| ²é¿´: 582 | »Ø¸´: 2 | |||
| ±¾Ìû²úÉú 1 ¸ö ·ÒëEPI £¬µã»÷ÕâÀï½øÐв鿴 | |||
Moseddxiongľ³æ (СÓÐÃûÆø)
|
[ÇóÖú]
´óÅ£ÃÇ£¬Äܲ»Äܰïæ·ÒëÒ»¸ö¾ä×Ó
|
||
|
·Òë³ÉÓ¢ÎÄ£¬ÎÒ¾õµÃÒ»°ãµÄÓ¢ÎÄÊé¼®ÖÐÓ¦¸ÃÓе쬽á¹û»¹Ã»ÕÒµ½ ¾ä×ÓÈçÏ£º µ±ÃÜÎÄÐÅÏ¢Äܹ»³ÐÊܵÄÃÜÂë·ÖÎö¹¥»÷Ç¿¶ÈÓëÃÜÎĵļÛÖµ³É±¾ÏàÆ¥Åäʱ£¬ÃÜÎÄÊǰ²È«µÄ£¬¼´µ±¹¥»÷ËùÐèµÄ¼ÆË㸴ÔÓ¶ÈÂú×ãÓû§£¨¸ù¾ÝÐÅÏ¢¼Ûֵȷ¶¨£©µÄÃÅÏÞÖµ¾ÍÊÓΪ°²È«µÄ£¬¼´Âú×ãÃÜÂëѧµÄ¿É¼ÆË㰲ȫÐÔÔÔò¡£ ¼±Çó.... |
» ²ÂÄãϲ»¶
Ò»Ö¾Ô¸»¦9£¬ÉúÎïѧ326Çóµ÷¼Á
ÒѾÓÐ6È˻ظ´
296Çóµ÷¼Á
ÒѾÓÐ12È˻ظ´
ÉúÎïѧµ÷¼Á
ÒѾÓÐ9È˻ظ´
0854Çóµ÷¼Á
ÒѾÓÐ6È˻ظ´
Çóµ÷¼ÁÍÆ¼ö
ÒѾÓÐ6È˻ظ´
²ÄÁÏ299ר˶Çóµ÷¼Á
ÒѾÓÐ17È˻ظ´
294Çóµ÷¼Á
ÒѾÓÐ4È˻ظ´
297£¬¹¤¿Æµ÷¼Á?ºÓÄÏũҵ´óѧ±¾¿Æ
ÒѾÓÐ11È˻ظ´
22ר˶Çóµ÷¼Á
ÒѾÓÐ11È˻ظ´
284Çóµ÷¼Á
ÒѾÓÐ20È˻ظ´

zpjanus
Òø³æ (СÓÐÃûÆø)
- Ó¦Öú: 0 (Ó×¶ùÔ°)
- ½ð±Ò: 170.5
- Ìû×Ó: 56
- ÔÚÏß: 24.6Сʱ
- ³æºÅ: 1790980
- ×¢²á: 2012-05-02
- ÐÔ±ð: MM
- רҵ: Óлú»¯¹¤
¡¾´ð°¸¡¿Ó¦Öú»ØÌû
¡ï ¡ï
sltmac: ½ð±Ò+2, »¶Ó³£À´±¾°æ½»Á÷ 2013-04-21 10:05:44
sltmac: ½ð±Ò+2, »¶Ó³£À´±¾°æ½»Á÷ 2013-04-21 10:05:44
| When the ciphertext information to withstand cryptanalysis attack strength match the cipher text value cost, the cipher text is safe, as against the required computational complexity meet user (according to the value of information to determine) threshold method is regarded as safe, which satisfy the cryptography computing security principles |

2Â¥2013-03-16 15:39:02
hookhans
Ìú¸Ëľ³æ (ÖøÃûдÊÖ)
Farmer
- ·ÒëEPI: 263
- Ó¦Öú: 186 (¸ßÖÐÉú)
- ¹ó±ö: 0.142
- ½ð±Ò: 7919
- É¢½ð: 576
- ºì»¨: 51
- Ìû×Ó: 2092
- ÔÚÏß: 401.5Сʱ
- ³æºÅ: 2260260
- ×¢²á: 2013-01-25
- רҵ: ´ß»¯»¯Ñ§
¡¾´ð°¸¡¿Ó¦Öú»ØÌû
¡ï ¡ï ¡ï
sltmac: ½ð±Ò+3, ·ÒëEPI+1 2013-04-21 10:06:16
sltmac: ½ð±Ò+3, ·ÒëEPI+1 2013-04-21 10:06:16
| The cipher text is safe when the cryptanalysis attack strength sustainable (bearable) by the ciphertext information matches with the cipher text value-cost, i.e., it is regarded as SAFE when the computational complexity required for an attack satisfies the threshold of the user's (determined by the information value) , which follows the computationable security principles (rules) of cryptography. |

3Â¥2013-03-16 16:58:49













»Ø¸´´ËÂ¥
10