对称密码体制

  • 网络symmetric cryptosystem;Symmetric Encryption;Symmetric Syetem
对称密码体制对称密码体制
  1. 按照算法的加解密密钥的关系密码体制分为两种:对称密码体制和公钥密码体制。

    According to the relationship between encryption keys and decryption keys cryptosystem is divided into two kinds : symmetric cryptosystem and public-key cryptosystem .

  2. 对基于对称密码体制的Kerberos协议改进

    The Improving of Kerberos Protocol Based on Symmetric Cryptosystem

  3. 利用密码学中基本的对称密码体制DES算法和非对称密码体制RSA算法,设计出了三种具体的方案,并对比了它们的特点。

    Utilizing elementary algorithm of DES and RSA in cryptography , three material schemes are designed and compared .

  4. 本文对计算机密码体制中非对称密码体制&RSA公开密钥密码体制进行了分析,并给出了可运行的RSA算法的源代码。

    This paper analyzes RSA public key cryptosystem - asymmetrical cryptosystem , and also presents realizable source code for RSA algorithm .

  5. 加密算法的选择中,文章选择了对称密码体制和非对称密码体制中两个最有代表性的加密算法:AES加密算法和ECC加密算法。

    In the choice of encryption algorithm , articles chosen symmetric and asymmetric cryptography cryptography two most representative encryption algorithm : AES encryption algorithm and ECC encryption algorithm .

  6. 本文重点研究并实现了对称密码体制中的DES算法、公钥密码体制的RSA算法和用于数字签名的MD5算法,作了安全性分析。

    This article studied and has realized in the symmetrical password system DES algorithm , the male key password system RSA algorithm with emphasis and uses in the digital signature MD5 . algorithm , has made the secure analysis .

  7. 在分析对称密码体制和公开密钥体制的代表DSE和RSA算法的优缺点后,提出将两种算法结合的网络数据安全系统的模型。

    After analyzing the advantages and the disadvantages of DSE arithmetic and RSA arithmetic , which are both representatives of the traditional cryptogram systems , put forward a model of network data safety system combined two arithmetic .

  8. 基于非对称密码体制的软件注册系统研究与实现

    Research and implementation of software registration system based on asymmetric cryptography

  9. 在数字签名中使用对称密码体制的一些方法

    The Some Used Symmetric Cryptosystem Methods in Digital Signature

  10. 基于对称密码体制的第三方认证的无线局域网安全方案研究

    The WLAN Security Scheme of the Third Party Authentication Based on Symmetric Cryptosystem

  11. 网络通讯中基于对称密码体制的密钥管理

    Key management of symmetrical cipher system on network communication

  12. 现代密码体制中,数据加密方法主要有对称密码体制和公钥密码体制两种。

    There are two methods , symmetrical encryption and dissymmetrical encryption , in modern encryption system .

  13. 传统的对称密码体制和非对称秘密体制主要基于计算复杂性。

    Most of classical cryptosystems , including public key cryptosystem and symmetric key cryptosystem , are based on computation complexity .

  14. 本文首次研究了量子签名问题,并提出了一个基于对称密码体制的量子签名方案。

    In this paper , the principle of the quantum signature has been investigated , and a quantum signature scheme has been proposed .

  15. 该文根据量子密钥分配原理,提出了实现对称密码体制密钥的绝对保密的量子密钥分配协议。

    According to quantum key code distribution 's principle , this paper has put forward absolutely safe protocol of quantum key code distribution for realizing the key of symmetrical cryptosystem .

  16. 作为对称密码体制重要组成内容的分组密码是许多密码系统的核心要素,是保障信息机密性和完整性的重要技术。

    As an important part of symmetric-key cryptography , the block cipher is a core component of some cryptology systems . It can provide the information security such as confidentiality and data integrity .

  17. 虽然现代密码学中的对称密码体制、公钥密码体制、数字签名和密钥交换技术起到了保障安全的作用,但这些算法都将数据的安全性简单的归于一个规模很小的单一密钥。

    Although modern cryptography provides symmetric-key block ciphers , public-key encryption , digital signature and key exchange technology to guarantee the information safety , all those algorithms ' safety only relies on a small scale key .

  18. RSA是一种非对称密钥密码体制,它允许在不安全的媒体上通过通讯双方交换信息,安全传送秘密密钥。

    RSA is a public-key cryptosystem in an effort to help ensure Internet security .

  19. 椭圆曲线加密体制(ECC)是一种基于椭圆曲线上的离散对数问题而设计的非对称公钥密码体制。

    The security of Elliptic Curve Cryptography ( ECC ) is based on the difficulty of elliptic curve discrete logarithm .

  20. 使用对称密钥密码体制来加密需传递的机要信息,而同时使用RSA等非对称密钥密码体制来加密DES的密钥。

    The use of symmetric key cryptography to encrypt confidential information to be transmitted , while at the same time , such as using RSA asymmetric key cryptography to send DES key .

  21. 本文论述了Web的发展及其Browser/Server模式概念,以及基于Web的网络安全的内容与机制;阐述了密码学的基本概念、分类,对称密钥密码体制DES与AES以及公开密钥密码体制RSA;

    The paper discusses the development of Web , Browser / Server mode conception and the content and mechanism of network security based on Web , and also describes the basic conception and system of cipher theory , symmetric-based Data Encryption Standard and Advanced Encryption Standard and asymmetric-based RSA .

  22. 针对电子商务活动中的信息安全问题,基于非对称公钥密码体制,研究了RSA算法的软、硬件实现,提出了一种用加密卡实现的数字签名方案。

    To solve the problem introduced by the development of e-business , this paper discusses the research on data encryption algorithms and digital signature based on unsymmetrical cryptographic system , and presents an application scheme of digital signature based on RSA encryption algorithm which can quickly realize data encryption .

  23. 对称式密码体制数据加密算法的分析

    Analysis of symmetric encryption algorithm

  24. 椭圆曲线密码是现代公钥密码学领域中的一个重要课题,椭圆曲线密码体制是一种基于椭圆曲线上的离散对数问题而设计的非对称公钥密码体制。

    Elliptic Curve Cryptosystem ( ECC ) is an important subject in the field of modern public key cryptography . ECC is based on the elliptic curve discrete logarithm .

  25. 该方法兼有两类加密体制的优点:既有对称密码加密体制的加密速度快,强度高的优点,又拥有公钥密码体制在密钥分发与管理上的优势。

    It has strongpoint of symmetry encryption scheme such as encryption speed and encrypt intensity , but also has advantage of public key encryption scheme on key distribution and key management .

  26. 将公钥密钥分配技术和对称密码加密体制结合起来,提出并实现了一类高效快捷的混合密码加密方案XHES。

    This paper combines advantages of the public key key distribution technique and symmetry encryption scheme , educes a kind of speedy high effect public key encryption scheme called as XHES ( Xiao 's hybrid key encryption scheme ) .

  27. 本文首先对PKI体系的底层技术进行深入研究,重点分析了非对称密码椭圆曲线密码体制,并将它与其他密码技术进行了比较。

    The main contributions of this dissertation include : Firstly , deeply research on underlying techniques of PKI system , emphatically analyze dissymmetrical public-key cryptography ECC and compare it with other cryptography techniques .

  28. 针对网络环境下信息安全技术中基于对称和非对称密码体制的数字签名技术的不足,提出了混合方式密码体制的数字签名方案;

    Aiming at the shortcoming of digital signature based on symmetrical and dissymmetrical cryptographic system in network , the scheme of digital signature based on hybrid pattern cryptographic system is presented .