What are the fundamentals of information summarization technology? 5

Updated on science 2024-04-29
3 answers
  1. Anonymous users2024-02-08

    Fundamentals of Digital Summarization:

    The sender encrypts the original message into a digest with the hash function, and then sends the digital digest and the original message to the receiver together, and the receiver also uses the hash function to encrypt the original message into a digest to see if the two digests are the same, if they are the same, it indicates that the information is complete. Otherwise it is incomplete.

    It is used to guarantee the integrity of the information.

    Fundamentals of Digital Envelopes:

    The sender uses a symmetric key to encrypt the data, and then encrypts this symmetric key with the receiver's public key, called the "digital envelope" that encrypts the data, and sends it to the receiver together with the encrypted data, and the receiver first decrypts the digital envelope with his own private key, obtains the symmetric key, and then uses the symmetric key to decrypt the data.

    It is used to guarantee the confidentiality of information.

    Fundamentals of Digital Signatures:

    The sender first uses the hash function to generate a digital digest of the original file, and encrypts the digital digest with its own private key to form the sender's electronic signature, which is attached to the file. Then, a symmetric key is used to encrypt the original file with an electronic signature, and then the symmetric key is encrypted with the receiver's public key, and then the encrypted key file is transmitted to the recipient. The receiver decrypts the key ciphertext with its own private key, obtains a symmetric key, decrypts the ciphertext of the original file with the symmetric key, obtains the electronic signature of the original file at the same time, and then decrypts the electronic signature with the sender's public key to obtain the hash value of the electronic signature, and then uses the hash function to recalculate the hash value of the obtained original file and compares it with the hash value obtained by decrypting the electronic signature.

    It is used to guarantee the non-repudiation and completeness of the information.

  2. Anonymous users2024-02-07

    a.Objective: Concisely state the purpose of the work and the scope of the study.

    b.Methods: Briefly describe the basic practices of the research topic, including the objects, materials, and methods.

    c.Results: Briefly list the main results (with unit indicated), data, statistical significance (p-value), etc., and explain their value and limitations.

    d.Conclusion: Briefly explain the correct viewpoint, theoretical significance or practical value, and promotion prospect obtained from the research results.

  3. Anonymous users2024-02-06

    Answer]: B This question tests the basic knowledge of digital summarization technology in encryption technology. A numeric digest is a fixed-length string of information generated by using a hash function to perform operations on the original information, which is called a numeric digest.

    The hashing algorithm that generates the digital digest is unidirectional and unique. The so-called unidirectionality, also known as irreversible closed-core fundamentality, refers to the digital digest generated by the hashing algorithm, which can no longer be restored from the original text; Uniqueness means that the numerical summaries generated by the same information must be the same, and the numerical summaries generated by different information must be different. This feature is similar to the fingerprint feature of a human, so the digital digest is also known as a digital fingerprint.

    Digital summaries have fingerprint characteristics, so the integrity of the information can be verified by comparing whether the digital digests of two pieces of information are the same to determine whether the information has been tampered with. The process of using digital digest is as follows: the sender uses the hash algorithm to generate a digital digest of the original text; The sending party of the sending clan will send the original text together with the summary of the numbers to the receiving party; After receiving the original text, the receiver uses the same hash algorithm to calculate the original text and generate a new digital digest. The receiver compares the received digital abstract with the newly generated digital abstract, if it is the same, indicating that the original text has not been tampered with during transmission, otherwise the original text information has changed.

Related questions
13 answers2024-04-29

The three coils produce an unbalanced magnetic field. It's turned. >>>More

6 answers2024-04-29

Learn about food preservation, and know what factors cause food to spoil. >>>More

5 answers2024-04-29

Objects such as germanium, silicon, selenium, gallium arsenide, and many metal oxides and metal sulfides, whose conductivity is between conductors and insulators, are called semiconductors. >>>More

2 answers2024-04-29

On September 2, 1969, researchers at the University of California, Los Angeles, Li Feng, began early experiments with network data transmission. Since then, the Internet has gone through a 40-year history. From the Arpanet in the past to the World Wide Web today, the Internet has grown by leaps and bounds. >>>More

4 answers2024-04-29

The protective relay must have the function to correctly distinguish whether the protected element is in normal operation or has failed, and whether it is a fault in the protected area or outside the zone. In order to realize this function, the protection device needs to be composed based on the characteristics of the change of electrical and physical quantities before and after the failure of the power system. >>>More