Mobile
Log In Sign Up
Home > english-chinese > "encryption, data" in Chinese

Chinese translation for "encryption, data"

数据加密

Related Translations:
encryption:  编成密码编密码加密,锁码加密技术加密术隐密性
bulk encryption:  整体加密
encryption device:  密码设备
weak encryption:  脆弱加密
block encryption:  分块加密块加密
encryption system:  编密码系统
encryption protocol:  加密协议
hybrid encryption:  混合加密
encryption algorithm:  编码算法加密算法, 加密码算法加密演算法
encryption unit:  加密装置密码组件
Example Sentences:
1.We apply the elgamal and dsa algorithm on the curve , and give the method of data encryption , data decryption and data signatuxe based on the elliptic curve
参考现有的公钥密码算法: elgamal 、 dsa算法的原理,说明基于椭圆曲线的数据加密、解密与数字签名的方法。
2.In order to guarantee the security and the reliability , the technologies of identification and validating , access control , auditing , data encryption , data backup online and so on , are adopted
为保证系统的安全性和可靠性,系统采取了身份识别与验证、访问控制、审计、数据加密、在线备份等措施。
3.The emphasis of the paper is to present a solution to security problems in wlan , which is based on the fundamental topological structure of infrastructure . the design includes four main modules : data encryption , data integrality code , key management and authentication
该方案基于有中心的无线局域网拓扑结构,包含了数据加密、数据完整性认证、密钥管理和身份认证等四个基本模块。
4.It contains the architecture , algorithms , and protocols etc . main contributions of the work are as follows : firstly , the security architecture , requirements , mode , and algorithms , protocols flows of 3g needed are formalized ; second , the radio access encryption , data confidentiality and data integrity technology are also deeply discussed ; third , a detailed analysis of the standardized fs and f9 is given ; at the same time , the two algorithms are realized ; next a scheme to implement fd - f5 algorithms 3g needed is proposed on the basis of 3g architecture , we also analyzed its practicability ; then according to provable security theorem and the differential and algebraic cryptanalysis , we analyze the kasumi algorithm to know the security level of it ; two systems to implement the security in the network - domain are given aiming at resolving the security problem in the fixed network : one is a global system ; the other is called two - tiered key management system by use of ipsec , ike
首先概要的总结了3g的安全结构,安全需求,安全模式以及算法和协议流程,对无线接入网的安全实现、数据加密的实现、数据的完整化保护等进行了深入的探讨,详细的阐述了其中用到的标准化算法f8 , f9 ,并对这两个算法进行了实现。然后在此基础上提出了实现3g中需要的算法f0 - f5的方案,并分析了其可行性;根据可证明的安全理论详细分析了kasumi算法,从而对标准化算法有了一个理性的认识,更加清楚的知道了它的安全度;接着利用数学、差分等方法对kasumi进行了实际的分析,证明其是安全的。文章接着在无线接入网的安全体制基础上进一步给出了两种实现网络域内安全的密钥管理体制,解决了固定网内的安全:一个是宏观的安全体制;一个是two - tiered (两阶)安全体制,后一种体制是在ipsec , ike的基础上提出和完善的。
5.Block cipher is an important branch of cryptology , it has many attractive features such as high rates , easy for standardization , and efficient for both software and hardware implementations . block ciphers are usually core components in information and internet security for data encryption , data signature , authentication and key management
分组密码是密码学的一个重要分支,它具有速度快、易于标准化和便于软硬件实现等特点,通常是信息与网络安全中实现数据加密、数字签名、认证及密钥管理的核心体制。
Similar Words:
"encryption system" Chinese translation, "encryption technique" Chinese translation, "encryption technology" Chinese translation, "encryption tv" Chinese translation, "encryption unit" Chinese translation, "encryption-based protection protocol" Chinese translation, "encryptionalgorithm" Chinese translation, "encsel" Chinese translation, "encsi" Chinese translation, "encsy" Chinese translation