对称密钥加密
- 网络symmetric key encryption;Symmetric Key Cryptography
-
EKE协议是基于弱口令的密钥交换协议,通过使用对称密钥加密体制和公钥加密体制,能够很好地抵抗离线字典攻击。
EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption .
-
一种解决方案是使用预先约定的安全密钥(对称密钥加密体系,例如DES或AES)进行加密。
One solution is to use some previously agreed upon secret key ( symmetric key cryptography like DES or AES ) for encryption .
-
基于RSA算法的非对称密钥加密及签名软件的自主实现
An implementation of encrypting and signing software based on RSA algorithm
-
协议使用了Hash函数、对称密钥加密算法以及数字签名技术,实现简单。
This protocol uses hash functions 、 common key encryption and digital signature technology , and it is easy to realize it .
-
ssl使用一个公共密钥基础设施来协商出一个双方都能接受的对称密钥加密,并在通信两端之间交换双方同意的加密密钥。
SSL uses a public key infrastructure to negotiate a mutually acceptable symmetric key cipher and to agree upon and exchange encryption keys between two communication sources .
-
介绍了Web服务常用的安全技术:对称密钥加密系统和非对称密钥加密系统。论述了SSL安全协议的安全机制和它在Web上的应用。
The authors make an introduction to the safety techniques used normally on web service : synchronous private key encryption and asymmetrical private key encryption , and discuss the safety mechanism of SSL protocol and its application on web .
-
Kerberos是基于可信第三方KDC使用对称密钥加密算法的认证协议,适合在一个物理网络并不安全的环境下使用。
Kerberos is a authentication protocol based on KDC and symmetry key cryptography . It is used suitably in a physical insecurity network .
-
它具有独特的安全特性,许多密码技术如公钥加密和对称密钥加密,数字签名和数字证书等,被用来保证数据的可靠性和完整性,进而形成了Notes的安全机制。
And it has many cryptographic techniques , including public key encryption and symmetric-key cryptography , digital signatures and digital certificates etc. These techniques are used to ensure data reliability and integrity , thus forming Notes security mechanisms .
-
影响Kerberos可升级的潜在限制因素是它使用对称密钥加密,建立和维护大量共享密钥的难题影响了Kerberos在Internet中的推广应用。
The potential fact holdbacked the Kerberos scalable is its difficulty to construct and maintenance the secret key because of its using symmetry cryptography mechanism , It 's also impact Kerberos been using in Internet .
-
为了消除对称密钥加密算法的会话密钥在网络传输中的安全隐患,系统设计中采用了AES加密算法和RSA加密算法相结合的混合加密技术。
To remove the security risk in network transmission caused by session key of symmetric key cryptographic algorithm , the AES algorithm and RSA algorithm are combined as encryption technique in system design .
-
KD-SNFS综合使用了对称密钥加密算法和公钥加密算法来提供安全性。
KD-SNFS combines the symmetric-key encryption algorithm and the public-key encryption algorithm to ensure the security of files .
-
从保证电子商务交易安全的角度出发,分析了对称密钥加密、公开密钥加密、报文摘要算法、数字签名技术。并对公开密钥的安全基础设施PKI实现方案进行较详细的讨论。
For the purpose of ensuring safety in electronic commercial trade , a detailed analysis of the techniques for secret key encryption , public key encryption , message digest algorithms and digital signature was given , and a PKI practical plan to build the safe public key infrastructure was discussioned .
-
文件的机密性由Blowfish对称密钥加密算法保护,文件在创建后由系统自动生成Blowfish密钥和初始向量。
The Blowfish symmetric-key encryption algorithm protects the confidentiality of the files , the key and the initialization vector of a file are auto generated by the file system after the file being created .
-
对称密钥加密体制是加密大量数据的行之有效的方法。
Symmetric encryption mechanism is effective for mass data encryption .
-
仅使用对称密钥加密算法,因而计算上是有效率的。
It is computationally efficient because it only relies on symmetric key cryptography based operations .
-
对数据的加密可以有两种方法:对称密钥加密机制和非对称密钥加密机制。
There are two ways to encrypt the data : Symmetric Algorithm Encryption , Public-key Algorithm Encryption .
-
目前商用的密码算法主要有两大体系:对称密钥加密体系和公钥加密体系。
There are mainly two systems of cryptographic algorithms & the symmetric key cryptosystem and the public key cryptosystem .
-
密钥管理是对称密钥加密体制的核心,而密钥产生方法则是密钥管理的基础。
Key management is the core of the symmetric cryptographic communication , and the key generation method is the foundation of the key management .
-
首先从加密和解密、对称密钥加密、公钥加密、密码分析等方面对密码学进行了简单的介绍。
To start with , cryptography is introduced from encryption and decryption , symmetric secret key encryption , public key encryption and password analysis .
-
该加密锁通过先进的对称密钥加密算法和串口取电、电平转换、单片机接口等硬件电路,结合计算机软件程序,实现了智能加密功能。
Softdog technology and programme with VC + + The lock is encrypted intelligently by advanced encryption algorithm and reliable hardware circuit , combined with software program .
-
其中,软件加密中的密码方式又有对称密钥加密和非对称密钥加密两种。
And with respect to the software encryption they can be ( divided ) into two fields : the symmetrical secret key encryption and unsymmetrical secret key encryption .
-
该协议采用的技术包括,对称密钥加密、公共密钥加密、哈希算法、数字签名技术以及公共密钥授权机制等。
The protocol uses such technologies as symmetrical key encryption , public key encryption , Hasche algorithm , digital signature as well as public key authorization mechanism and so on .
-
本文研究了网络加密传输的一些基本理论和实践方法,对公开密钥和对称密钥加密的适用场合进行了讨论;
This paper work over some elementary theory and practise method about the encrypt of network transfer . In this paper , also talk about the public key algorithm and symmetry algorithm .
-
叙述了数据加密系统的组成,比较了对称密钥加密体制和公开密钥加密体制的优缺点,并得出在电子商务中采用混合密钥加密体制,既保证了数据安全,又提高了加密和解密速度。
The composition of a data encryption system is introduced comparing the symmetry key cryptosystem and public key cryptosystem . A mixed key cryptosystem is then recommended for electronic commerce , ensuring data security and speedy encryption and decryption .
-
SSL将使用对称密钥(加密密钥)算法对在客户机与服务器之间传递的数据进行加密。
With SSL , the data going back and forth between client and server is encrypted using a symmetric key ( secret key ) algorithm .
-
基于组合对称密钥带加密数字签名方法的研究
Digital Signature with Encryption Based on Combined Symmetric Key
-
对称密钥是加密和解密都使用的一个密钥。
A symmetric key is one key that is used for both encryption and decryption .
-
以下示例更改用于保护对称密钥的加密方法。
The following example changes the encryption method that is used to protect a symmetric key .
-
公钥加密是使用一对非对称的密钥加密或解密的技术。
Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption .
-
第一个报表服务器实例使用第二个实例的公钥来为第二个报表服务器实例创建对称密钥的加密副本。
The first report server instance uses the public key of the second instance to create an encrypted copy of the symmetric key for the second report server instance .