Understand secret key , public key , one - way hash functions 了解秘钥、公钥、单向散列函数
Finally , we analysis the hash function that we constructed , and find the hash function has good randomicity and collision - avoided 最后,通过分析说明本文所构造的单向散列函数具有良好的随机性和抗碰撞性。
Secondly , making use of sensitive dependence on initial conditions of these two chaos systems , we construct a new hash function 然后,利用这两个混沌系统对初值的敏感性等特性给出了构造单向散列函数的一种新算法。
The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm , md5 one - way hash function and permutation code at the same time 保密散列数字签名算法利用rsa公钥密码体制的原理、 md5单向散列函数和排列码加密的思想,构造了一种能够快速实现数据保密、数字签名的签名方案。
The paper analyzes the one - way hash function ( sha - 1 ) and study the process of gaining keks from ak using sha - 1 . this paper discusses the state models of key management protocol in bpi + system and key usage 分析讨论了单向散列函数的安全散列算法( sha - 1 ) ,研究了ak进行必要的填充后使用sha - 1得到密钥加密密钥( kek )的过程。