请高手帮忙翻译成英文,勉强能读通就行老(软件翻译错误很多啊),谢谢老 20
Internet的快速发展使得资源共享广泛应用于政治、军事、经济、电子商务以及各个领域,大量数据在网络中存储和传输。这些数据在存储使用和传输的过程中,都有可能被中断、截获...
Internet的快速发展使得资源共享广泛应用于政治、军事、经济、电子商务以及各个领域,大量数据在网络中存储和传输。这些数据在存储使用和传输的过程中,都有可能被中断、截获、篡改和伪造。因此,在传输的过程中需要有网络安全来保护数据。
一个计算机网络安全管理者要为自己所管辖的网络建造起强大、安全的保护手段,可以通过以下六个安全层次完成:即修补和阻止网络漏洞,加密,认证,防火墙,安全协议和法律事务。数据加密技术是网络中最基本的安全技术,加密技术中一种重要的是公开密钥加密技术,其典型代表——RSA,RSA公钥密码体制的构建与安全防护,使得大量研究工作集中在寻找大素数与大数因式分解的方法上。
结合基础理论与工程应用,本文在分析安全RSA公钥密码体制对素数的要求和现有素数判定的有关算法及其所讨论的素性的的各个方面的基础上,主要介绍了加密算法的数学基础,从数学基础上分析了RSA算法的原理,讨论了RSA算法与素性测试,及RSA算法中的素数生成方法及素性检验等问题。 展开
一个计算机网络安全管理者要为自己所管辖的网络建造起强大、安全的保护手段,可以通过以下六个安全层次完成:即修补和阻止网络漏洞,加密,认证,防火墙,安全协议和法律事务。数据加密技术是网络中最基本的安全技术,加密技术中一种重要的是公开密钥加密技术,其典型代表——RSA,RSA公钥密码体制的构建与安全防护,使得大量研究工作集中在寻找大素数与大数因式分解的方法上。
结合基础理论与工程应用,本文在分析安全RSA公钥密码体制对素数的要求和现有素数判定的有关算法及其所讨论的素性的的各个方面的基础上,主要介绍了加密算法的数学基础,从数学基础上分析了RSA算法的原理,讨论了RSA算法与素性测试,及RSA算法中的素数生成方法及素性检验等问题。 展开
展开全部
The Internet fast development causes resources sharing widely to apply in politics, the military, the economy, electronic commerce as well as each domain, mass datas in network memory and transmission.These data use in the process in the memory which and transmits, all has the possibility to interrupt, the interception, tampers with and fabricates.Therefore, needs to have the network security in the transmission process to protect the data.
A computer network security superintendent must the network which has jurisdiction for oneself construct formidable, the safe protection method, may complete through following six security level: Namely patching and impediment network loophole, encryption, authentication, firewall, security agreement and legal affair.The data encryption technology is in the network the most basic safety work, in the encryption technology one kind of more importantly public key encryption technology, Its model represents - - the RSA, RSA public key password system construction and the safe protection, causes the massive research work to concentrate in seeks the big prime number and in the large number factorisation method.
The union basic theory and the project application, this article in the analysis security RSA public key password system in the natural disposition each aspect foundation which and discusses to the prime number request and the existing prime number determination related algorithm, mainly introduced the encryption algorithm mathematics foundation, has analyzed the RSA algorithm principle from mathematics foundation, discussed the RSA algorithm and the natural disposition test, and RSA questions and so on in algorithm prime number production method and natural disposition examination.
A computer network security superintendent must the network which has jurisdiction for oneself construct formidable, the safe protection method, may complete through following six security level: Namely patching and impediment network loophole, encryption, authentication, firewall, security agreement and legal affair.The data encryption technology is in the network the most basic safety work, in the encryption technology one kind of more importantly public key encryption technology, Its model represents - - the RSA, RSA public key password system construction and the safe protection, causes the massive research work to concentrate in seeks the big prime number and in the large number factorisation method.
The union basic theory and the project application, this article in the analysis security RSA public key password system in the natural disposition each aspect foundation which and discusses to the prime number request and the existing prime number determination related algorithm, mainly introduced the encryption algorithm mathematics foundation, has analyzed the RSA algorithm principle from mathematics foundation, discussed the RSA algorithm and the natural disposition test, and RSA questions and so on in algorithm prime number production method and natural disposition examination.
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询