密鑰組件 的英文怎麼說
中文拼音 [mìyàozǔjiàn]
密鑰組件
英文
key module-
After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages
在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient
數字包裝器最被認可的形式是數字信封,這些代碼主要完成電子郵件的加密,把想打開信封而沒有正確數字密鑰的入侵者擋在外面,數字信封主要由通過密碼加密或軟體演算法加密的代碼組成,運載著能正確讓接收方識別發送方身份的數字簽名。On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange
依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。This paper detailedly describe my work in the research of pki, mainly include to independently develope a certificate function library that suitable for multi - platform and to establish a fundamental pki framework based on this library. the innovation of this paper is to implement multiform certificate process functions in the certificate function library, support the process of multiform certificate format including x. 509v3 certificate using in internet and wtls certificate using in wireless, and meanwhile provide multiform apis that can make this library used in different applications as a functional component
本文的創新點是在證書功能庫中實現了多種的證書處理功能,如產生和驗證證書請求、產生和驗證證書、對私鑰進行加密存儲和證書撤消等功能,支持多種證書格式的處理包括適用於因特網的x . 509v3證書格式和適用於無線領域的wtls證書格式,提供了多種api介面,使該功能庫可以作為一個功能組件嵌入到不同的應用中。Finally, we analyzed the security of this system completely which can be used to provide service involving confidentiality, integrality, certificate - based identity authentication and digital signature, etc. this system is consisted of two sub - systems : center of certificate mangement and client based military email transferring component, proposing two methods namely " two - level encryption " and " certification carrying " to ensure the confidentiality of system as well as identity authentication and key distribution with offline method. it uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no - denying of email tranfer, which forms a complete military email transferring system
該系統包括證書管理中心和用戶端軍用電子郵件傳輸組件兩個子系統,提出了「兩級加密」和「證書攜帶」兩種方式,以確保系統的機密性及離線方式下的身份認證、密鑰分發,利用雜湊函數實現郵件傳輸的完整性,採用數字簽名技術實現了郵件傳輸的不可否認性,形成了一個完整的軍用電子郵件傳輸系統。On the base of " pki assessment guidelines " and the pp of certificate issuing and management components ( cimc ), the key and certificate life cycle checklist is given for security function tests
2在參考《 pki評估指南》和證書頒發管理組件( cimc )保護輪廓的基礎上,給出密鑰和證書生命期各階段的核查表( checklist ) 。A license key granted to this component
授予該組件的許可證密鑰。This system provides support for group sending of military emails belonging to the same security domain as well as point to point transfer. it also supports functions such as distribution, refreshment and recovery of keys
系統支持同一安全域內軍用郵件的組間群發及點對點互發,支持分級的密鑰分發及密鑰更新和恢復等功能。分享友人