《科技英语文献阅读与翻译》Unit 1-TextB
合集下载
相关主题
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
When hashing a message, the message is converted into a short bit string--a hash value-and it is impossible to re-establish the original message from the hash value.
As the Internet and other forms of electronic communication become more prevalent, electronic security is also becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data.
The public key can be certified using an electronic certificate issued and signed by a certification authority.
private key
It is the key for use with asymmetric encryption that is accessible to the key holder only. Asymmetric encryption uses different keys for encryption and decryption. Each participant is assigned a pair of keys, consisting of an encryption key and a corresponding decryption key.
Theoretically, digital cash could be spent in very small increments, such as tenths of a cent (U.S.) or less. Most merchants accept digital cash so far, however, they also use it as an alternative to other forms of payment for somewhat higher price purchases.
A hash value is unique in the sense that two messages cannot result in the same bit string, and any attempt to make changes to the message will negate the value and thus the signature.
A private key is used for generating digital signatures and for decrypting data.
hash function and hash value
Hash Function is an algorithm that transforms a string of characters into a usually shorter value of a fixed length or a key that represents the original value. This is called the hash value.
public key
It is the key for use with public key encryption methods that is publicly made available. It is published by the key holder or the issuing certification authority. The certification authority’s directory server can distribute it by disk, web download or e-mail.
Unit One
Text B
Digital Signature in Applied Cryptography
Background Information
cryptography
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication.
digital cash
Digital cash is a digitally signed payment message that serves as a medium of exchange. Digital cash is a system of purchasing cash credits in relatively small amounts, storing the credits in your computer, and then spending them when making electronic purchases over the Internet.
Hash functions are employed in symmetric and asymmetric encryption systems and are used to calculate a fingerprint/imprint of a message on and hash value
As the Internet and other forms of electronic communication become more prevalent, electronic security is also becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data.
The public key can be certified using an electronic certificate issued and signed by a certification authority.
private key
It is the key for use with asymmetric encryption that is accessible to the key holder only. Asymmetric encryption uses different keys for encryption and decryption. Each participant is assigned a pair of keys, consisting of an encryption key and a corresponding decryption key.
Theoretically, digital cash could be spent in very small increments, such as tenths of a cent (U.S.) or less. Most merchants accept digital cash so far, however, they also use it as an alternative to other forms of payment for somewhat higher price purchases.
A hash value is unique in the sense that two messages cannot result in the same bit string, and any attempt to make changes to the message will negate the value and thus the signature.
A private key is used for generating digital signatures and for decrypting data.
hash function and hash value
Hash Function is an algorithm that transforms a string of characters into a usually shorter value of a fixed length or a key that represents the original value. This is called the hash value.
public key
It is the key for use with public key encryption methods that is publicly made available. It is published by the key holder or the issuing certification authority. The certification authority’s directory server can distribute it by disk, web download or e-mail.
Unit One
Text B
Digital Signature in Applied Cryptography
Background Information
cryptography
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication.
digital cash
Digital cash is a digitally signed payment message that serves as a medium of exchange. Digital cash is a system of purchasing cash credits in relatively small amounts, storing the credits in your computer, and then spending them when making electronic purchases over the Internet.
Hash functions are employed in symmetric and asymmetric encryption systems and are used to calculate a fingerprint/imprint of a message on and hash value