快好知 kuaihz


data encryption造句
1. Preventive measures include data encryption using various cryptographic methods. 2. Data encryption ensures the privacy and confidentiality of email messages. 3. DES algorithm is a data encryption algorithm. 4. Propose a synthetical method of data encryption. 5. VPN consists of three parts: the tunnel, the data encryption technology and user authentication. 6. Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output. 7. There are specific cases where It'sense to use data encryption. 8. What is itsrelationship with the existed Data Encryption Standard ( DES )? 9. Debit card bundled safe password, data encryption transmission prevention track card being copied. 10. Cryptographic transform libraries in OpenBSD include Blowfish, Data Encryption Standard (DES), 3DES, and Cast. 11. Represents the base class for the Data Encryption Standard (DES) algorithm from which all DES implementations must derive. 12. The data encryption transmission technology realized by hardware chip was adopted to realize hardware encryption, which was authenticated by the national cryptogram management committee. 13. The data encryption and digital signature based on encryption technique can overcome factors mentioned above. 14. DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits. 15. DES(Data Encryption Standard) encryption arithmetic has stood the long test from when it became the encryption standard to now. 16. For the J2ME-based Kerberos client, I'll only support one encryption algorithm, which is DES (data encryption standard) in CBC (cipher block chaining) mode. 17. The Clinton administration last week made a new offer to the computer industry on the issue of data encryption. 18. This project adds the module of real - time data encryption on existing security protection system. 19. It uses public-key encryption algorithms for authentication and private-key for data encryption. This solution can provide reliable system security and avoid the deny of service of users. 20. DPU BES benchmark with hardware supported acceleration to deliver blazing data encryption performance. 21. Another popular secret - key cryptosystem is the International Data Encryption Algorithm ( IDEA ). 22. Finally, the parallel interface in EPP mode is designed and the whole data encryption system designing between FPGA and PC is given to carry out the verification of data encryption results. 23. This paper first researches the principle of encryption - decryption and the basic algorithm - Data Encryption Standard ( DES ). 24. One of the strongest encryption algorithms used by remote access authentication products is the widely tested and implemented industry-standard Data Encryption Standard (DES). 25. RSA is the most influential public-key encryption algorithm, it can resist all known password attack so far[/data encryption.html], has been recommended for ISO public key data encryption standard. 26. A private key encryption-decryption algorithm that uses a key that is twice the length of a Data Encryption Standard (DES) key. 27. Defines a wrapper object to access the cryptographic service provider (CSP) version of the Data Encryption Standard (DES) algorithm. 28. Demonstrates how to encrypt and decrypt strings using the Data Encryption Standard algorithm. 29. In some detail, the paper expounds the principle about simple power analysis(SPA) attacks against the general cryptography and a particular theory against data encryption standard (DES) algorithm. 30. In this paper, the safeness of data bank system, distributed bata bank and statistical data bank is studied. And the data encryption is also studied.