鏈密加全安路 的英文怎麼說
中文拼音 [liànmìjiāquánānlù]
鏈密加全安路
英文
tunnel- 鏈 : Ⅰ名詞1. (鏈子) chain Ⅱ動詞(用鏈栓住) chain; enchain Ⅲ量詞(計量海洋上距離的長度單位) cable length
- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 全 : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
- 路 : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
-
( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system
特別是,論文作者在網路安全系統建設的過程中,獨立承擔了中心子網防火墻、網路入侵檢測系統、病毒防護體系的安裝及管理工作,在詳細了解了ddn鏈路加密、 pki ca體系的建設和使用原理的基礎上,參與了網路基礎設施的安裝調試以及各類服務器的配置管理,擬定了《計算機信息系統安全管理規定》 、 《網路ip地址規范》 ,為本單位網路安全建設規劃提出了意見和建議。After the investigation of the general technology of hardware implementation, how to implement the kasumi algorithm using field programmable gate array ( fpga ) device is discussed in detail, and the author develops the cipher chip of kasumi algorithm, the kasumi cipher card based on 32 - bits pci bus, the wdm device driver that used in windows2000 / xp, and the software to demostrate encrypting data link. finally, an application demostration is constructed with all the above implementation
在此硬體實現的結果晶元基礎上,設計了32位的基於pci總線的kasumi加密卡,編寫了windows2000 xp下的windows驅動程序模型( wdm )驅動程序和鏈路加密應用程序,由此構成一個應用演示系統,作為研製結果的應用評估,為進一步進行第三代移動通信系統相關安全技術研究和開發提供了基礎條件。The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago
本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。The initialisation key is the first security gate in bluetooth security system, if the initialisation key is got by attacker, the attacker will get the common link key by continue listening the communication. if the common link key is known by others, the two device is no secret before he. the third party can not only listen the two device ' s communication but also assert him one party to authenticate the other. pairing at place where less people here will reduce the attack. to use long pin managed by diffie - hellman key exchange algorithm will also reduce the attack
初始字是藍牙安全系統的第一道安全屏障,如果初始字被攻擊者得到,攻擊者就可以通過監聽兩設備的后續通訊進而獲得兩設備的公共鏈路字,如果兩設備的公共鏈路字為第三方知曉,那麼兩設備對于第三方面而言就毫無安全性可言。第三方不但可以偷聽兩設備的加密通訊,還可以冒充其中一方向另一方鑒權。This paper first introduce the new technology bluetooth, then discuss the security of bluetooth at link layer including the management of link key ( classify 、 generate and transfer ) 、 pairing 、 authentication and encryption. at last discuss the security hole in bluetooth such as initialization key 、 unit key 、 authentication and bluetooth device address and the methods to solve the problem
文中首先簡要介紹了藍牙這一新技術;接著討論了藍牙鏈路層的安全問題,包括鏈路字的管理(分類、生成及傳遞) 、配對過程、鑒權過程和加密過程。In chapter 2, the security measures and mechanism are introduced and studied. it mainly includes authentication, encryption, pairing / bonding, key management defined by bluetooth core protocol, three security modes defined by bluetooth profile and bluetooth security architecture defined by bluetooth white paper. in chapter 3, the implementation of secure services in bluetooth environment is studied deeply according to different scenarios
在第二部分,本文闡述了藍牙技術中的安全機制和各種具體措施,主要包括藍牙標準對直接鏈路層的安全標準定義如鑒權、加密、配對/ bonding 、密鑰管理等,藍牙應用規范中給出的三種安全模式以及藍牙安全標準白皮書的安全體系結構。分享友人