| 1. | Public key cryptographic systems 公开密钥加密系统 |
| 2. | A cryptographic system in which units of plain text of regular length , usually letters , are arbitrarily transposed or substituted according to a predetermined code 密码一种密码系统,其中固定长度的明文里的单元,通常为字母,被任意倒置或按事先确定的符号系统替换 |
| 3. | According to the fundamental theory of security of cryptographic system , the security of various structural encryption algorithms is researched and security model is designed in paper 本文从密码系统的基本安全理论出发,致力于各体制加密算法安全性的研究和安全模型的设计。 |
| 4. | The difficulties of elliptic curve discrete logarithm problem and safety of 3 - des encryption is analyzed in detail . this cryptographic system applies a key exchange scheme based on ecc and trusty data encryption algorithm 文章最后分析了该密码系统的安全性,对椭圆曲线离散对数问题的难解性以及三重des加密算法的安全性作了较详细的分析。 |
| 5. | Then it introduces the main algorithms including the construction of elliptic curve , points operating , data types conversions , triple encryption , et al . in the end , the security of the cryptographic system is analyzed 然后给出了该方案所涉及主要操作的算法描述,其中包括椭圆曲线的产生、点运算、数据类型转换、基于cbc的三重加密算法等。 |
| 6. | It s ideal for you if you have encountered various descriptions of cryptographic systems and general claims about the security or insecurity of particular software and systems , but you may not entirely understand the background of these descriptions and claims 接触过各种密码系统的描述以及关于特定软件和系统的安全性或非安全性的一般声明,但又并不彻底了解这些描述和声明的背景,本教程对具有这样经历的读者是最理想的。 |
| 7. | At the same time , some methods on how to design chaotic cryptographic systems were put forward and these methods usually made a concrete analysis toward security of systems , which contribute to these cipher algorithms an effective application , such as creating s - boxes by chaotic systems 同时,一些设计混沌密码的系统方法已开始出现,这些方法往往对系统的安全性做了相当细致的分析,从而使这些密码算法具有较高的安全性,如使用由混沌系统构造s盒。 |
| 8. | Then , a solution of terminal - based atm cryptographic system is proposed , the layout of the security services in such system is considered , and the hardware modules involved are designed and the architectures of them are presented . in addition , a point - to - point secure messages exchange protocol on atm user plane is presented and is integrated into the atm driver . finally , some real world issues are pointed out and some discussions are made 本文在对atm网络的安全问题进行深入研究的基础上,参考国外的研究思路,结合国内目前在atm设备开发方面的实际情况,提出了一种基于终端的atm网络安全保密系统解决方案;探讨了该系统中各种安全业务的配置情况;设计了其中所涉及到的各种硬件模块并给出了原理性结构图;设计并开发了一种利用用户面用户通道实现的点到点安全消息交换协议;提出并解决了系统实现时应该考虑的一些问题。 |
| 9. | On the base of researching in several application security systems , this paper did much work on researching in symmetrical cryptographic system , public key cryptographic system , digital signature system and the digital certificate application technology in the contemporary cryptography , and issued a suitable security application framework taking account of the characteristics of the rfmdms , several key technologies in constructing were discussed also 本文在对国内外各种安全应用系统调查研究的基础上,围绕现代密码学中对称式密码系统、公开密钥密码系统、数字签名系统、数字证书应用技术等进行了深入研究,并结合rfmdms体系结构方面的特点,提出了适合rfmdms的安全应用系统框架,而且对系统实现中的关键技术进行了研究。 |
| 10. | This paper analyzes security problems in computer networks and the main characteristics of current cryptography . and it discusses mathematical knowledge and main conception required by construction of elliptic curve crypsosystem . on this basis the paper presents a scheme of cryptographic system based on ecc ( elliptic curve cryptography ) 本文分析了计算机网络所存在的安全问题以及现有密码体制的主要特点,论述了构造椭圆曲线密码系统所需的数学知识和主要概念,在此基础上提出了一个基于ecc (椭圆曲线密码体制)的密码系统方案。 |