计算机类外文文献翻译---java核心技术内容摘要:
tion, you saw how to pute a message digest, a fingerprint for the original message. If the message is altered, then the fingerprint of the altered message will not match the fingerprint of the original. If the message and its fingerprint are delivered separately, then the recipient can check whether the message has been tampered with. However, if both the message and the fingerprint were intercepted, it is an easy matter to modify the message and then repute the fingerprint. After all, the message digest algorithms are publicly known, and they don39。 t require secret keys. In that case, the recipient of the fed message and the reputed fingerprint would never know that the message has been altered. Digital signatures solve this problem. To help you understand how digital signatures work, we explain a few concepts from the field called public key cryptography. Public key cryptography is based on the notion of a public key and private key. The idea is that you tell everyone in the world your public key. However, only you hold the private key, and it is important that you safeguard it and don39。 t release it to anyone else. The keys are matched by mathematical relationships, but the exact nature of these relationships is not important for us. (If you are interested, you can look it up in The Handbook of Applied Cryptography at The keys are quite long and plex. For example, here is a matching pair of public and 山东建筑大学毕业论文 外文文献 及译文 5 private Digital Signature Algorithm (DSA) keys. Public key: Code View: p: fca682ce8e12caba26efccf7110e526db078b05edecbcd1eb4a208f3ae1617ae01f35b91a47e6df63413c5e12ed0899bcd132acd50d99151bdc43ee737592e17 q: 962eddcc369cba8ebb260ee6b6a126d9346e38c5 g:678471b27a9cf44ee91a49c5147db1a9aaf244f05a434d6486931d2d14271b9e35030b71fd73da179069b32e2935630e1c2062354d0da20a6c416e50be794ca4 y: c0b6e67b4ac098eb1a32c5f8c4c1f0e7e6fb9d832532e27d0bdab9ca2d2a8123ce5a8018b8161a760480fadd040b927281ddb22cb9bc4df596d7de4d1b977d50 Private key: Code View: p: fca682ce8e12caba26efccf7110e526db078b05edecbcd1eb4a208f3ae1617ae01f35b91a47e6df63413c5e12ed0899bcd132acd50d99151bdc43ee737592e17 q: 962eddcc369cba8ebb260ee6b6a126d9346e38c5 g: 678471b27a9cf44ee91a49c5147db1a9aaf244f05a434d6486931d2d14271b9e35030b71fd73da179069b32e2935630e1c2062354d0da20a6c416e50be794ca4 x: 146c09f881656cc6c51f27ea6c3a91b85ed1d70a It is believed to be practically impossible to pute one key from the other. That is, even though everyone knows your public key, they can39。 t pute your private key in your lifetime, no matter how many puting resources they have available. It might seem difficult to believe that nobody can pute the private key from the public keys, but nobody has ever found an algorithm to do this for the encryption algorithms that are in mon use today. If the keys are sufficiently long, brute force—simply trying all possible keys—would require more puters than can be built from all the atoms in the solar system, crunching away for thousands of years. Of course, it is possible that someone could e up with 山东建筑大学毕业论文 外文文献 及译文 6 algorithms for puting keys that are much more clever than brute force. For example, the RSA algorithm (the encryption algorithm invented by Rivest, Shamir, and Adleman) depends on the difficulty of factoring large numbers. For the last 20 years, many of the best mathematicians have tried to e up with good factoring algorithms, but so far with no success. For that reason, most cryptographers believe that keys with a modulus of 2,000 bits or more are currently pletely safe from any attack. DSA is believed to be similarly secure. Figure 912 illustrates how the process works in practice. Suppose Alice wants to send Bob a message, and Bob wants to know this message came from Alice and not an impostor. Alice writes the message and then signs the message digest with her private key.。计算机类外文文献翻译---java核心技术
相关推荐
挥霍尽了。 在人生的岔路口徘徊,想搭上青春的最后一班列车。 回首平庸的过往动觉惭愧不堪。 大学四年的生活已 经过半,记忆中还是一无所留,生活更多的时候是一潭死水,每一天生活只是对前一天的不断的无止境的复制。 真的不想如此般度过剩下的二分之一的时光,想要些特别的经历,想让生命更厚重些,想让青春更绚丽些,最终我选择了顶岗实习。 同时,顶刚实习也圆了我儿时的梦想,当一名光荣的人民教师。
先飞,尚可领先。 但是,人生之路不一定都是顺境与成功,也有逆境和失败。 我们要有良好的心态,把所 有经历当作人生财富,知难而进。 第四、善于合作、乐于奉献 我们对待繁重、高难度的新工作,要谦虚谨慎,戒骄戒躁,主动向老同志求教,虚心听取别人意见。 工作中,要有宽广的胸怀,要有容人、容言、容事之大气量。 现在这个浮躁的社会,大家都带着有色眼镜看待公务员。 而我们作为新进公务员,不必理会外人的眼光
机上运行,输入服务器主机的 IP,连接到服务器,客户端与客户端之间即可实现简易的聊天功能,在服务器可以显示在线人数以及客户端的 IP地址。 4 基于 TCP 协议聊天软件的制作过程 一 、 客户端工作原理 在运行服务器之后,运行客户端。 客户端首先向服务器提出建立连接请求,然后建立一个套接字描述符,通过该描述符调用数据传输函数即可与服务端进行数据的收发。 用户登录成功后,向服务器发送登陆消息
别和认证 (GINA):运行在 Winlogon 进程里的一个用户模式dll, Winlogon 使用 GINA 获取用户名和密 码,以及智能卡 PIN 等。 ( 8) 网络登录服务 (Netlogon):一个 Windows 服务,负责创建到域控制器的安区通道。 ( 9) 内核安全设备驱动器 (KSecDD):本地过程调用接口的内核模式方法库,其他组件 (如: EFS)用来和 Lsass
设计是非常有帮助的,理论知识丰富了我们的大脑,为我们的设计带来灵感,并且培养我们综合的知识构成与发散性思维,这一点是非常重要的。 而对一些材料及施工工艺、工程预算等了解的太少,这与我们接触的实际工程少,经验不足有关,而这些也是装饰工作中非常重要的因素。 这是我第一次正式与社会接轨踏上工作岗位,开始与以往完全不一样的生活。 每天7 点不到就得起床去挤公交车,就算再寒冷再差的天气,都得去上班
簧、钢支架、厚木板、中密度纤维板、饰面材料。 七、踢脚板的装饰构造 踢脚板是楼地面与墙面交接处的构造做法。 (一)作用 遮盖接缝; 增加美观; 保护墙根。 (二)分类 按材料和施工方式分:( 1)粉刷类踢脚板( 2)铺贴类踢脚板( 3)木踢脚板 ( 4)塑料踢脚板 按构造形式分:( 1)与墙面相平 ( 2)突出墙面 ( 3)凹进墙面 21 《 建筑装饰材料与构造 》教案 (首页) 授课时间 9