diffie hellman algorithm 中文意思是什麼

diffie hellman algorithm 解釋
迪菲
  1. It includes functions of tonglink / q, using rc5 encryption algorithm, md5 message digesting algorithm, diffie - hellman key exchanging algorism to implement point - to - point security

    描述了通過md5消息摘要演算法, rc5加密演算法, diffie - hellman密鑰交換演算法,密鑰保存等方法實現點-點加密的過程。
  2. The key can be used to determine key agreement, such as a key created using the diffie - hellman key agreement algorithm

    密鑰可用於確定密鑰協議,如使用diffie - hellman密鑰協議演算法創建的密鑰。
  3. In this paper, two kinds of public - key cryptography of data transport are presented rsa encryption algorithm and diffie - hellman encryption algorithm

    本文介紹了數據傳輸中公開密鑰演算法中的兩種- rsa加密演算法和diffie - hellman加密演算法
  4. The main results of this thesis are as follows : 1. based on the thoughts of " diffie - hellman decision problem " and anonymous signature, an unconditionally anonymous sign - cryption algorithm is proposed and its security proof is given

    研究成果體現在如下幾個方面: ( 1 )目前的簽密演算法要求簽密人的身份是公開的,作者利用無條件匿名簽名的思想,給出了一個無條件匿名的簽密演算法,並給出了相應的安全性證明。
  5. The initialisation key is the first security gate in bluetooth security system, if the initialisation key is got by attacker, the attacker will get the common link key by continue listening the communication. if the common link key is known by others, the two device is no secret before he. the third party can not only listen the two device ' s communication but also assert him one party to authenticate the other. pairing at place where less people here will reduce the attack. to use long pin managed by diffie - hellman key exchange algorithm will also reduce the attack

    初始字是藍牙安全系統的第一道安全屏障,如果初始字被攻擊者得到,攻擊者就可以通過監聽兩設備的后續通訊進而獲得兩設備的公共鏈路字,如果兩設備的公共鏈路字為第三方知曉,那麼兩設備對于第三方面而言就毫無安全性可言。第三方不但可以偷聽兩設備的加密通訊,還可以冒充其中一方向另一方鑒權。
  6. Then we do some research about the basic protocols, the elliptic curve diffie - hellman protocol is improved as it can ’ t make identity authentity and can ’ t resist third party ’ s attacks ; at the same time, the signature equation of elliptic curve digital signature algorithm is reconstructed, and the improved kp + lqalgorithm is applied into verification stage, the whole speech of the protocol is improved greatly

    接著,研究和分析了基於ecc的各類密碼協議。針對密鑰交換協議不能進行身份鑒別以及存在第三方攻擊的問題,對其加以改進;同時,對數字簽名協議中的簽名方程重新構造,並將優化的kp + lq演算法用於驗證過程,提高了協議的執行效率。
  7. The main contributions of the dissertation are summarized as follows. ( 1 ) elliptic curve cryptosystems in optimal extension fields ( oef ), including elgamal encryption algorithm, diffie - hellman key agreement scheme and elliptic curve digital signature algorithm ( ecdsa ), are implemented, and a software package, which is applicable to microcomputers, is developed

    本文所取得的主要研究成果是: ( 1 )完整實現最優擴域oef上的橢圓曲線密碼體制,其中包括elgamal加密演算法、 diffie - hellman密鑰共享方案以及橢圓曲線數字簽名演算法ecdsa ,並且提供了相應的適合在微機上實現的軟體包。
分享友人