2918g密钥分散管理系统——密钥确认算法实现外文资料翻译--原文内容摘要:
red.One scheme has bee universally accepted for formatting publickey certificates: the standard. certificates are used in most network security applications, including IP security, secure sockets layer (SSL), secure electronic transactions (SET), and S/MIME, all of which are discussed in Part Two. is examined in detail in Chapter 14.Distribution of Secret Keys Using PublicKey CryptographyOnce public keys have been distributed or have bee accessible, secure munication that thwarts eavesdropping (Figure ), tampering (Figure ), or both (Figure ) is possible. However, few users will wish to make exclusive use of publickey encryption for munication because of the relatively slow data rates that can be achieved. Accordingly, publickey encryption provides for the distribution of secret keys to be used for conventional encryption.Simple Secret Key DistributionAn extremely simple scheme was put forward by Merkle [MERK79], as illustrated in Figure . If A wishes to municate with B, the following procedure is employed:1. A generates a public/private key pair {PUa, PRa} and transmits a message to B consisting of PUa and an identifier of A, IDA.2. B generates a secret key, Ks, and transmits it to A, encrypted with A39。 s public key.3. A putes D(PRa, E(PUa, Ks)) to recover the secret key. Because only A can decrypt the message, only A and B will know the identity of Ks.4. A discards PUa and PRa and B discards PUa.Figure . Simple Use of PublicKey Encryption to Establish a Session KeyA and B can now securely municate using conventional encryption and the session key Ks. At the pletion of the exchange, both A and B discard Ks. Despite its simplicity, this is an attractive protocol. No keys exist before the start of the munication and none exist after the pletion of munication. Thus, the risk of promise of the keys is minimal. At the same time, the munication is secure from eavesdropping.The protocol depicted in Figure is insecure against an adversary who can intercept messages and then either relay the intercepted message or substitute another message (see Figure ). Such an attack is known as a maninthemiddle attack [RIVE84]. In this case, if an adversary, E, has control of the intervening munication channel, then E can promise the munication in the following fashion without being detected:1. A generates a public/private key pair {PUa, PRa} and transmits a message intended for B consisting of PUa and an identifier of A, IDA.2. E intercepts the message, creates its own public/private key pair {PUe, PRe} and transmits PUe||IDA to B.3. B generates a secret key, Ks, and transmits E(PUe, Ks).4. E intercepts the message, and learns Ks by puting D(PRe, E(PUe, Ks)).5. E transmits E(PUa, Ks) to A.The result is that both A and B know Ks and are unaware that Ks has also been revealed to E. A and B can now exchange messages using Ks E no longer actively interferes with the munications channel but simply eavesdrops. Knowing Ks E can decrypt all messages, and both A and B are unaware of the problem. Thus, this simple protocol is only useful in an environment where the only threat is eavesdropping.Secret Key Distribution with Confidentiality and AuthenticationFigure , based on an approach suggested in [NEED78], provides protection against both active and passive attacks. We begin at a point when it is assumed that A and B have exchanged public keys by one of the schemes described earlier in this section. Then the following steps occur:1. A uses B39。 s public key to encrypt a message to B containing an identifier of A (IDA) and a nonce (N1), which is used to identify this transaction uniquely. 2. B sends a message to A encrypted with PUa and containing A39。 s nonce (N1) as well as a new nonce generated by B (N2) Because only B could have decrypted message (1), the presence of N1 in message (2) assures A that the correspondent is B.3. A returns N2 encrypted using B39。 s public key, to assure B that its correspondent is A.4. A selects a secret key Ks and sends M = E(PUb, E(PRa, Ks)) to B. Encryption of this message with B39。 s public key ensures that only B can read it。 encryption with A39。 s private key ensures that only A could have sent it.5. B putes D(PUa, D(PRb, M)) to recover the secret key.Figure . PublicKey Distribution of Secret KeysNotice that the first three steps of this scheme are the same as the last three steps of Figure . The result is that this scheme ensures both confidentiality and authentication in the exchange of a secret key.A Hybrid SchemeYet another way to use publickey encryption to distribute secret keys is a hybrid approach in use on IBM mainframes [LE93]. This scheme retains the use of a key distribution center (KDC) that shares a secret master key with each user and distributes secret session keys encrypted with the master key. A public key scheme is used to distribu。2918g密钥分散管理系统——密钥确认算法实现外文资料翻译--原文
相关推荐
将有利于学界形成对谶纬问题的正确认识。 然而,也应看到的是,前人之研究还存在着不足:其一,局部性,即多是着眼于谶纬对两汉政治、文学的某些构成要素之作用而开展研究,缺乏整体观 照;其二,片段性,多是着眼于谶纬对两汉之际的某一时段的政治形势或文学作品之影响而进行考察,缺乏对整个汉代的政治形变及文学演进的历时观照;其三,孤立性,即只是考察谶纬对两汉政治、文学的影响,较少涉及两汉政治、文学对谶纬之影响
流量 计 的准确度等 级 和基 本误 差 应 符合表 1的 规 定。 流量 计在 倍公 称压力下应 不 渗 漏和破 损。 4 校准用 标 准器具 电 子秤。 固定容 积 和重量的 铁 桶。 5 校准 项目 和校准方法 外 观检 查 新制造的流量 计 外表 应由 良好的表面 处 理, 无 可 见 的毛刺、划痕、裂 纹、锈蚀 或霉斑等缺陷。 各 项 指 标应 明 显 、清晰。 流量 计 的流体通道
....................... 47 违约责任 .....................................................................................................................................................................
和 B 就可利用传统密码和会话密钥 KA安全地通信。 密钥交换完成后,A和 B均 放弃 KA。 上述协议尽管简单,但却很诱人。 由于在通信前和通信完成后都没有密钥存在。 所 以密钥泄密的可能性最小,同时这种通信还可抗抗窃听攻击。 不过该协议容易受主动攻击。 如果攻击者 E能够控制通信信道。 那 么他可用下列方式对 通信造成危害但又不被发现 : 1. A 产生公 /私钥对 [PUa,PRa]
朝著名的 家。 ( 2 分) 解释加点的字。 ( 4 分) ( 1)虽( )有千里之能 ( 2)不以( )千里称也。 ( 3)才美不外见( ) ( 4)其( )真无马邪。 翻译下面的句子。 ( 4 分) ( 1)安求其能千里也。 ( 2)其真无马邪。 其真不知马也。 造成千里马“欲与常 马等不可得”的原因是“ ”(用原文回答)( 2 分) 1文中的“千里马”比喻 ,“伯乐”比喻 ( 2 分)
. 在 合 同 执 行 过 程 中 , 按 照 技 术 协 议 的 要 求 , 有 一 项 技 术 指 标 未 达 到 要 求 的 或 未 按 协 议 要 求 内 容执 行 , 扣 除 乙 方 工 程 款 5000 元 整 , 并 进 行 返 工。 . 在 检 修 期 及 质 量 保 证 期 内 , 若 发 生 因 乙 方 施 工 原 因 而 引 起 的 事 故 , 每 发 生 一 次 , 乙