助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   交换密钥 的翻译结果: 查询用时:0.015秒
图标索引 在分类学科中查询
所有学科
更多类别查询

图标索引 历史查询
 

交换密钥
相关语句
  exchange key
     This paper discusses the importance of key management in PKI. At the same time,it presents a model of key management and management scheme of key,including the management of CA key,the management of server key,the management of exchange key,and the management of user key,etc.
     论述了PKI体系中密钥管理的重要性,同时给出了密钥管理的体系结构模型,并给出了相应密钥的管理方案,包括CA根密钥的管理、服务器密钥的管理、交换密钥的管理以及用户密钥的管理等。
短句来源
  exchange keys
     This paper putsforward our implement approach of ISAKMP in using IPSEC to construct secure Virtual Private Networks(VPN) at first, then describes howISAKMP/oakley protocols initially establish security associations and exchange keys during the first phrase between two systems that wish tocommunicate securely in detail.
     首先介绍了它在用IPSEC构建的虚拟专用网VPN中的作为密钢管理的实现框架,然后详细分析了两个希望安全通信的系统之间如何使用ISAKMP/Oakley协议在第一阶段建立安全关联和交换密钥的过程。
短句来源
  “交换密钥”译为未确定词的双语例句
     For private-key system, the biggest problem is how to distribute keys safely and effectively.
     私钥密码长期以来存在如何在通讯双方之间安全地交换密钥的难题。
短句来源
     This scheme can implement identity authentication and key verification for both participants when key exchanging, which can effectively withstand the man-in-the-middle attack and the replay attack from intruders and enhance the security and reliability of key exchange.
     在进行密钥交换时,该方案能同时实现通信双方的身份认证和交换密钥的一致性认证,有效地抵抗冒名者的中间攻击和入侵者的重放攻击,提高了密钥交换的安全性和可靠性。
短句来源
     The algorithm in this new scheme can complete the calculation of the session key based on the witness of identification authentication and create a random key and be with the security based on both discrete logarithm and big integer factorization .
     新方案使用的算法,能基于身份认证的凭据完成交换密钥的计算,同时交换密钥具有随机性,其安全性是同时基于离散对数和大整数分解难问题的。
短句来源
     3. Using Diffie-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key;
     3、使用DiffieHellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;
短句来源
     This scheme can implement identity authentication and key verification for both participants when key exchanging,which can effectively withstand the man-in-the-middle attack and the replay attack from intruders and enhance the security and reliability of key exchange.
     在进行密钥交换时,该方案能同时实现通信双方的身份认证和交换密钥的一致性认证,有效地抵抗冒名者的中间攻击和入侵者的重放攻击,提高了密钥交换的安全性和可靠性。
短句来源
更多       
  相似匹配句对
     Internet Key Exchange
     IKE密钥交换
短句来源
     Internet Key Exchange Protocols on IPsec
     IPsec的Internet密钥交换
短句来源
     Exchange of Identity
     身份的交换
短句来源
查询“交换密钥”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  exchange keys
During this time, they exchange keys as well as negotiate protocols and algorithms.
      
Introducers are users of the system signing keys of other users, presumably friends or people they know and with whom they exchange keys face-to-face.
      
Some sort of authentication mechanism is necessary to ensure that you don't accidentally exchange keys with an attacker.
      
They decide to keep in contact, and at the end of the conference they exchange keys to securely communicate with each other.
      


The Internet Security Association and Key Management Protocol (ISAKMP) is an important protocol utilizing securityconcepts needed for establishing Security Associations and cryptographic keys between two or more hosts in a netwoTk. This paper putsforward our implement approach of ISAKMP in using IPSEC to construct secure Virtual Private Networks(VPN) at first, then describes howISAKMP/oakley protocols initially establish security associations and exchange keys during the first phrase between two systems that...

The Internet Security Association and Key Management Protocol (ISAKMP) is an important protocol utilizing securityconcepts needed for establishing Security Associations and cryptographic keys between two or more hosts in a netwoTk. This paper putsforward our implement approach of ISAKMP in using IPSEC to construct secure Virtual Private Networks(VPN) at first, then describes howISAKMP/oakley protocols initially establish security associations and exchange keys during the first phrase between two systems that wish tocommunicate securely in detail.

因特网安全关联与密钥管理协议ISAKMP是在两个或多个主机之间可靠的建立安全关联和加密密钥的一个重要协议。首先介绍了它在用IPSEC构建的虚拟专用网VPN中的作为密钢管理的实现框架,然后详细分析了两个希望安全通信的系统之间如何使用ISAKMP/Oakley协议在第一阶段建立安全关联和交换密钥的过程。

This paper discusses the importance of key management in PKI.At the same time,it presents a model of key management and management scheme of key,including the management of CA key,the management of server key,the management of exchange key,and the management of user key,etc.

论述了PKI体系中密钥管理的重要性,同时给出了密钥管理的体系结构模型,并给出了相应密钥的管理方案,包括CA根密钥的管理、服务器密钥的管理、交换密钥的管理以及用户密钥的管理等。

We present a new scheme for authenticated key exchange,the security of which is based on both discrete logarithm and big integer factorization.This scheme can implement identity authentication and key verification for both participants when key exchanging,which can effectively withstand the man-in-the-middle attack and the replay attack from intruders and enhance the security and reliability of key exchange.Especially,this scheme creates keys at random,hence overcomes the defect that the key is invariable...

We present a new scheme for authenticated key exchange,the security of which is based on both discrete logarithm and big integer factorization.This scheme can implement identity authentication and key verification for both participants when key exchanging,which can effectively withstand the man-in-the-middle attack and the replay attack from intruders and enhance the security and reliability of key exchange.Especially,this scheme creates keys at random,hence overcomes the defect that the key is invariable in Diffie-Hellman algorithm,the participants can generate a new key once they find the current key is leaked out in no need of changing any public data or private key.

提出一种基于身份认证的密钥交换新方案,其安全性是同时基于离散对数和大整数分解难问题的。在进行密钥交换时,该方案能同时实现通信双方的身份认证和交换密钥的一致性认证,有效地抵抗冒名者的中间攻击和入侵者的重放攻击,提高了密钥交换的安全性和可靠性。特别是,该方案的交换密钥具有随机性,克服了Diffie-Hellman方案中交换密钥固定不变的弱点;通信双方一旦发现当前交换密钥泄露,可生成一个新的交换密钥,而不需修改系统的任何公开数据和用户的密钥。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关交换密钥的内容
在知识搜索中查有关交换密钥的内容
在数字搜索中查有关交换密钥的内容
在概念知识元中查有关交换密钥的内容
在学术趋势中查有关交换密钥的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社