首页 / 词典 / good

3DES

  • 网络三重DES算法;三重数据加密标 准
3DES3DES
  1. Dynamic Key 3DES Algorithm of Discrete System Based on Multi-dimension Chaos

    基于高维混沌离散系统的动态密钥3DES算法

  2. The Implementation of the Real-time 3DES Encryption Algorithm Based on the Single Chip Computer

    基于单片机的实时3DES加密算法的实现

  3. Implementation of DES and 3DES Cryptography Algorithm Based on Java Cards

    基于Java卡DES及3DES算法的实现

  4. Pipeline Design of Effective DES / 3DES Based on ASIC

    基于ASIC的有效DES/3DES流水线设计

  5. Implement of 3DES Encryption Algorithm Based on ARM Processor

    基于ARM的3DES加密算法实现

  6. By means of 3DES encrypting the database connection string , greatly improve system 's security .

    通过使用3DES算法对数据库连接字符串进行加密,增强系统的安全性。

  7. Implementation of multi mode low power DES / 3DES IP core based in AHB bus

    基于AHB总线的多模式低功耗DES/3DESIP核的实现

  8. Small Area Implementation of 3DES IP

    3DESIP的小面积实现

  9. Dynamic key 3DES algorithm is proposed , which has higher security , great non-crack ability and wide applicability .

    为了增强安全性,进一步提出了动态密钥3DES算法,使系统有很强的抗破译能力。

  10. Some frames in video stream are encrypted by 3DES private-key algorithm .

    用私钥算法中的3DES对视频流的有关帧进行加密;

  11. And keys of 3DES are encrypted by RSA public-key algorithm .

    而用公钥算法中的RSA对3DES密钥进行加密。

  12. 3DES , RSA and MD5 can be achieved by using nine classes defined in the class library .

    类库中设计了九个类,使用该类库可完成3DES,MD5和RSA等加密解密运算。

  13. By applying the numerical method , presented by J. NET framework is analyzed . Then , specific classes that implement 3DES is designed .

    netFramework提供的密码类,然后设计了具体的3DES的应用类。

  14. Cryptographic transform libraries in OpenBSD include Blowfish , Data Encryption Standard ( DES ), 3DES , and Cast .

    OpenBSD中的加密转换库包括Blowfish、数据加密标准(DES)、3DES和Cast。

  15. First , the standards of Data Matrix two-dimensional barcode as security code in digital postage stamp was briefly introduced , following 3DES encryption algorithm was described .

    文中首先简要介绍了DataMatrix二维条码作为防伪码在数字邮资戳印的标准,并介绍了与标准相关的3DES加密技术。

  16. In chapter 3 , the survey introduce 3 main development phase of cryptology . Then it illustrates the basic theory and security analysis of DES , 3DES , IDEA , AES encryption algorithm .

    在第三章中先介绍了密码学的三个主要发展阶段,接着讲述了对称加密算法中的DES、3DES、IDEA、AES加密算法的基本原理和安全分析。

  17. Based on the 3DES block cipher frequency-hopping ( FH ) sequences , the paper suggests a kind of packet protocol for frequency-hopping multiple-access ( FHMA ) networks .

    基于3DES迭代型分组密码产生的跳频序列,构造了一种跳频组网的随机多址接入方案模型。

  18. DES , 3DES and AES are the most widely used cipher algorithms , the reconfiguration and high-speed implementation of the three algorithms are important for the design of a reconfigurable cipher chip .

    DES、3DES和AES是应用最广泛的分组密码算法,其可重构性和高速实现对可重构密码芯片的设计具有重要影响。

  19. Based on the theory of block ciphers with a new triple encryption scheme 3DES , the generation of hopping patterns is presented , which has the advantages of good security , fast generation and easy realization .

    基于三重加密方案3DES的迭代型分组密码体制,构造了一种跳频码序列产生方法。

  20. In this paper , the background of EMV specification is introduced . The basic principles of the encrypting algorithms used in this specification , such as 3DES and RSA , are described too .

    介绍EMV规范的来历和规范中所采用的3DES算法、RSA算法等密码算法的原理。

  21. DES and 3DES Algorithms are successfully applied in the encrypting of both transmissions and storage of data over Yuxi Teachers ' College campus network for one - card pass services connected to the bank .

    选择DES和3DES算法作为数据传输或存储加密的办法,建立起了一个以校园网络为依托、与银行联网的复合校园卡安全保障体系,并在玉溪师范学院校园卡系统应用中取得成功。

  22. In this paper , based on the analysis about the reconfiguration of the DES , 3DES and AES , we propose a reconfigurable architecture , which combines reconfiguration technology with pipeline , parallel structure .

    本文分析了常用对称密码算法DES、3DES和AES的可重构性,利用流水线、并行处理和可重构技术,提出了一种可重构体系结构。

  23. The 3DES encryption algorithm is briefly introduced in this paper at first , and two methods which are used to save computing time in the implementation of this algorithm are provided , at last the result of the practical test is attached .

    首先简要介绍了3DES加密算法,接着给出了用单片机来实时实现该算法时为了提高运算速度而采用的两种方法,并给出了实际测试结果。

  24. Using 3DES algorithm to replace DES algorithm could do less change for the original system , which not only improves the security of the system , and also can use existing resources to be reused to improve the efficient use of resources .

    利用3DES算法来替换DES算法无需对原系统做太大改动,这样既可提高系统的安全性,又可利用原有的资源进行更新再利用,进而提高资源的利用效率。

  25. To ensure the high speed of the system , in the base of analysis and study algorithms principle , combining the characteristics of DES / 3DES encryption algorithm , using a fully pipelined design to improve the system clock frequency and throughput .

    为了保证系统能够实现高速,本文在分析和研究算法原理的基础上,结合DES/3DES加密算法的特征,采用了全流水线结构设计,提高了系统的时钟频率和吞吐量。

  26. It was proved that the 3DES algorithm module of the coprocessor can be substituted to AES-128 algorithm module with little modification to the coprocessor , and the same with substituting AES-128 algorithm module to 3DES algorithm module .

    实验证明,只需进行较小的修改,就能将协处理器的3DES算法模块更换为AES-128算法模块或者将AES-128算法模块更换为3DES算法模块。

  27. However , with the development of technology , it has been proven to be an unsafe algorithm . But the extension of the DES algorithm , namely , the emergence of 3DES algorithm , extremely makes up the unsafe deficiencies of DES algorithm .

    但其算法的延伸,即3DES算法的出现,极好地弥补了DES算法不安全的缺陷。

  28. In the part of encryption , the 3DES is combined with chaotic encryption , and the block encryption algorithm is applied to real time communication . The key of every data package is changed dynamically which has large keys space and strong ability of anti-attacking .

    语音加密采用数据加密算法与混沌加密算法相结合,将分组加密算法应用到实时数据流通信中,动态改变数据包加密密钥,密钥空间大,抗破译能力强。

  29. With regard to communication security , the safekeeping of password and real-time processing in speech signal encryption based on triple Data Encryption Standard ( 3DES ) were analyzed . In addition , the basic framework of speech encryption and the hardware system design in encryption telephone were presented .

    针对通信安全性问题,分析了三重数据加密的密钥保管问题和语音加密的实时处理技术,提出了将算法移植到电话中加密语音信号的系统结构并进行了硬件设计。