公钥加密

  • 网络Public key encryption;public key cryptography;RSA;PKI;PKE
公钥加密公钥加密
  1. 加密(Encryption)是信息保护的一种必不可少的手段。目前有两种基本的加密方法,即私钥加密和公钥加密。

    There are two basic types of encryption methods , namely the private key encryption and public key encryption .

  2. PKI以公钥加密体制为基础,结合了数字证书、数字签名等技术。

    PKI is based on public key encryption system and integrates the digital certificate and digital signature .

  3. 请使用PHP支持的公钥加密技术。

    Use public-key cryptography , which PHP supports .

  4. 公钥加密算法RSA的一种快速实现方法

    A Fast Realization for RSA Algorithm of Public Key Cryptosystems

  5. 它能够满足512位和1024位RSA公钥加密算法的实用要求。

    It can meet the practical requirments of 512-bits and 1024-bits RSA algorithm .

  6. RSA是一种被广为使用的公钥加密体制。

    RSA is a wide used public-key cryptography algorithm .

  7. 以RSA(n,e)表示以n和e为公开钥的RSA公钥加密体制。

    By RSA ( n , e ) denote the RSA-ciphering system with n and e as its public keys .

  8. RSA公钥加密技术安全性分析与其在电子商务中的应用

    Safety of Encryption Techniques of RSA Public Key and its Application in Electronic Commerce

  9. 对公钥加密密码RSA算法进行了详细的编码实现。

    Program the RSA public key encryption algorithm and give the codes in details .

  10. 然后讨论了RSA公钥加密算法。

    Then , it discusses RSA algorithm .

  11. 基于辫子群上的公钥加密算法的Kerberos协议改进

    Improved Kerberos protocol based on public key encryption algorithm of braid groups

  12. 加密算法采用成熟的IDEA和RSA算法,主要考虑到对称加密的高效性和公钥加密的安全性;

    Encryption algorithm using the IDEA and RSA algorithm , the main consideration to symmetric encryption efficiency and the security of public-key encryption ;

  13. 基于Chebyshev多项式的公钥加密和密钥交换方案的改进

    Improvement in Public-key Encryption and Key Exchange Scheme Based on Chebyshev Polynomials

  14. 安全套接字层(SSL)是一种工业标准协议,它使用对称密钥和公钥加密机制在Internet上提供安全通信。

    Secure Sockets Layer ( SSL ) is an industry-standard protocol that provides secure communication on the Internet using symmetric-key and public-key cryptography mechanisms .

  15. 提出了一种基于RSA公钥加密防止DNS欺骗的方法。

    After analysis above , the paper focuses on a method of preventing DNS Spoofing based on RSA .

  16. RSA加密算法是世界上使用最为广泛的公钥加密算法(PKC)。

    The RSA encryption algorithm is the most widely used public-key cryptographer ( PKC ) of the world .

  17. 椭圆曲线密码系统ECC是现在主流的公钥加密系统RSA的有效替代。

    Elliptic curve cryptosystem ECC is an efficient substitution of the mainstream public key encryption system RSA nowadays .

  18. 我们对安全性、加密技术,甚至公钥加密技术介绍了很多,目的是帮助您成功开发下一个PHP项目。

    I 've explained enough about security , encryption techniques , and even public-key cryptography to help make your next PHP project a success .

  19. 先后提出了基于扩展的Chebyshev多项式的公钥加密、密钥交换协议、网络身份认证协议以及数字签名协议。

    The relative public-key encryption , key exchange , authentication identity and digital signal schemes are presented .

  20. 并探讨了公钥加密算法椭圆曲线ECC和无线公钥基础设施WPKI在移动支付中的应用前景。

    The implementation of ECC and WPKI in the mobile payment is also discussed .

  21. PKI包括两个主要安全技术:公钥加密技术、数字签名和验证技术。

    Two main security technologies are concluded in the PKI : the encryption of public-key as well as the digital signature and verification .

  22. 密码技术有对称密钥技术和非对称密钥技术之分,本文主要针对RSA公钥加密技术安全性进行系统分析,并阐述其在电子商务中的应用。

    This paper mainly analyses the safety of encryption techniques of RSA public key , and explains its application in the electronic commerce .

  23. 本文利用加密技术中广泛应用的RSA公钥加密算法,提出了一种基于数字图像分割的认证加密方案。

    By using the well-known RSA public key encryption algorithm , this paper gives a newauthenticated encryption scheme based on the division of digital image .

  24. PGP(PrettyGoodPrivacy)作为强有力的公钥加密工具,已经得到广泛的应用,但不正确的信任假设常常会破坏PGP的安全性。

    As a powerful public key based encryption tool , PGP ( Pretty Good Privacy ) has been used widely , but wrongful trust assumptions often undermine its security .

  25. 在分析了RSA公钥加密系统和混沌加密各自的优点及其存在的安全问题的基础上,提出了一种新的分组双密密钥密码方案。

    In this paper , through analyzing the advantages and security of RSA encryption system and chaotic encrypt , a new grouping double-key cryptogram scheme is presented .

  26. 可验证加密方案(VES,verifiableencryptionscheme)就是一种满足这样要求的特殊公钥加密方案。

    VES ( verifiable encryption scheme ) is a special public - key system satisfying this request .

  27. DiXiao等人于2005年提出了一种基于混沌映射的可否认认证方案,该方案利用混沌模型分别构造了一个混沌密钥交换协议和公钥加密以及一个混沌Hash函数。

    In 2005 , Di Xiao proposed an entire deniable protocol based on chaotic maps , which used chaotic model to a chaotic key exchange scheme and a chaotic hash function .

  28. AKS算法及其在公钥加密术中的意义

    AKS Algorithm and It 's Effect on Public - key Encryption

  29. 它具有独特的安全特性,许多密码技术如公钥加密和对称密钥加密,数字签名和数字证书等,被用来保证数据的可靠性和完整性,进而形成了Notes的安全机制。

    And it has many cryptographic techniques , including public key encryption and symmetric-key cryptography , digital signatures and digital certificates etc. These techniques are used to ensure data reliability and integrity , thus forming Notes security mechanisms .

  30. 对于PGP和其他公钥加密方法,不存在从公钥推断某人私钥的方法。

    With PGP and other public-key encryption methods , there 's no way to deduce someone 's private key from the public key .