Conyacサービス終了のお知らせ

Ariel W. (ariel_w) 翻訳実績

5.0 1 件のレビュー
本人確認済み
約7年前 女性
日本
中国語(繁体字) (ネイティブ) 日本語 英語 中国語(簡体字)
このユーザーにより翻訳された公開依頼の一覧です。この一覧には、完了されていない依頼は含まれません。
ariel_w 中国語(繁体字) → 英語
原文

如果資料庫裡存有我們的密碼,那麼負責管理資料庫的人不就可以看見嗎?
或者資料庫被入侵,入侵者也可以全部看見。我們費盡心思保護的密碼就這樣輕易被人看光 —  這樣對嗎?
當然不對,這就是為何我們需要「加密」
我們用密碼學,一門在探討資訊保密、傳遞、驗證⋯等的學問,對密碼做一些特殊的處理,將密碼從原本的明文變成大家看不懂的密文,然後才將密碼傳送出去,存入資料庫。
如此一來,就算有辦法查看資料庫,或者是有人在中途攔截我們傳出的資料,也只能看到加密後那一串沒有意義的密文,無法得知真正的密碼。

翻訳

If our passwords are saved in the database, does it mean the administrator of the database can see our passwords?
Or if the database is hacked, the intruder can also see them. The passwords that we tried hard to protect are seen by others so easily. Is that correct?
Of course not. That's why we need "Encryption."
We utilize Cryptography, a knowledge investigating information security, transmission, validation...and so forth, to process the passwords from plaintext to Ciphertext / Cyphertext which no one understands, and then send the passwords out and save into the database.
Therefore, even if some people are able to access to the database, or to intercept the information we delivered, they can only see the meaningless Ciphertext / Cyphertext encrypted, not the real passwords.

ariel_w 中国語(繁体字) → 英語
原文



密碼學可分為古典密碼學與現代密碼學,我們先來看看比較平易近人(?)的古典密碼學。

古典密碼學主要採用兩種方式:替換與移項。
替換式密碼又稱取代加密法,是一種按規律將文字加密的方式。

替換式密碼中可以用不同字母數為一單元,例如每一個或兩個字母為一單元,然後再作加密。密文接收者解密時需用原加密方式解碼才可取得原文本。由於拼音文字中字的組成為有限的字母,以英語為例只有26個字母,組成可能的單元數較少,因此使用替換式密碼相對較為容易,而且亦可使用簡單機械進行加密;

翻訳

Cryptography can be categorized as Classical Cryptography and Modern Cryptography. Let's take a look at Classical Cryptography, which seems more friendly(?).

Classical Cryptography uses mainly two methods, substitution and transposition.
A substitution cipher is also called substitution encryption, which is a method to encrypt letters systematically.

Different alphabets can be used as a unit In a substitution cipher, for example, each one or two alphabets as a unit, and then encrypt them. Receivers need to decipher the ciphertext with the same encrypting methods to get the original text. Since the alphabets in a phonogram are limited, for example, only 26 alphabets in English, the number of possible combinations is relatively small. Therefore, using a substitution cipher is relatively easy, and it is also possible to use simple machines to encrypt.