric and nonsymmetric encryption algorithm with T30 protocol ;
-
本文的后半部分描述了通信模块和网络锁模块的实现,包括消息通信模型、通信事件机制、对象传输协议、XFS文件锁机制和非对称锁算法。
The second half part of this thesis puts emphasis on implementation of the communication module and the network locks module , including message communication model , communication events mechanism , object transfer protocol , file locks and asymmetric lock algorithm .
-
根据TLS协议,可以使用非对称加密算法来实现会话密钥的交互,然后通过基于对称加密算法的会话密钥来进行邮件信息的加密和解密,从而保证邮件信息的保密性。
According to TLS protocol , the non-symmetric encryption algorithm can be used to exchanging the session key , which is based on symmetric encryption algorithm , can be used to carry out the encryption and decryption of E-mail messages , so the confidentiality can be ensured .
-
本文重点描述了对象传输协议和非对称锁算法。
This thesis focuses on Object Transfer Protocol and Asymmetric Lock algorithm .
-
模糊聚类神经网络的非对称学习算法
An asymmetric robust learning algorithm of fuzzy clustering neural networks
-
基于特征向量和方程无穷解的非对称水印算法
Asymmetric Watermarking Algorithm based on Eigenvector and Equation Which Has Innumerable Solutions
-
基于混沌理论的非对称加密算法研究
Research on Public-Key Encryption Algorithm Based on Chaos Theory
-
而非对称加密算法能解决密钥管理和分发上的问题,但加密速度慢。
And asymmetric algorithm can solve management of key , but has slower speed in encryption than symmetric algorithm .
-
对数据加密算法的发展史及相应的对称加密算法和非对称加密算法的主流算法进行了研究。
In this paper we introduced the phylogeny of data encryption algorithm and the mainstream algorithm of symmetric-key algorithm and asymmetric-key algorithm ?
-
首先阐述密码学的相关概念,然后对传统密码技术和现代的对称密码算法与非对称密码算法及其安全性进行分析;
Related conception is introduced at first , then the principle and security of conventional cryptology , modern symmetrical encryption algorithms and asymmetrical encryption algorithms are analysed ;
-
是一个用非对称密码算法原理和技术实现并提供安全服务的具有通用性的安全基础设施。
PKI ( Public Key Infrastructure ) is a security infrastructure with generality which is based on the asymmetric cryptographic algorithm & technical realization and provides security service .
-
椭圆曲线密码算法是一种重要的非对称密码算法,被许多著名的国际标准组织采纳,并广泛应用于商用密码领域。
Being a important asymmetrical cryptography , Elliptic curve cryptography ( ECC ) is adopted by many famous international standardization organizations , and is widely used in commercial encryption .