通信密鑰 的英文怎麼說
中文拼音 [tōngxìnmìyào]
通信密鑰
英文
communication key-
The cryptanalysis of a quantum key distribution and authentication protocol through once quantum communication
一次量子通信量子密鑰分發和認證協議的安全性分析Given the sensitive nature of the information in the keystore, even placing it on a shared network accessible file system is inadvisable
考慮到密鑰存儲庫中信息的敏感性,即使將它放在可通過網路訪問的共享文件系統中,也是不妥當的。The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways
本文提出的個性化kdc代理根據用戶輸入的圖片和個性信息,自動產生基密鑰,分別運用公開密鑰系統進行交換,使通話各方各自產生完全相同的主密鑰,巧妙地解決了密鑰分配和加密解密同步的問題,並利用單向散列函數的性質,基於相同的演算法產生用於加密解密的一次一密會話密鑰。The crux of secret communication is the secrecy of secret key. it has been pointed out that declassification can be realized by reconstructing phase space
實現保密通信的關鍵是密鑰的保密性,己有文獻指出,可以利用相空間重構理論實現保密通信的解密。The platform puts emphasis on the implementation of m - gdh. 2 protocol, and realizes such functions as follows : peer to peer network connection, dynamically displaying network topology, key generation, secure communication, help - online and so on
該平臺以m - gdh . 2協議為開發重點,實現了網路對等連接、動態顯示網路拓撲結構、密鑰生成、安全通信以及聯機幫助等功能。Lkh and iolous schemes were proposed to account for the issue of group communication key management, and these two shemes become the basic ideal for more and more shemes to improve
Lkh和iolus方案對組通信的密鑰管理提出了解決的方案,成為許多密鑰管理方案改進的基礎。Information is bound to a key pair through key binding
通過密鑰綁定將信息與一個密鑰對綁定。Object from the key information from an xml string
通過xml字元串中的密鑰信息初始化Communication between the client and the web server is encrypted using a combination of the encryption keys sent by the client and keys provided by the web server
客戶端和web服務器之間的通信是通過組合使用客戶端發送的加密密鑰和web服務器提供的密鑰來加密的。The secret key transmission method adopting ternary optical fiber communication was proposed
6 、提出了利用三值光纖通信實現密鑰安全傳送的方法。The information gained by the eavesdropper through interception is a very important criterion for judging the success of the key transmission and a necessary parameter for the privacy amplification
竊聽者通過竊聽所獲取的信息量是決定密鑰傳輸是否成功的重要指標,同時也是保密增強這一技術環節的必要參數。Quantum cryptology is a new method for secret communications. this new method utilizes the quantum nature of single photons. data can be transferred with a proven security via the protocols of quantum key distribution
量子密碼術是一種實現秘密通信的新方法,它利用單光子的量子性質,藉助量子密鑰分配協議可實現數據傳輸的可證性安全。In the research of secure communication, the thesis analyzes some shortcomings of diffie - hellman ' s crypt key exchanging protocol, presenting a new exchanging method based on the " station to station " protocol and cookie mechanism, realizing the software of crypt key exchanging and secure communication of ip datagram on router
在對安全通信的研究中,本文分析了diffie - hellman密鑰交換協議中易受攻擊的地方,提出了基於端對端協議及cookie機制的密鑰交換新方法,並在路由器上實現了密鑰交換和ip報文的安全通信。With the development of internet and electronic commerce, there is a high demand for information security. with the traditional encryption technology, the distribution of key still has n ' t a perfect solution. pki technology based on public key system resolves it through issuing the certificates by ca ( certification authority )
但是在傳統的信息加密技術中,密鑰的分發一直沒有得到很好的解決,而基於公鑰體制的pki ( publickeyinfrastructure ,即公鑰基礎設施)技術通過簽證機關(即ca : certificationauthority )發布證書的方式較好地解決了這一問題。Object by providing the xkms key data and authorization information
通過提供xkms密鑰數據和授權信息,創建The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient
數字包裝器最被認可的形式是數字信封,這些代碼主要完成電子郵件的加密,把想打開信封而沒有正確數字密鑰的入侵者擋在外面,數字信封主要由通過密碼加密或軟體演算法加密的代碼組成,運載著能正確讓接收方識別發送方身份的數字簽名。The models of unconditional security from quantum channels and noisy channels are two typical methods now. two parties begin the secret - key agreement over a public channel
目前最典型的方法是利用有擾通道或量子通道建立無條件安全模型,通信雙方在公共通道上進行密鑰協商。It is unconditionally secure ( i. e. secure against a spy who has sufficient time and computer power ), and needless of any private key exchange before the actual communication
量子密碼具有無條件安全的特性(即不會遭受擁有足夠時間和計算機能力的竊聽者攻擊的危險) ,而在實際通信發生之前,不需要交換私鑰。Information - theoretically secure secret - key agreement is the key to make perfect security. the models of unconditional security from quantum channels and noisy channels are two typical methods now. once the secret - key has been agreed over a public channel, one can use the key to encrypt messages by using one time pad
現在通常的做法是通信雙方使用有擾通道或量子通道建立無條件安全模型,然後在公開認證通道上交互信息進行密鑰協商,通信雙方把協商之後的安全的密鑰作為雙方共享的密鑰使用一次一密體制進行保密通信。The presented scheme could efficiently update the traffic encryption key ( tek ) in the environment of lack of trusted centre and mobility of nodes
方案在缺少可信中心和網路拓撲結構動態變化的環境中能有效地更新組通信密鑰。分享友人