used symmetric encryption for secret communication. It remains the mor terjemahan - used symmetric encryption for secret communication. It remains the mor Bahasa Indonesia Bagaimana mengatakan

used symmetric encryption for secre

used symmetric encryption for secret communication. It remains the more widely used
of the two types of encryption.
A symmetric encryption scheme has five ingredients ( Figure 2.1 ):
• Plaintext: This is the original message or data that is fed into the algorithm as
input.
• Encryption algorithm: The encryption algorithm performs various substitu tions
and transformations on the plaintext.
• Secret key: The secret key is also input to the encryption algorithm. The exact
substitutions and transformations performed by the algorithm depend on the
key.
• Ciphertext: This is the scrambled message produced as output. It depends on
the plaintext and the secret key. For a given message, two different keys will
produce two different ciphertexts.
• Decryption algorithm: This is essentially the encryption algorithm run in
reverse. It takes the ciphertext and the secret key and produces the original
plaintext.
There are two requirements for secure use of symmetric encryption:
1. We need a strong encryption algorithm. At a minimum, we would like the
algorithm to be such that an opponent who knows the algorithm and has
access to one or more ciphertexts would be unable to decipher the ciphertext
or figure out the key. This requirement is usually stated in a stronger form:
The opponent should be unable to decrypt ciphertext or discover the key even
if he or she is in possession of a number of ciphertexts together with the plaintext
that produced each ciphertext.
2. Sender and receiver must have obtained copies of the secret key in a secure
fashion and must keep the key secure. If someone can discover the key and
knows the algorithm, all communication using this key is readable.
There are two general approaches to attacking a symmetric encryption
scheme. The first attack is known as cryptanalysis. Cryptanalytic attacks rely on
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
digunakan simetris enkripsi untuk komunikasi rahasia. Tetap yang lebih luas digunakandari dua jenis enkripsi.Skema enkripsi simetris memiliki lima bahan (gambar 2.1):• Plaintext: ini adalah pesan atau data yang dimasukkan ke algoritma secara aslimasukan.• Algoritma enkripsi: algoritma enkripsi melakukan berbagai substitu tionsdan transformasi pada plaintext.• Kunci rahasia: kunci rahasia adalah juga input pada algoritma enkripsi. Persissubstitusi dan transformasi yang dilakukan oleh algoritma tergantung padakunci.• Ciphertext: ini adalah pekhabaran orak diproduksi sebagai output. Hal ini tergantung padaplaintext dan kunci rahasia. Untuk pesan tertentu, dua kunci yang berbeda akanmenghasilkan dua ciphertexts yang berbeda.• Dekripsi algoritma: ini adalah dasarnya algoritma enkripsi yang berjalan disebaliknya. Dibutuhkan ciphertext dan kunci rahasia dan menghasilkan asliplaintext.Ada dua persyaratan untuk aman menggunakan enkripsi simetris:1. kita memerlukan sebuah algoritma enkripsi yang kuat. Minimal, kami inginalgoritma harus seperti lawan yang tahu algoritma dan memilikiakses ke satu atau lebih ciphertexts tidak akan mampu memecahkan ciphertextatau mencari kunci. Persyaratan ini biasanya dinyatakan dalam bentuk yang lebih kuat:Lawan harus mampu mendekripsi ciphertext atau menemukan kunci bahkanJika ia atau dia memiliki sejumlah ciphertexts bersama-sama dengan plaintextyang dihasilkan tiap ciphertext.2. pengirim dan Penerima harus telah memperoleh salinan kunci rahasia secara amanfashion dan harus tetap kunci aman. Jika seseorang dapat menemukan kunci danalgoritma, yang tahu semua komunikasi menggunakan tombol ini mudah dibaca.Ada dua pendekatan umum untuk menyerang enkripsi simetrisskema. Serangan pertama dikenal sebagai kriptoanalisis. Serangan Cryptanalytic mengandalkan
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
used symmetric encryption for secret communication. It remains the more widely used
of the two types of encryption.
A symmetric encryption scheme has five ingredients ( Figure 2.1 ):
• Plaintext: This is the original message or data that is fed into the algorithm as
input.
• Encryption algorithm: The encryption algorithm performs various substitu tions
and transformations on the plaintext.
• Secret key: The secret key is also input to the encryption algorithm. The exact
substitutions and transformations performed by the algorithm depend on the
key.
• Ciphertext: This is the scrambled message produced as output. It depends on
the plaintext and the secret key. For a given message, two different keys will
produce two different ciphertexts.
• Decryption algorithm: This is essentially the encryption algorithm run in
reverse. It takes the ciphertext and the secret key and produces the original
plaintext.
There are two requirements for secure use of symmetric encryption:
1. We need a strong encryption algorithm. At a minimum, we would like the
algorithm to be such that an opponent who knows the algorithm and has
access to one or more ciphertexts would be unable to decipher the ciphertext
or figure out the key. This requirement is usually stated in a stronger form:
The opponent should be unable to decrypt ciphertext or discover the key even
if he or she is in possession of a number of ciphertexts together with the plaintext
that produced each ciphertext.
2. Sender and receiver must have obtained copies of the secret key in a secure
fashion and must keep the key secure. If someone can discover the key and
knows the algorithm, all communication using this key is readable.
There are two general approaches to attacking a symmetric encryption
scheme. The first attack is known as cryptanalysis. Cryptanalytic attacks rely on
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2025 I Love Translation. All reserved.

E-mail: