英语人>网络例句>密码分析的 相关的搜索结果
网络例句

密码分析的

与 密码分析的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Chapter 4 presents five design criteria of S-boxes of block ciphers, develops a method of constructing large S-box by use of algebraic group operation, proves the balance property of these large S-box, tests the strict avalanche and independence of avalanche variables properties of S-boxes in NEA cipher, analyses the nonlinearity and best linear approximation of the S-box, and finally defines the differential of input/output of S-boxes of this cipher and analyses the distribution of them.

第二部分即第三章,提出了一种新的分组密码类NEA(NEA-4A,NEA-8A,NEA-4B,NEA-8B),完整地描述了该密码类的加解密过程和密钥协议;证明了NEA-4B和NEA-8B的完全对合性和没有不动点的性质;分析了该密码类的安全特征;具体地介绍了实现该类密码的途径;给出了NEA-4A的计算机C语言程序和样本数据。

As a variant of differential cryptanalysis, impossible differential cryptanalysis is a simple and effective technique, and it is also one of the most frequently used cryptanalytic methods.

不可能差分分析作为差分分析的一种变体,是一种简单有效的密码分析方法,也是目前最常用的密码分析方法之一。

Based on these, we construct a class of nonlinear sequence generators, show that they have better cryptographical properties, and furthermore they can resist on the attack of cipher by cryptology analysis So they can be used as key sequence generators..

在此基础上自主设计了一类非线性序列生成器,证明了其具有良好的密码学性质,并且通过密码分析,表明它能抵抗现有的几种密码攻击,因此这类非线性序列适于做密钥流生成器。

For evaluating the security of cryptographic device in the risk environment full of electromagnetic analysis adversaries,by enhancing the adversary's ability in the classical cryptographic black box model, two novel adversaries,the key recover adversary and the indistinguishability determined adversary who takes the advantage of electromagnetic emissions,were defined within the framework of physical observable cryptography model.

为在充斥电磁分析旁路攻击敌手的危险环境下评估密码设备的安全性,通过将密码学标准黑盒模型中的敌手能力进行加强,在物理可观测密码术模型的框架内,定义了具有电磁泄漏信息分析能力的密钥恢复敌手与不可分辫性判定敌手。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

Analyzed some correlation problem of using elliptic curve construct cryptosystem.Make the correlation counterchange on the elliptic curve that suitable for constructing the cryptosystem and the op eration on it. Analyzed and researched discrete logarithm problems of elliptic c urve suitable for cryptosystem.

文中分析研究了利用有限域上的椭圆曲线构建密码体制的相关问题,对于适于建立密码体制的一类椭圆曲线进行了相应的仿射代换和其运算的映射变换,对椭圆曲线构建密码体制的椭圆离散对数问题进行了分析研究。

In this paper, the author first introduces some basic conception of Cipher technology and Shannon model of secret communication, then the paper discusses and analyses the advantages and problems of symmetric algorithm and dissymmetrical encryption.

在介绍密码学基本概念以及Shannon保密通信模型的基础上,分析了对称密码算法和公钥密码算法的优点及其在应用中注意的问题,最后对密码算法的发展及其应用的未来做出展望。

The average percent value of G C (49.3%) was less than that of A T (50.7%), there was a bias of the content of G, T in the third codon; The number of transition G-A and T-C were 22, 15 respectively, which were higher than that of transition A-G and C-T, the number of tranversion C-A, T-G is 2 respectively, and other tranversion patterns didnt occur; the probability of transition was higher than that of tranversion , Ts/Tv = 9.5-19, there was the highest number of transition in the third codon. The gamma parameter a of the lst,nd and 3rd codon positions were 0.00572,0.01237 and 1.05239 respectively, they showed that there was adifferent substitution rate at different codon position. Frequences of synonymous codon usage were relatively biased. The average rates of synonymous and nonsynonymous substitution were 0.0787, 0.0011 respectively, there was a significant difference between dS and dN (Z = 4.713, p.01), and the low ratio( CD = 0.0284 .3) of dN/dS ratio impled that there were selective constraints against the nonsynonymous sites in cyt-b gene, The distribution of nonsynonymous codon substitution pattern related to Grantharm distance indicated that the purified selection at 2nd codon positions was more intensive than that at 1st codon positions. The phylogenetic trees supported the view of the double origin of Chinese goose, which means that domestic Chinese goose was derived from Anser cygnoides and domestic European goose, and Yili was derived from Anser anser.

碱基含量分析可知,序列的G C含量(49.3%)<A T含量(50.7%),密码子第三位点的G、T含量都有较强的偏倚性;序列间G→A和T→C的转换数(22次和15次)高于A→G和C→T的转换数(10次和9次),C→A、T→G颠换数均为2次,其余颠换模式均未发生;转换数明显高于颠换数,Ts/Tv=9.5~19,密码子第三位点的转换数最高,呈现了相当强烈的转换偏倚性;密码子第一、二和三位点的gamma分布参数α值分别为0.00572、0.01237和1.05239,表明密码子第一位点的替换速率变异最大,第二位点次之,第三位点的替换速率变异相对较小;编码同一氨基酸的同义密码子并非随机使用,表现出一定程度的使用偏倚性;同义替换速率和非同义替换速率分别为0.0787和0.0011,dS与dN值间的差异极显著(Z=4.713,p<0.01),而ω=0.0284,明显小于0.3,表明雁属鹅细胞色素b基因序列经历了中度净化选择作用;单步非同义替换(Sing-step nonsymonymous codon substitution,SSNCS)分布模式与Grantharm距离之间的关系说明密码子的三个位点所受的净化选择强度不同;构建的最大简约树与邻接树拓扑结构一致,支持中国家鹅的双起源学说,即除伊犁鹅外的其它中国鹅品种起源于鸿雁,伊犁鹅和欧洲的郎德鹅、莱茵鹅起源于灰雁。

Some initial cryptanalysis and detailed statistical tests of SCF are given, the results show that SCF can resist some known cryptanalytic attacks and has excellent statistical properties.

并且对SCF作了一些初步的密码分析和详细的统计测试,结果表明:SCF密码足够抵抗一些已知的密码分析、具有很好的统计性能。

第2/15页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

What are your goals and strategies for growth?

你的成长目标和策略是什么?

And unto the angel of the church in Sardis write; These things saith he that hath the seven irits of God, and the seven star I know thy works, that thou hast a name that thou livest, and art dead.

3:1 你要写信给撒狄教会的使者,说,那有神的七灵和七星的,说,我知道你的行为,按名你是活的,其实是死的。

"It is a testament to making sure unemployment compensation is available, making sure we are looking out for people who have lost their jobs," she said.

"这是个实证,证明我们必须确保人们都可以得到失业补偿,确保那些失去工作的人们得到照顾。"