计算机 网络 外文翻译 外文文献 英文文献 详解加密技术概念、加密方法以及应用.doc
《计算机 网络 外文翻译 外文文献 英文文献 详解加密技术概念、加密方法以及应用.doc》由会员分享,可在线阅读,更多相关《计算机 网络 外文翻译 外文文献 英文文献 详解加密技术概念、加密方法以及应用.doc(9页珍藏版)》请在三一办公上搜索。
1、 Along with the technical developing of the network,the network safety also becomes the focus in the focus of the network society nowadays,almost no one not at discuss the safe problem of the network,virus, a procedure,mail bomb,the long range interception etc.the all these let persons tremble with
2、fear scared.Virus,black guest of rampant make body for today the people of the networksociety feel talk that thenet colorchange,indecisive. But we are essential to know clearly,the safe problem of all these everything we cant find out the solution once and all,having plenty of besides basically cant
3、 find out the exhaustive solution, suchas the virus procedure,because any anti-virus procedure all only the ability then can develop out after mew virus detection,returning to have no currently which ability an anti-virus software develop the software that the company dares to promise them and can c
4、heck to kill all have already know ofand unknown virus ,so we cant have work safetyagain the mind that get to the Internet,because probably the network cant have so on first,for the elephantpikeandshields,the network and virus,black guests are a rightness of coexistence bodies forever. The computer
5、of the modern encrypt technique be adapted the network the demand of the safetybut should carrythe output, it carries on the general electronic commerce activity to provide the safety for us guarantee,such as carry on documents deliver in the network,the E-mail come-and-go and carryon the contractte
6、xt originally of sign etc.Encryptthe technique in factalso isnotwhatnew-bornthing,onlyapplied in nowadayselectroniccommerce,thecomputernetwork still thehistory ofthe lastfew years.Underneath wethe detailed introduction encryptthetechnique tostill have superficial knowledge offriend provide opportuni
7、ties ofdetailed understanding! One,thecause ofencrypt Encryptis a kind of methodthat usedto protect data, it exist fora long time,the history thatis producedisverylongago, it istooriginateandtracebackto in 2000B.C.(afewcentury),although it is not now we speak of encrypt the technique(even not call e
8、ncrypt),be a kind concept for encrypt,define bore as early as and several centuries ago.At that time theEgyptian usedthe special pictographto bethe information coding firstof,changing along with time,the Babylon,Mesopota-mia was second to start use some method with Greece civilizations all to protec
9、t their written forminformation. Encryptthetechniquetomainlybeapplied in themilitaryrealm in thenearfuture,suchasthe American independent war,American civil war and two world wars.The coding machine that behave to know most widely is the machine of German Enigma,the German makes use of in the worldw
10、arII it establishestoencrypttheinformation.Thus,becauseoftheeffortoftheAlanTuring and Ultra plan and others they carries on to breakthe solution to the Germans password finally.At the beginning, the research of the calculator be for breaking the password of the solve the German,the people did not th
11、ought of that the calculator give information revolution bring today.Along with the development of the calculator,which build up of the operation ability,past passwords allied become very simple ,hence the people studied constantly again the new data encrypts the way,if make use of the output and pr
12、ivate key and male keys of calculate way of ROSAs are outputon this foundation. Two,thereasonwhyweuseencrypt Nowadays the networksociety the choice to encrypt is already essential tous,one weknow is that going forward to communicate officially the piece to deliver in the Internet ,the E-mail busines
13、s come-and-go exist many in security factors,taking charge of to some archdukes especiallytodeliver withsomesecretdocumentsonthenetwork.Andthiskindofinsecurityis the Internet existence foundation-TCP/IP argument proper,include some according to TCP/IP of service;on the other hand ,the Internet broug
14、ht infinite business opportunities for numerous companys house,theInternet connectsthe whole world at together,headed forthe Internet tomean toheadfortheworld,this goodmatterthataretolongfor in smallbusinessenterprise.Forsolving this antinomies,for the sake of the ability is in the safety of foundat
15、ion up greatly open this door that lead tothe world ,wehad to choose thedata to encryptand according toencryptthe technique numeralsignature. Encrypt in the function on the network is to prevent from useful or the privatization information be intercept on the network and steal.A simple example is a
16、password to deliver,the calculator password is extremely important,many safe protection system is according to password of,thepasswordrevealoverallbreakupthatcomesuptospealtomeanitssafesystemin acertain meaning. Whilecarryingonregisterthoughtanetwork,thepasswordkey-inis deliver withtheformof the cle
17、ar statement server,but network ascend of eavesdrop is an extremely easy affair,so the customerofRoot orcustomeroftheAdministrators,thatresult will beextremely serious. Return the like fruit your company at carry on a certain invitation to bid items bid to work,thestaffmembergivesoutouttheinvitation
18、tobidunittothemarkbookoftheir unit in the wayofE-mail,ifhavethis time,knowingtheobjectthatyourcompanybidfrom it ,thatresultwill how,believe need notsaycleverness moreofyou arealsounderstand. Such example is really too many , the project that solves the above-mentioned hard to crack is to encrypt, en
19、crypt behind of mark book have no private key of consignee and also cant untie ,mark disorderly code that book become a lot of to have no actual meaning .In fine regardless is unit or personal come up to say in a certain meaning that ages that encrypt to also becomethenetworksociety tocarryonthedocu
20、mentorthemailSSLsnowadayssymbolize! Numerical signature be according to encrypt the technique ,its function be use whether certain customer is true or not .Apply is still an E-mail at most,such as be customerto receive an E-mail,mail top the mark has the addressees name and the mailbox addresses,the
21、 many people maythink in brief theaddresseris alatterupexplanatorythatperson,butforgeanE-mailactually for an usually person to say that is an extremely easy matter .In this kind of case,will use the numeral signature of the encrypt the technique foundation,use it the confirmation sends letter the re
22、liability ofthe Human body. The similar numeral signature is technical to still have an attestation of a kind of body technique ,some stations orderto provide into the station FTPand theWWW service,certainly this servicethatusuallyget in touchwithisananonymousservice,thepowerofthecustomerwantsto be
23、subjected to the restrict ,but this service that also have is not anonymous ,such as the some companyprovidethecustomertocooperatethenotanonymousFTPofcolleague forthesakeof the information exchanges service,or develop the group their web carries the customer up of server of WWW up,the problem of now
24、 be ,customer be the customer think of that person,an attestation ofbody thetechnique is a goodsolution. Need to be emphasize here that 1:00be,the document encrypt in fact no t used for E-mail or the document on the networks deliver only,also can apply the document protective of the static statein f
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 网络 外文翻译 外文文献 英文文献 详解加密技术概念、加密方法以及应用 外文 翻译 文献 英文 详解 加密 技术 概念 方法 以及 应用
链接地址:https://www.31ppt.com/p-2402098.html