第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
他说,IT经理还须鉴定其组织中用的协议,如用户识别和密钥管理。
He says it managers must also evaluate the protocols used within their organizations, such as user identification and key management.
早期规范中的认证与密钥管理协议为保密密钥,管理(PKM),数据保密机制包含基于DES -CBC和AES - CCM的两个解决方案。
In earlier version, authentication and key management protocol is called Privacy key management (PKM); and data protection protocols include two solutions based on DES-CBC and AES-CCM.
早期规范中的认证与密钥管理协议为保密密钥,管理(PKM),数据保密机制包含基于DES -CBC和AES - CCM的两个解决方案。
In earlier version, authentication and key management protocol is called Privacy key management (PKM); and data protection protocols include two solutions based on DES-CBC and AES-CCM.
应用推荐