1. This hidden information can be plain text, cipher text, or even images.
这些隐藏的信息可以使普通文本、密码文本或图像等。

来自互联网

2. The cipher text string is then passed to the getCipherDataDoc private method.
接着该密码文本字符串传递给getcipherdatadoc私有方法。

来自互联网

3. The concrete example of this scenario in Cipher Text is the record editor.
在这种情况下,在密文具体的例子是记录编辑器。

来自互联网

4. The objective of this article is to find a mechanism for breaking a cipher text.
本文的目的是寻求打破一密文的机制。

来自互联网

5. One byte of cipher text is generated for every byte of plain text contained in the message.
对包含在信息中的普通文本的每一个字节产生密码文本的一个字节。

来自互联网

6. Before we can encrypt, we need to know the size of the buffer required for the cipher text.
在我们可以加密,我们需要知道的密文所需的缓冲区大小。

来自互联网

7. When decrypting the maximum length of the cipher text is the length of the modulus in bytes.
当解密的密文的最大长度是在字节模长度。

来自互联网

8. You continue chaining blocks in this manner, one after the other, to produce a cipher text form of each of the blocks.
以这种方式继续一块接一块地生成每一个块的密文形式。

来自互联网

9. At the end, you concatenate all of the cipher text blocks to arrive at the cipher text form of the complete plain text data.
最后,串接所有密文块以得到全部纯文本数据的密文形式。

来自互联网

10. The plain text is filled into a larger cipher text space according to the position determined by the chaotic iteration.
提出一种基于混沌迭代的加密算法,这种加密算法根据混沌迭代确定的位置将明文填入一个较大的密文空间。

来自互联网

11. If you have duplicate blocks within your plain text stream, you will have duplicate blocks within your cipher text stream.
如果您的纯文本流中有重复块,则您的密码文本流中也会有重复块。

来自互联网

12. The ameliorated algorithm ensures the length of cipher text is equal to the length of plain text by patching it with dynamic cipher.
通过使用动态密码对明文的修补,使其密文长度与明文长度相等。

来自互联网

13. The key and the plain text are processed together according to the DES algorithm to produce the encrypted (cipher text) form of the plain text data.
根据des算法对密钥和纯文本统一处理以生成一个加密的(密文)形式的纯文本数据。

来自互联网

14. If unauthorized users know anything about the structure of a block of your plain text, they can use that information to decipher the known cipher text block and possibly recover your key.
如果未经授权的用户知道了您的纯文本块结构的任何信息,他们就可以利用该信息来解密已知的密码文本块,并有可能重新获得您的密钥。

来自互联网

15. Therefore, we can use this to build up a cipher text communication pipe for data transferring between clients and servers of database systems to preserve data confidentiality and integrity.
因而可以在客户端与服务器之间构建一条透明的安全通道,从而保证网络传输过程中数据的保密性和完整性。

来自互联网

16. Or it could be a cipher, in which text is converted into other text using some algorithm.
或者可以是密码的形式,通过某种算法将某种文本转换为其他文本。

来自互联网

17. The cipher byte array is then decrypted, and the decrypted byte array is returned as a text string.
接着对该密码字节数组解密,解密的字节数组作为文本字符串返回。

来自互联网

18. Key: Key is a means of converting a plain-text into cipher-text and vice versa.
密钥:密钥是一种在明文与密文之间相互转换的方式。

来自互联网

19. Ravi and his colleague Kevin Knight treat translation as a cryptographic problem, as if the foreign text were simply English written in an advanced cipher.
拉维和他的同事凯文·奈特把翻译当做加密问题,好像外国文字也是用英文书写,只不过使用了某种高级的加密方式。

来自互联网

20. The encryption algorithm in the scheme is semantically secure against adaptive chosen cipher-text attacks based on the DDH assumption.
此外,证明了方案中加密算法在DDH假设和适应性选择密文攻击下是安全的。

来自互联网

21. On the other hand assailants are attracted by multimedia information after encrypting , and its content is totally transparent once the cipher-text is decrypted.
另一方面多媒体信息经过加密后容易引起攻击者的好奇和注意,并有被破解的可能性,而且一旦加密文件经过破解后其内容就完全透明了。

来自互联网

22. A device for translating plain text into cipher.
一种将简单的文体译成密码的装置。

来自互联网

23. The analysis indicates that the encryption algorithm not only can effectively resist cipher-text-only attack but also chosen-plaintext attack.
分析表明,该文所设计的加密算法不但能抵抗唯密文攻击,而且能有效地抵抗选择明文攻击。

来自互联网

24. The analysis indicates that the encryption algorithm not only can effectively resist cipher-text-only attack but also chosen-plaintext attack.
分析表明,该文所设计的加密算法不但能抵抗唯密文攻击,而且能有效地抵抗选择明文攻击。

来自互联网