key exchange 中文意思是什麼

key exchange 解釋
密鑰傳輸
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • exchange : vt 1 (以某物與另一物)交換,調換 (for) 2 互換,交流,交易。3 兌換。 vi 1 兌換 (for) 2 交換;...
  1. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  2. 4. study existing key - exchange protocols, promote and implement a key exchange protocol under the hardness assumption of the decisional diffie - hellman problem as well as the existence of collision - free hash functions. 5

    在分析了密鑰交換方法的基礎上設計並實現了基於離散對數困難問題( dlp )和diffie - hellman密鑰交換協議,輔以hash函數和公鑰證書,進行會話密鑰交換方法。
  3. Ike ( internet key exchange ) is the protocol which performs mutual authentication and establishes security associations ( sas ) for ipsec ( ip security ). it is a very important component of the ipsec protocol suite

    因特網密鑰交換( internetkeyexchangeike )協議是ipsec ( ipsecurity )協議簇的重要組成部分,負責動態協商和管理安全聯盟。
  4. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,網路及其安全服務的實現(包括嵌入式協議棧usnet的選取、底層驅動程序的設計和安全協議ipsec的分析與實施) 。
  5. The ability of keeping the ip packet ' s integrity, secrecy, authentication, data origination, anti - relay is discussed. the relationship of ipsec component authentication header ( ah ), encapsulating security payload ( esp ) and ike ( internet key exchange ) is also talked about. this discussion of ipsec makes the impression that ipsec make ip layer security enough

    論述了ipsec在ip報文的完整性、機密性、數據來源認證和抗重播等方面的能力, ipsec的基本協議? ?認證報文頭( ah )和安全封裝載荷報頭( esp )與ipsec安全體系的其它組成部分如安全策略、加密和認證演算法、密鑰管理等如何合作,共同完成對ip報文的安全保護。
  6. As the discussion, the 802. 1x is easy to extend and supports various authentication mechanisms, among which eap - tls is the most popular one. the eap - tls provides a two - way authentication between the client and server, key exchange and dynamic key in authentication procedure, which make sure the security of the process of authentication

    802 . 1x具有很強的擴展優勢,可以支持多種認證機制, eap - tls就是其中應用最廣的一種,因為eap - tls提供了客戶端和服務器的雙向認證,且在認證過程中進行密鑰交換和生成動態密鑰,在?大程度上?巳現?痰陌踩? =幼盼惱陸檣芰吮痙槳鋼
  7. In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc

    作者所作的主要工作有: ( 1 )研究了基於大素數域上的橢圓曲線密碼在加密解密、密鑰交換、數字簽名等方面的密碼協議並分析了每種協議的安全性能; ( 2 )在現有基於身份的數字簽名方案的基礎上提出了基於身份的群簽名系統並討論了群簽名在數字現金中的應用; ( 3 )給出了橢圓曲線密碼在電子拍賣系統、密鑰認證系統方面的實現方案。
  8. It is unconditionally secure ( i. e. secure against a spy who has sufficient time and computer power ), and needless of any private key exchange before the actual communication

    量子密碼具有無條件安全的特性(即不會遭受擁有足夠時間和計算機能力的竊聽者攻擊的危險) ,而在實際通信發生之前,不需要交換私鑰。
  9. Signature and verification systems, such as ecdsa etc, the discuss about key exchange systems such as deffie - hellman systeme, etc. this thesis also discussed several applications and information safety products of the elliptic curve cryptosystems at the finite field too, such as digital signature, the group signature, the application in the smart card

    Ecdsa等簽名驗證體制的選取, deffie - hellman等密鑰交換體制的研究。論文也討論了基於有限域上橢圓曲線公鑰密碼系統的若干應用和信息安全產品,如數字簽名,組簽名,在智能卡中的應用。
  10. Management of internet key is a necessary condition to communicate security. the paper introduces internet key exchange protocol to provide key management. and finite state machine is use for the procedure of internet key exchange

    第六部分: hitemet的密鑰管理是用戶進行安全通信的必要條件,本文採用了hitemet密鑰交換協議ike ( hitemetkeyexchange ) ,本文採用有限狀態機來描述密鑰的協商過程。
  11. ( 2 ) research on ipsec architecture the goal, function and construction of ipsec design ; the analysis on the two security protocols of ipsec ? ah and esp including security function, packet format, application mode and processing operations of each ; mainly of the security association ( sa ) and its two modes : transport and tunnel, the instrument on organizing and managing sas security association database ( sad ), and that on managing security policies ? ? security policy database ( spd ) ; specific descriptions on internet key exchange ( ike )

    ( 2 ) ipsec協議體系的研究給出了ipsec的設計目的、作用和組成;分析了ipsec的兩種安全協議? ? ah和esp ,包括每種協議的安全功能、包格式、應用模式以及對數據包的處理過程;重點研究了安全聯盟( sa )以及兩種模式:傳輸模式和隧道模式,組織和管理sa的手段? ?安全聯盟數據庫( sad ) ,以及安全策略的管理手段? ?安全策略數據庫( spd ) ;最後,對internet密鑰交換( ike )進行了詳細介紹。
  12. The difficulties of elliptic curve discrete logarithm problem and safety of 3 - des encryption is analyzed in detail. this cryptographic system applies a key exchange scheme based on ecc and trusty data encryption algorithm

    文章最後分析了該密碼系統的安全性,對橢圓曲線離散對數問題的難解性以及三重des加密演算法的安全性作了較詳細的分析。
  13. The current internet key exchange protocol ike is too complicated to effectively prevent dos attack and has too much rounds, which will influence the performance and interoperability and cause a lot of security hole at the same time

    目前ipsec的密鑰交換協議ike過于復雜,不能有效的防止dos攻擊,協議輪數太多,這些都嚴重影響了協議的性能和互操作性,同時導致了許多安全漏洞。
  14. The secret information derived from the key exchange data

    從密鑰交換數據導出的機密信息。
  15. Extracts secret information from the encrypted key exchange data

    從加密密鑰交換數據中提取機密信息。
  16. The concept of stego - key exchange is first presented. some conditions and a basic protocol of realizing it are first discussed. then a known - secret stego - key exchange scheme and some unknown - secret stego - key exchange schemes are designed

    首次對閾下通道中的隱匿密鑰協商的概念、實現條件和基本協議進行了討論,並設計了已知秘密的隱匿密鑰協商方案和幾個未知秘密的隱匿密鑰協商方案。
  17. Based on this, this thesis puts forward the randomized key exchange system based on rsa, which uses des key as session key to handle the plain text and encrypted text, and uses rsa key pair to encrypt / decrypt des key in order to keep security

    在此基礎上,給出了基於rsa的隨機密鑰交換系統。該系統採用des作為會話密鑰處理明文和密文,用rsa密鑰對des密鑰進行加解密以保證密鑰安全。
  18. The key exchange data within which the secret information is hidden

    其中隱藏有機密信息的密鑰交換數據。
  19. We select rubin logic to formally analyze the authentication and key exchange protocol designed for this transmission platform utilized, and the analysis result indicates that this authentication and key

    對于傳輸平臺所使用的認證和密鑰交換協議,本文選擇rubin邏輯對其進行形式化分析,分析結果表明該認證和密鑰交換協議具有一定的嚴密性。
  20. In this thesis, we deeply research on secure transmission technique in military information system and presented a multipurpose image watermarking algorithm together with a new authentication and key exchange protocol. they can be well used in the transmission platform

    本文深入研究了軍用信息系統安全傳輸技術,設計和實現了一個多功能數字圖像水印演算法和一個認證和密鑰交換協議,並將其應用到傳輸平臺中。
分享友人