1. A symmetriccryptography is a new cryptography. Digital signature is the most important application of asymmetric cryptography.
非对称加密技术是一种新的加密技术,数字签名是其最重要的应用。
来自互联网
2. Part 2 (chapters 4-7) introduces the basic techniques of modern cryptography, including symmetriccryptography (block ciphers, stream ciphers), Hash functions, public-key cryptography technology.
3. A symmetric algorithm requires that both the sender and receiver of the message use the same secret key; this is often referred to as secret key cryptography.
对称算法要求消息的发送方和接收方使用同一个秘钥;这通常被称作秘钥密码术。
来自互联网
4. Algorithm Type defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest.
算法类型定义加加密算法是对称的、非对称的还是消息摘要。
来自互联网
5. The two main competing cryptography schemes are known as the secret-key (symmetric) system and the public-key (asymmetric) system.
现有两种主要的、相互竞争着的密码术,被称作秘钥(即对称)系统和明钥(即不对称)系统。
来自互联网
6. Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
来自互联网
7. Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin.
8. As the basis and core of information security, cryptography also attracts more and more attention. Brute force attack on symmetric cipher algorithms is an important direction of cryptography.
9. The public key cryptography can just solve these problems, but it is much slower than the symmetric key cryptography.
而公钥密码算法正好可以解决这方面的问题,但在速度上远远不及对称密码算法。
来自互联网
10. In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.