Identity authentication is an important component of the key exchange protocol.
身份认证是密钥交换协议的重要组成部分。
This paper presents an identity-based authenticated key exchange protocol in the standard model.
提出了一个标准模型下的基于身份认证的密钥协商协议。
All this paves the way for the selecting the standard of key exchange protocol when we construct network such as VPN.
为构建VPN网络等应用场合,指明了密钥交换协议的选取依据。
The three-party key distribution task (or, protocol) can be used as an important module for constructing key exchange protocols.
三方密钥分配密码任务可以作为密钥交换协议中的一个重要子模块。
After this, the paper takes out a new host Indentity based One-time Key Exchange Protocol (I-OKEP), and analyzes its security character.
提出了一种新的,基于主机身份的一次性密钥交换协议i- OKEP,并分析了其安全性。
Compared with protocols under the CRS model, the group key exchange protocol can greatly reduce the risk of putting all trusts in one place.
和采用CRS模型的协议相比,降低了把整个信任集中于一处带来的风险。
Aiming at the demand of contactless smart card, this paper proposes a new mutual authentication key exchange protocol based on low power computing devices.
针对非接触式智能卡的需求,提出一种基于有限计算能力的相互认证密钥交换协议。
The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.
基于验证元的口令认证密钥交换协议的最基本安全目标是抵抗字典攻击和服务器泄露攻击。
Aiming at the characteristics of space networks and their special requirements for key exchange, this paper proposes a key exchange protocol for space networks.
针对空间网络的特点及空间网络对密钥交换的特殊需求,提出一种适用于空间网络的密钥交换协议。
Through the key exchange protocol, the entities can establish the high-entropy session key and this session will be used in the subsequent secure communication.
密钥协商协议是实体实现安全通信的前提,通过密钥协商协议,实体可以建立高熵的会话密钥,这个会话密钥将用于随后的通信中。
In this paper, we first extend the ideal theory of Strand Spaces, and then apply this extended theory to analyzing a complex Internet key exchange protocol, LKE2.
本文首先扩展了串空间的理想理论,然后应用此扩展理论分析IKE2协议的核心安全:秘密性和认证性。
EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.
EKE协议是基于弱口令的密钥交换协议,通过使用对称密钥加密体制和公钥加密体制,能够很好地抵抗离线字典攻击。
Then it discusses the function of identity protection, and how to implement the identity protection in key exchange protocol, which protects the participants identity.
讨论了身份保护的作用,以及在密钥交换协议中应如何实现身份保护,来保护参与者的身份。
This paper mainly focuses on key exchange protocol based on dynamic password authentication, which can insure the security of both authentication and transportation of VPN system.
本文主要研究基于动态口令认证的密钥交换协议,该协议既能保证VPN的认证安全,又能保证VPN的传输安全。
This article introduces IKE protocol at first, then makes formal analysis on a certain key exchange mode by logical method, and proves the correctness of IKE.
该文首先介绍协ike议,然后对协议中一种具体的密钥交换模式的安全性使用逻辑方法进行证明,并得出关于协议正确性的结论。
A black box testing method aiming at IKE (Internet Key Exchange) protocol performance was proposed, which was based on the self-developed platform of protocol integrated test system.
提出了一种针对密钥交换(IKE)协议性能的黑盒测试方法,该方法基于自主开发的协议集成测试系统平台。
We propose a new elliptic curve key-exchange protocol, analyze its security and prove that assuming ECDDHP is hard to solve, it is a secure AK protocol.
文章设计了一个新的椭圆曲线密钥交换协议,分析了其安全性,证明了在ECDDHP难解的前提下,该协议是安全的AK协议。
The RDP protocol USES the RC4 symmetric encryption algorithm with up to 128 bit keys. The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
RDP协议的使用对称加密算法rc4多达128位钥匙。rc4加密后所产生的一个初步的交流,其中的关键是使用RSA的非对称加密。
SRP (the secure remote password protocol) is a new secure password authentication and key-exchange protocol.
(安全远程密码协议)是一种安全的新型密码鉴别和密钥交换协议。
The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.
经安全性分析证明,该协议可以在可信计算环境下保证密钥交换的机密性与可靠性,同时还可以保证主机完整性与主机匿名性。
The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.
经安全性分析证明,该协议可以在可信计算环境下保证密钥交换的机密性与可靠性,同时还可以保证主机完整性与主机匿名性。
应用推荐