通行密鑰 的英文怎麼說
中文拼音 [tōnghángmìyào]
通行密鑰
英文
pass phrase key-
In this dissertation we make a study of subliminal channels that conclude the progress, the application, the model, the construction, the stego - key, the capacity, the security, the way to realize subliminal - freeness, and so on
本文對閾下通道技術進行了比較全面的總結和研究,包括閾下通道的發展狀況,應用前景,閾下通道的模型,構造方法,隱匿密鑰,容量,安全性以及封閉方法等。The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways
本文提出的個性化kdc代理根據用戶輸入的圖片和個性信息,自動產生基密鑰,分別運用公開密鑰系統進行交換,使通話各方各自產生完全相同的主密鑰,巧妙地解決了密鑰分配和加密解密同步的問題,並利用單向散列函數的性質,基於相同的演算法產生用於加密解密的一次一密會話密鑰。The passphrase is used to generate a decryption key, which will not be persisted
該通行短語用於生成一個解密密鑰,該密鑰不會持久化。Fairly good chaos map, which is of high performance and be implement easily is selected. with the introducing of appropriate perturbation aimed to change the initial conditions, we may enlarge the chaotic sequence period under finite precision in practical applications. mixed chaotic model is constructed by combining logistic sequences and m - sequences in form of exclusive - or. and we, by adding two mixed chaotic model, constructed double chaotic system to generate the key generator, which provides with excerllent cryptographic properties
本文利用混沌技術,通過對混沌映射的選取,選取出了易於實現,且性能優良的混沌映射;通過初始參數的加擾,使有限精度下混沌的短周期行為得以改善;通過利用混沌序列與m序列異或構成了混合混沌序列,在混合混沌序列的基礎上構造出了雙混沌系統,從而提高系統的抗破譯能力,設計出了混沌序列密鑰生成器。The models of unconditional security from quantum channels and noisy channels are two typical methods now. two parties begin the secret - key agreement over a public channel
目前最典型的方法是利用有擾通道或量子通道建立無條件安全模型,通信雙方在公共通道上進行密鑰協商。Information - theoretically secure secret - key agreement is the key to make perfect security. the models of unconditional security from quantum channels and noisy channels are two typical methods now. once the secret - key has been agreed over a public channel, one can use the key to encrypt messages by using one time pad
現在通常的做法是通信雙方使用有擾通道或量子通道建立無條件安全模型,然後在公開認證通道上交互信息進行密鑰協商,通信雙方把協商之後的安全的密鑰作為雙方共享的密鑰使用一次一密體制進行保密通信。Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied
本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算法,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器里,和以idea加密演算法為基礎設計的密碼流發生器( ksg )產生的密碼序列進行加解密運算,並且研究了此加密過程的密碼同步問題。Universal key management system realizes its function through software encryption algorithm and key - memory issuing functions itself through master - card. sjy49 uses key management platform by hardwares. the algorithm used in the generation, diffusion, eduction and transfer of the key is approved by the state competent department. the implementation of algorithm is functioned by the encryption equipment recognized by the state competent department
通用密鑰管理系統採用軟體密碼演算法,密鑰存儲分發等採用母卡方式實現; sjy49銀行ic卡密鑰管理系統採用硬體化的密鑰管理平臺,密鑰的生成、分散、導出、傳輸等密鑰管理功能使用的演算法是經國家主管部門審定通過的演算法,演算法的實現使用經國家主管部門審定通過的硬體加密設備。Management of internet key is a necessary condition to communicate security. the paper introduces internet key exchange protocol to provide key management. and finite state machine is use for the procedure of internet key exchange
第六部分: hitemet的密鑰管理是用戶進行安全通信的必要條件,本文採用了hitemet密鑰交換協議ike ( hitemetkeyexchange ) ,本文採用有限狀態機來描述密鑰的協商過程。The security of the algorithm is analyzed from the randomness, linear complexity of the chaotic sequence and the intensity of initial key. the results show the randomness of the key sequence pass the frequency test, sequential test, poker test, autocorrelation test, runs test, etc. and the total level is better than the binary sequence generated by the prng of delphi 7. 0, logistic chaotic system and rc4, the linear complexity comes up to the expectation, the initial key has very strong intensity
本文最後從混沌序列的隨機性、線性復雜度和初始密鑰的強度三個方面對演算法進行了安全性分析,結果表明演算法產生的密鑰序列的隨機性完全通過了頻數檢驗、序列檢驗、撲克檢驗、自相關檢驗和遊程檢驗等5種統計檢驗方法的檢驗,而且整體水平要好於delphi7 . 0中的偽隨機數發生器、 logistic混沌系統和rc4三種方法產生的二進制序列,線性復雜度達到了數學期望值。Finally, this thesis develops a stimulated system in vc + + 6. 0 to ensure that the 2400 - bitted long rsa key can be created and be used to encrypt / decrypt des key in comparatively short time, by developing the division, power module, power inverse and big prime algorithms using big number
最後,本文用vc + + 6 . 0設計出一個模擬系統,通過開發出大數除法,模冪,模逆,大素數生成的演算法來保證在較短時間內生成2400位長度(二進制)的rsa密鑰以及運用其對des密鑰進行加解密處理。Koal key management system products include universal key management system ( software edition ) and sjy49 banking ic card key management system
格爾密鑰管理系統產品包括通用密鑰管理系統(軟體版)和sjy49銀行ic卡密鑰管理系統兩個子產品。It receives credentials coming from ipsec entity. through its policy compliance checking to verify whether these credential are trustable, so determine whether these acts were authorized and under what conditions will be permitted. this kind of function will be very useful in the procession of resolving conflicts between different ipsec entities policies. in the light of such theory, the thesis developed an ipsec policy system based on the keynote which is the realization of “ trust management ”
通過一致性檢驗機構接收ipsec提交的安全策略與ipsec自身信任的安全策略相比進行一致性檢驗,從而確定了該ipsec的密鑰協商過程是否符合「信任管理「的規范,也就確定該行為是否被許可以及在何種限制條件下的許可。這樣就進一步解決了安全策略沖突的問題。本文就是在此理論基礎上初步實現了一個基於keynote信任管理的ipsec策略管理系統。The quantum communication can be divided into two stages : in the first stage, the quantum communication is conducted and cryptographic key communication is finished through the quantum channel ; in the second stage, the negotiation of cryptographic key is achieved in order to measure whether any bug exists or not, and then confirms the final cryptographic key, at this time the quantum communication is accomplished
在bb84協議中,量子通信實際上由兩個階段完成:第一階段通過量子通道進行量子通信,進行密鑰的通信;第二階段在經典通道中進行,主要負責密鑰的協商,探測竊聽者是否存在,然後確定最後的密鑰。The concept of stego - key exchange is first presented. some conditions and a basic protocol of realizing it are first discussed. then a known - secret stego - key exchange scheme and some unknown - secret stego - key exchange schemes are designed
首次對閾下通道中的隱匿密鑰協商的概念、實現條件和基本協議進行了討論,並設計了已知秘密的隱匿密鑰協商方案和幾個未知秘密的隱匿密鑰協商方案。The schemes to avoid the subliminal channels are summarized and compared with each other. a conclusion is drawn that the subliminal channel introduced by the semantic randomness of the input harmless message of cryptosystem can not be completely avoided. a new scheme to generate elgamal - type signatures that are free of any subliminal channels introduced by its session key is designed
總結了封閉閾下通道的若干方法並對各方案優缺點進行了對比分析,給出了作為系統輸入的無害消息的語義隨機性不可能完全封閉的結論,設計了新的對elgamal類簽名中會話密鑰進行完全封閉的方案,討論了現有封閉方案的實用性。Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties
傳輸層安全協議( tls )和安全套接字層協議( ssl )基於對稱密碼技術、非對稱密碼技術、消息認證碼技術、公鑰證書和公開密鑰基礎設施技術提供了保證網路通信數據的機密性、完整性和對通信各方進行認證的機制。Being the first application of quantum physics, quantum key distribution ( qkd ) has been developed very fast experimentally in recent years. it would impact thoroughly the existing secure communication, especially in military affairs, e - banking and so on
量子密碼通信在密鑰分發上的實驗已經得到巨大進展,預計很快能投入應用,在軍事、電子銀行保密等方面將有廣泛的應用前景。In the part of voice encryption, spatiotemporal chaotic system ( ocoml model ) and lfsr are used to generate multidimensional pseudo - random sequence. this sequence has a longer period, better randomicity, passing the verification of fips 140 - 2 security requirements. using the key stream generated by it to encrypt the voice gets a better security
在語音加密方面,本文利用時空混沌系統(單向耦合映象格子模型)與線性移位寄存器產生了高維的偽隨機序列,該序列周期很長,具有更強的隨機性,通過了fips140 - 2的安全性能驗證,利用其作為密鑰流對語音信號進行加密,獲得了更高的保密性。A passphrase from which to generate a symmetric key
用於生成對稱密鑰的通行短語。分享友人