| ²é¿´: 1823 | »Ø¸´: 2 | |||
| µ±Ç°Ö÷ÌâÒѾ´æµµ¡£ | |||
С¹·ÈÙÓþ°æÖ÷ (ÖªÃû×÷¼Ò)
ÎÒÊÇÑýÈË£¬ÎÒÅÂÈËÑý
|
[½»Á÷]
ÃÜÂëѧÊõÓï´Ê»ã±í
|
||
|
´ó¼ÒÁ˽âһϡ£ AES Ö¼ÔÚÌæ´ú DES µÄ¸ß¼¶¼ÓÃܱê×¼£¨Advanced Encryption Standard£©¡£ÓÉ NIST ×éÖ¯µÄ¾ºÈü»ñʤÕßÊÇ Rijndael¡£ Ëã·¨£¨Algorithm£© Ö´ÐÐÒ»ÏîÈÎÎñ£¨ÀýÈ磬¼ÓÃÜ»ò½âÃÜ£©µÄ¹æÔòÄ£ÐÍ¡£ ·Ç¶Ô³ÆÃÜÂëÊõ£¨Asymmetric cryptography£© ×î½ü¿ª·¢µÄÒ»ÖÖÃÜÂëÊõÐÎʽ£¬Ëü°üº¬Á½¸öÔÚÊýѧÉϹØÁªµÄÃÜÔ¿£¬Ò»¸öÓÃÓÚ¼ÓÃÜÃ÷ÎÄ£¬È»ºóÖ»ÄÜÓÃÁíÒ»¸öÏàÓ¦ÃÜÔ¿½øÐнâÃÜ£»ËüÒ²³ÆÎª¹«Ô¿ÃÜÂëÊõ¡£ ÈÏÖ¤£¨Authentication£© ÑéÖ¤Éí·ÝºÍÊÚȨµÈµÄ¹ý³Ì£¬´Ó¶ø¿ÉÒÔÐÅÈÎijЩ¶ÔÏó¡£ ÉúÎï²âÁ¿Ñ§£¨Biometrics£© ʹÓÃΨһÉíÌåÌØÕ÷À´½¨Á¢Éí·ÝµÄÒ»ÃÅѧ¿Æ¡£ ÉúÈÕ¹¥»÷£¨Birthday attack£© ÒÔ 23 ¸öÈËΪһ×éµÄÈËÖÐÓÐÁ½¸ö»òÁ½¸öÒÔÉϵÄÈËÔÚͬһÌìÉúÈյĸÅÂÊ´óÓÚ 1/2 ÕâÒ»ÊÂʵÃüÃûµÄÒ»ÖÖÌØÊâÐÎʽµÄÂùÁ¦¹¥»÷¡£ äǩÃû·½°¸£¨Blind signature scheme£© Ò»ÖÖÔÊÐíÇ©ÃûÕßÔÚ²»ÖªµÀÎĵµÄÚÈݵÄÇé¿ö϶ÔÎĵµ½øÐÐÊý×ÖÇ©ÃûµÄ·½·¨¡£¶¨³¤µÄ¿é A λÐòÁС£ ·Ö×éÃÜÂ루Block cipher£© ½«Ã÷ÎķֳɿéÈ»ºóÒÀ´Î¼ÓÃÜËüÃǵÄÒ»ÖÖ¶Ô³ÆÃÜÂë¡£ ÂùÁ¦¹¥»÷£¨Brute force attack£© ³¢ÊÔÿ¸ö¿ÉÄܵÄÖµÖ±µ½ÕÒµ½Æ¥ÅäֵΪֹµÄ¹ý³Ì£¨ÓÖ³ÆÎªÇî¾ÙËÑË÷£©¡£ CBC ÃÜÂë·Ö×éÁ´½Ó£¨Cipher Block Chaining£©£»ÔÚ¼ÓÃÜÃ÷ÎÄ¿éǰ½«ËüÓëÒÔǰµÄÃÜÎÄ¿é½øÐÐ XOR ÔËËãµÄ¹ý³Ì¡£ ÈÏÖ¤ÖÐÐÄ£¨Certifying authority (CA)£© ´´½¨Êý×ÖÖ¤ÊéµÄ×éÖ¯»ò¸öÈË£»Ò²³ÆÎªÖ¤ÊéÖÐÐÄ£¨certificate authority£©¡£ CFM ÃÜÂë·´À¡·½Ê½£¨Cipher Feedback Mode£©£¬×÷Ϊ×Ôͬ²½ÐòÁÐÃÜÂëʵÏÖµÄÒ»ÖÖ·Ö×éÃÜÂ뷽ʽ¡£ ÃÜÂ루Cipher£© Ò»ÖÖ¼ÓÃÜ-½âÃÜËã·¨¡£ ÃÜÎÄ£¨Cipher text£© ÒѼÓÃܵÄÊý¾Ý¡£ Ã÷ÎÄ£¨Clear text£© Çë²ÎÔÄÃ÷ÎÄ£¨plain text£©¡£ ³åÍ»£¨Collision£© Á½¸ö²»Í¬Îı¾´ÓͬһËã·¨Öзµ»ØÏàͬɢÁÐÖµµÄÇé¿ö¡£ Òþ±ÎͨµÀ£¨Covert channel£© ÒÑÒþ²Ø»òÕß¿´ÉÏȥûÓÐÓÃÀ´´«ËÍÊý¾ÝµÄͨÐŽéÖÊ¡£ ÆÆ½âÕߣ¨Cracker£© ÊÔÍ¼ÆÆ»µ¼ÆËã»ú°²È«´ëÊ©£¨°üÀ¨ÃÜÂëÊõ£©µÄÈË»ò¼ÆËã»ú³ÌÐò¡£ CRL Ö¤Êé³·ÏúÁÐ±í£¨Certificate Revocation List£©£»Òѱ»³·Ïû´Ó¶ø²»ÔÙÓÐЧµÄÖ¤ÊéÁÐ±í¡£ ÃÜÂë·ÖÎö£¨Cryptanalysis£© ͨ¹ý·ÖÎö»òÆäËü·½·¨ÊÔÍ¼ÆÆ½âÃÜÂëµÄ¹ý³Ì¡£ ÃÜÂëϵͳ£¨Cryptosystem£© ÃÜÂëÒÔ¼°ËùÓпÉÄܵÄÃ÷ÎÄ¡¢ÃÜÎĺÍÃÜÔ¿¡£ ×ֵ乥»÷£¨Dictionary attack£© ÂùÁ¦¹¥»÷µÄÒ»ÖÖÐÎʽ£¬¿ÉÄܸù¾Ý¸ÅÂÊÓÐÑ¡ÔñµØÐÞÕý£¬°´Ë³Ðò¶Ô×Ö»ò¶ÌÓï½øÐг¢ÊÔ¡£ Êý×ÖÖ¤Ê飨Digital certificate£© ÓÉ¿ÉÐŵĹ«Ô¿ÈÏÖ¤µÄµç×ÓÎĵµ£¬ËüÈ·±£Ö¸¶¨µÄ¹«Ô¿Óë±êʶµÄ¸öÈË»ò×éÖ¯ÕýÈ·¹ØÁª²¢Î´±»Ð¹Â¶£»Í¨³£¼ò³ÆÎª¡°Ö¤Ê顱¡£ Êý¾Ý¼ÓÃܱê×¼£¨DES£©£¨Data Encryption Standard (DES)£©ÓÉ IBM ¿ª·¢µÄÊý¾Ý¼ÓÃÜËã·¨£¨Data Encryption Algorithm£©µÄÕýʽÃèÊö£¬1977 ÄêÃÀ¹ú²ÉÓÃËü×÷ΪÕýʽµÄ±ê×¼¡£ ½âÃÜ£¨Decryption£© ½«ÃÜÎÄת»»³ÉÃ÷ÎĵĹý³Ì¡£ Diffie-Hellman 1976 Ä깫²¼µÄ°´´´Ê¼È˵ÄÃû×ÖÃüÃûµÄµÚÒ»¸ö¹«Ô¿Ëã·¨¡£ Êý×ÖÏÖ½ð£¨Digital cash£© ÏÖ½ðµÄµç×Ó±íʾ£¬Í¨³£ÒÔÄܹ»ÄäÃûʹÓõġ°±Ò¡±µÄ»ìºÏÖµ±íʾ¡£ Êý×ÖÐŷ⣨Digital envelope£© Ò»ÖÖ»úÖÆ£¬½«ÃÜÎﰯ乨ÁªµÄ»á»°ÃÜÔ¿ÒÔÊÜÁíÒ»¸öÃÜÔ¿£¨Í¨³£ÊÇ˽Կ£¬µ«²¢²»Ò»¶¨Èç´Ë£©±£»¤µÄ¼ÓÃÜÐÎʽ·â×°¡£ Êý×ÖÇ©Ãû£¨Digital signature£© ÒÔÊýѧ·½·¨½«ÎĵµÓëÌØ¶¨Ë½Ô¿Ïà¹ØÁªµÄ¹ý³Ì£»×¢£ºÕâÓëÌØ¶¨¸öÈËÁ´½Óµ½Ò»¸öÎĵµÒò´Ë¾ÍÇ©ÊðµÄ·½Ê½ÊDz»Í¬µÄ¡£ Êý×Öʱ¼ä´Á¼Ç£¨Digital timestamp£© ÒÔÊýѧ·½·¨½«ÎĵµÓëÌØ¶¨ÈÕÆÚºÍʱ¼äÏà¹ØÁªµÄ¹ý³Ì¡£ µç×Ó»õ±Ò Çë²ÎÔĵç×ÓÏֽ𡣠¼ÓÃÜ£¨Encryption£© ½«Ã÷ÎÄת»»³ÉÃÜÎĵĹý³Ì¡£ ƽ¾ùÐÅÏ¢Á¿£¨Entropy£© ÔÚÊýѧÖУ¬²»È·¶¨»òËæ»úÊýÁ¿µÄ¶ÈÁ¿¡£ Çî¾ÙËÑË÷£¨Exhaustive search£© Çë²ÎÔÄÂùÁ¦¹¥»÷£¨brute force attack£©¡£ Òò×Ó£¨Factor£© ³ý¾¡ÕûÊýµÄÈκÎÊý£»ÀýÈ磬15 µÄÒò×ÓÊÇ 5 ºÍ 3¡£ Òòʽ·Ö½â£¨Factoring£© ÕâÀïÖ¸½«ÓÉÁ½¸öÖÊÊý×é³ÉµÄ´óÕûÊý·Ö½â³ÉÄÇÁ½¸öÖÊÊýµÄ¹ý³Ì¡£ ºÚ¿Í£¨Hacker£© ͨ³£ÄÜÊìÁ·±àдºÍÐÞ¸ÄÈí¼þ£¨ÌرðÔÚÉñÃØÁìÓò£©ÇÒ¾ÑéÏ൱·á¸»µÄÈË£»³£´íÎ󵨽«ËüÓÃ×÷ÆÆ½âÕßµÄͬÒå´Ê£¨Çë²ÎÔÄÇ°ÃæµÄÃèÊö£©¡£ É¢Áк¯Êý£¨Hash function£© Éè¼Æ³É´Ó¿É±äºÍÈÎÒⳤ¶ÈµÄÎı¾ÊäÈëÖиø³ö¶¨³¤Êä³ö£¨Í¨³£ÔÚÃÜÂëÊõÖÐΪ 128 »ò 160 룩µÄº¯Êý¡£ |
» ²ÂÄãϲ»¶
̸̸Á½ÌìÒ»Ò¹µÄ¡°ÑÓ°²ÐС±
ÒѾÓÐ15È˻ظ´
ESTͶ¸å״̬ÎÊÌâ
ÒѾÓÐ6È˻ظ´
Ö°³ÆÆÀÉóû¹ý£¬Çó°²Î¿
ÒѾÓÐ15È˻ظ´
À¬»øÆÆ¶þ±¾Ö°³ÆÆÀÉó±ê×¼
ÒѾÓÐ11È˻ظ´
Ͷ¸åElsevierµÄNeoplasiaÔÓÖ¾£¬µ½×îºóÑ¡publishing optionsÊ±Ò³Ãæ¿Õ°×£¬²»ÄÜÍê³ÉͶ¸å
ÒѾÓÐ16È˻ظ´
±ÏÒµºóµ±¸¨µ¼Ô±ÁË£¬ÌìÌì¸÷ÖÖѧÉú³¬·³
ÒѾÓÐ4È˻ظ´
ƸU VÈÈÈÛ½ºÑо¿ÈËÔ±
ÒѾÓÐ10È˻ظ´
ÇóÖúÎÄÏ×
ÒѾÓÐ3È˻ظ´
Ͷ¸å·µÐÞºóÊÕµ½ÕâÑùµÄ»Ø¸´£¬»¹ÓÐÏ£ÍûÂð
ÒѾÓÐ8È˻ظ´
ÈýÎÞ²úÆ·»¹Óлú»áÂð
ÒѾÓÐ6È˻ظ´

С¹·
ÈÙÓþ°æÖ÷ (ÖªÃû×÷¼Ò)
ÎÒÊÇÑýÈË£¬ÎÒÅÂÈËÑý
- Ó¦Öú: 0 (Ó×¶ùÔ°)
- ¹ó±ö: 1.8
- ½ð±Ò: 2394.6
- ºì»¨: 5
- Ìû×Ó: 5815
- ÔÚÏß: 9.5Сʱ
- ³æºÅ: 152837
- ×¢²á: 2006-01-02
- ÐÔ±ð: GG
- רҵ: ¿ÉÔÙÉúÓëÌæ´úÄÜÔ´ÀûÓÃÖеÄ













»Ø¸´´ËÂ¥