2.3 PUBLIC-KEY ENCRYPTIONOf equal importance to symmetric encryption i terjemahan - 2.3 PUBLIC-KEY ENCRYPTIONOf equal importance to symmetric encryption i Bahasa Indonesia Bagaimana mengatakan

2.3 PUBLIC-KEY ENCRYPTIONOf equal i

2.3 PUBLIC-KEY ENCRYPTION
Of equal importance to symmetric encryption is public-key encryption, which finds
use in message authentication and key distribution.
Public-Key Encryption Structure
Public-key encryption, first publicly proposed by Diffie and Hellman in 1976
[DIFF76], is the first truly revolutionary advance in encryption in literally thousands
of years. Public-key algorithms are based on mathematical functions rather than on
simple operations on bit patterns, such as are used in symmetric encryption algorithms.
More important, public-key cryptography is asymmetric, involving the use
of two separate keys, in contrast to symmetric encryption, which uses only one key.
The use of two keys has profound consequences in the areas of confidentiality, key
distribution, and authentication.
Before proceeding, we should first mention several common misconceptions
concerning public-key encryption. One is that public-key encryption is more secure
from cryptanalysis than symmetric encryption. In fact, the security of any encryption
scheme depends on (1) the length of the key and (2) the computational work involved
in breaking a cipher. There is nothing in principle about either symmetric or public-key
encryption that makes one superior to another from the point of view of resisting cryptanalysis.
A second misconception is that public-key encryption is a general- purpose
technique that has made symmetric encryption obsolete. On the contrary, because of
the computational overhead of current public-key encryption schemes, there seems no
foreseeable likelihood that symmetric encryption will be abandoned. Finally, there is
a feeling that key distribution is trivial when using public-key encryption, compared to
the rather cumbersome handshaking involved with key distribution centers for symmetric
encryption. For public-key key distribution, some form of protocol is needed,
often involving a central agent, and the procedures involved are no simpler or any
more efficient than those required for symmetric encryption.
A public-key encryption scheme has six ingredients ( Figure 2.7a ):
• Plaintext: This is the readable message or data that is fed into the algorithm as
input.
• Encryption algorithm: The encryption algorithm performs various transformations
on the plaintext.
• Public and private key: This is a pair of keys that have been selected so that
if one is used for encryption, the other is used for decryption. The exact
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
2.3 ENKRIPSI KUNCI PUBLIKAdalah sama pentingnya untuk enkripsi simetris enkripsi kunci publik, yang menemukanGunakan pesan otentikasi dan kunci distribusi.Struktur enkripsi kunci publikEnkripsi kunci publik, pertama kali kepada publik diajukan oleh Diffie dan Hellman pada tahun 1976[DIFF76], adalah benar-benar revolusioner kemajuan pertama di enkripsi dalam ribuantahun. Algoritma kunci publik didasarkan pada fungsi matematika daripadaoperasi sederhana pada pola bit, seperti yang digunakan dalam algoritma enkripsi simetris.Lebih penting, kriptografi kunci publik asimetris, melibatkan penggunaandua kunci terpisah, berbeda dengan enkripsi simetris, yang menggunakan hanya satu tombol.Gunakan dua memiliki konsekuensi yang mendalam di bidang kerahasiaan, kuncidistribusi, dan otentikasi.Sebelum melanjutkan, pertama kita harus menyebutkan beberapa kesalahpahaman umumtentang enkripsi kunci publik. Salah satunya adalah bahwa kunci publik enkripsi lebih amandari kriptoanalisis daripada simetris enkripsi. Pada kenyataannya, keamanan enkripsi apapunskema tergantung pada panjang (1) tombol dan (2)-komputasi pekerjaan yang terlibatdalam memecahkan sandi. Tidak ada dalam prinsipnya tentang simetris atau kunci publikenkripsi yang membuat satu unggul yang lain dari sudut pandang melawan kriptoanalisis.Kesalahpahaman yang kedua adalah bahwa enkripsi kunci publik umum-tujuanteknik yang telah membuat enkripsi simetris usang. Sebaliknya, karena darioverhead komputasi skema enkripsi kunci publik saat ini, tampaknya ada adamasa kemungkinan enkripsi simetris yang akan ditinggalkan. Akhirnya, adaperasaan bahwa kunci distribusi sepele dibandingkan menggunakan enkripsi kunci publik,handshaking agak rumit yang terlibat dengan pusat distribusi kunci simetrisenkripsi. Untuk distribusi kunci kunci publik, beberapa bentuk protokol yang diperlukan,sering melibatkan agen pusat, dan prosedur yang terlibat tidak sederhana ataulebih efisien daripada yang diperlukan untuk enkripsi simetris.Skema enkripsi kunci publik memiliki enam bahan (gambar 2.7a):• Plaintext: ini adalah pesan dibaca atau data yang dimasukkan ke algoritma sebagaimasukan.• Algoritma enkripsi: algoritma enkripsi melakukan berbagai transformasipada plaintext.• Publik dan kunci pribadi: ini adalah sepasang kunci yang telah dipilih sehinggaJika salah satu digunakan untuk enkripsi, yang lain akan digunakan untuk dekripsi. Persis
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
2.3 PUBLIC-KEY ENCRYPTION
Of equal importance to symmetric encryption is public-key encryption, which finds
use in message authentication and key distribution.
Public-Key Encryption Structure
Public-key encryption, first publicly proposed by Diffie and Hellman in 1976
[DIFF76], is the first truly revolutionary advance in encryption in literally thousands
of years. Public-key algorithms are based on mathematical functions rather than on
simple operations on bit patterns, such as are used in symmetric encryption algorithms.
More important, public-key cryptography is asymmetric, involving the use
of two separate keys, in contrast to symmetric encryption, which uses only one key.
The use of two keys has profound consequences in the areas of confidentiality, key
distribution, and authentication.
Before proceeding, we should first mention several common misconceptions
concerning public-key encryption. One is that public-key encryption is more secure
from cryptanalysis than symmetric encryption. In fact, the security of any encryption
scheme depends on (1) the length of the key and (2) the computational work involved
in breaking a cipher. There is nothing in principle about either symmetric or public-key
encryption that makes one superior to another from the point of view of resisting cryptanalysis.
A second misconception is that public-key encryption is a general- purpose
technique that has made symmetric encryption obsolete. On the contrary, because of
the computational overhead of current public-key encryption schemes, there seems no
foreseeable likelihood that symmetric encryption will be abandoned. Finally, there is
a feeling that key distribution is trivial when using public-key encryption, compared to
the rather cumbersome handshaking involved with key distribution centers for symmetric
encryption. For public-key key distribution, some form of protocol is needed,
often involving a central agent, and the procedures involved are no simpler or any
more efficient than those required for symmetric encryption.
A public-key encryption scheme has six ingredients ( Figure 2.7a ):
• Plaintext: This is the readable message or data that is fed into the algorithm as
input.
• Encryption algorithm: The encryption algorithm performs various transformations
on the plaintext.
• Public and private key: This is a pair of keys that have been selected so that
if one is used for encryption, the other is used for decryption. The exact
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2024 I Love Translation. All reserved.

E-mail: