Welcome![Sign In][Sign Up]
Location:
Search - key distribution

Search list

[Crack Hack5365212977

Description: 素数生成算法,用于生成公共密钥,CA分配公共密钥。-prime number generation algorithm used to generate the public key, CA public key distribution.
Platform: | Size: 162566 | Author: liang | Hits:

[OtherStrand

Description: 提出了Strand空间模型中证明安全协议的一个新思路,它从安全密钥的概念出发,参照基于理想概念的 证明方法,得出证明所需的预备结论,从而对协议的秘密属性与认证属性进行证明。此外,还给出了一个针对 Yahalom.BAN协议安全性的证明实例,从中可以看到该思路非常适于采用对称加密体制且具有密钥分发功能的三 方认证协议的证明,并且它还使得证明过程简洁而直观。-the Strand space model to prove the safety of a new agreement ideas, Key it from the concept of security, based on the ideal reference to the concept of proof, and obtain certification preparation conclusions, so secret agreement on the attributes and authentication attributes proved. It also gives an address Yahalom. BAN agreement safety of examples, One can see it very suitable for the use of symmetric encryption system and has key distribution function of the tripartite agreement proved certification , which also makes the certification process simple and intuitive.
Platform: | Size: 199243 | Author: 韩超 | Hits:

[Crack Hack5365212977

Description: 素数生成算法,用于生成公共密钥,CA分配公共密钥。-prime number generation algorithm used to generate the public key, CA public key distribution.
Platform: | Size: 161792 | Author: liang | Hits:

[OtherStrand

Description: 提出了Strand空间模型中证明安全协议的一个新思路,它从安全密钥的概念出发,参照基于理想概念的 证明方法,得出证明所需的预备结论,从而对协议的秘密属性与认证属性进行证明。此外,还给出了一个针对 Yahalom.BAN协议安全性的证明实例,从中可以看到该思路非常适于采用对称加密体制且具有密钥分发功能的三 方认证协议的证明,并且它还使得证明过程简洁而直观。-the Strand space model to prove the safety of a new agreement ideas, Key it from the concept of security, based on the ideal reference to the concept of proof, and obtain certification preparation conclusions, so secret agreement on the attributes and authentication attributes proved. It also gives an address Yahalom. BAN agreement safety of examples, One can see it very suitable for the use of symmetric encryption system and has key distribution function of the tripartite agreement proved certification , which also makes the certification process simple and intuitive.
Platform: | Size: 198656 | Author: 韩超 | Hits:

[SCM1

Description: 无线键盘的四个译码输出口从低到高依次对应于P1口的低四位 下面是无线键盘的键值分布 8 4 2 1 码输出; 返回的直接就是键值 (很好用)-Wireless keyboard four decoding output from low to high in turn corresponds to the P1 population is below the low of four key distribution of wireless keyboard 8 4 2 1 Code output return to direct is key (well used)
Platform: | Size: 1024 | Author: 张寒枫 | Hits:

[Crack Hackjava_encrypt_decrypt

Description: 1、利用公钥密码技术实现对称密码技术密钥的分配; 2、利用所分配的对称密钥对通信内容进行加/解密; -1, the use of public key cryptographic techniques to achieve symmetric cryptography key distribution 2, using the symmetric key by the distribution of the content of communication encryption/decryption
Platform: | Size: 17408 | Author: 张海滨 | Hits:

[Crack HackTinyKeyMan

Description: 无线传感器密钥管理算法,基于多项式的密钥预分布算法,采用RC5加密算法-Wireless sensor key management algorithm, polynomial-based key pre-distribution algorithm, the use of RC5 encryption algorithm
Platform: | Size: 44032 | Author: bidyy | Hits:

[Technology ManagementTCP-vegas

Description: 一篇关于TCP-Vegas的文献:Vegas is an implementation of TCP that achieves between 37 and 71% better throughput on the Internet, with onefifth to one-half the losses, as compared to the implementation of TCP in the Reno distribution of BSD Unix. This paper motivates and describes the three key techniques employed by Vegas, and presents the results of a comprehensive experimental performance study—using both simulations and measurements on the Internet—of the Vegas and Reno implementations of TCP.-TCP-Vegas on a literature: Vegas is an implementation of TCP that achieves between 37 and 71 better throughput on the Internet, with onefifth to one-half the losses, as compared to the implementation of TCP in the Reno distribution of BSD Unix. This paper motivates and describes the three key techniques employed by Vegas, and presents the results of a comprehensive experimental performance study-using both simulations and measurements on the Internet-of the Vegas and Reno implementations of TCP.
Platform: | Size: 240640 | Author: 廖琦 | Hits:

[Crack HackProjectReport

Description: Self Healing Key Distribution With Revocation
Platform: | Size: 6144 | Author: Farhan | Hits:

[Grid ComputingSignData

Description: 1、实现集中式对称密钥的分配工作(作为通讯的双方A和B,都已经分别和KDC拥有会话密钥); 2、分布式对称密钥分配(作为通讯的双方A和B已经共享一个会话主密钥); 3、公钥密码技术实现对称密码技术密钥的分配(作为通讯的双方A和B已经拥有对方的公钥);-1, the realization of a centralized allocation of symmetric key (for communication between the parties A and B, respectively, and the KDC already has a session key) 2, Distributed symmetric key distribution (as communications between the parties A and B have to share a session master key) 3, public key cryptographic techniques to achieve symmetric cryptography key distribution (for communication between the parties A and B have each other' s public key)
Platform: | Size: 31744 | Author: liu | Hits:

[Otherkeydistributionsystemcoding

Description: key distribution based on identification
Platform: | Size: 41984 | Author: suresh | Hits:

[Crack Hack11

Description: 完成基于公钥证书的非对称密钥分配工作 说明: (1)作为通讯的双方A和B,都有一个共同信赖的第三方CA,由CA为每个人生成公钥证书和相应的私钥并分发给A、B。 (2)A和B分别将自己的公钥证书提供给对方后,分别在本地验证对方公钥证书是否可靠(假定A、B已经获得CA的公钥),然后A用B的公钥加密一个数据X(整型,可自己定义,比如100)并发送给B,B用自己的私钥解密后得到数据X,然后按协商好的函数F(比如F(X)=2*X)计算得到F(X),再利用A的公钥加密后发送给A;A在本地用自己的私钥解密后得到F(x),在同本地计算得到的F(X)进行对比,如果一致,说明公钥分配成功。 (3)A用B的公钥对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T1;-Complete the asymmetric public key certificate-based key distribution work Description: (1) as the communication of both A and B, have a common trusted third party CA, the CA generates a public key certificate for each person and the corresponding private key and distributed to A, B. (2) A and B respectively to provide their own public key certificates to each other both in the local verify the reliability of each other s public key certificate (assuming A, B has received CA s public key), then A with B s public key encryption 1 the data X (integer, can be their own definition, such as 100) and send it to B, B with their own private key decrypted by the data X, and then consult a good function by F (eg F (X) = 2* X) calculated F (X), then encrypted using A s public key sent to A A locally with their own private key to decrypt obtained F (x), calculated with the local F (X) are compared, if the same description Successful public-key distribution. (3) A with B s public key on an
Platform: | Size: 71680 | Author: 熊龙生 | Hits:

[Crack Hack22

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2;-Completion of asymmetric cryptography based on symmetric key distribution work Description: (1) the completion of the asymmetric public key certificate-based key distribution based on the work, according to the materials on asymmetric cryptography based on symmetric key distribution scheme, the completion of the allocation of symmetric key Ks. (2) A document with Ks on an image (test_pig.bmp) is encrypted and sent to B, B to decrypt receipt, compared to the original image to see if the same, and record the entire encryption/decryption time spent T2 (3) contrast T1 and T2
Platform: | Size: 43008 | Author: 熊龙生 | Hits:

[Crack HackrsaPrj

Description: 分析了RSA算法的安全性在以及在实际使用过程中遇到的问题。还有在RSA算法使用到的参数的选择。在VC++工具上测试,并对测试结果进行分析总结。最后给出了用C语言编写的程序实现了该算法。-SRA public key cryptography key distribution in an asymmetric cryptosystem
Platform: | Size: 287744 | Author: cqy | Hits:

[SCMV1_3

Description: 1.5位数码管显示,静态驱动 * 2.定是功能(设定时||分||秒,到时间报警) * 3.锁定,清除,断电记忆功能 * 4.按键加一功能&&嗡鸣器响一声 * 5.接口可扩展如:感应,轻触开关 * 6.采用显示板&主板分开(如果能做成一块板也可以,元件可以放在显示板后面) * 7.外发制作PCB,耐用 * 8.键值分布:(从下往上) * K1--“-”,K2--“+”,K3--“清零/时间调整”,K4--“功能键” * 模式说明:共4个模式分别为,计数模式,-1.5 digital display, the static drive* 2. Be functional (settings | | hours | | seconds, the time alarm)* 3. Lock, clear, power-off memory function* 4. Button-plus-one device function & & Buzz sounds for* 5. interface can be extended, such as: sensors, touch switch* 6. using separate display board & board (if they can also be made of a board, components can be placed behind the display)* 7. outsourced production of PCB, durable* 8. key distribution: (from bottom to top)* K1- " -" , K2- " +" , K3- " clear/time adjustment" , K4- " function keys" * Mode Description : A total of four models, respectively, counting mode,
Platform: | Size: 74752 | Author: chen | Hits:

[matlabsift

Description: 经典的SIFT算法,第一步,选择感兴趣的点;第二步,对感兴趣点进行筛选,确定关键点;第三步,为关键点分配方向;第四步,用多维向量的形式描述关键点-Classical SIFT algorithm, the first step, select the point of interest second step, points of interest were screened to identify key points the third step, the key point for the distribution of direction The fourth step is described with the key in the form of multi-dimensional vector point
Platform: | Size: 817152 | Author: jennyyu | Hits:

[Crack HackCentralized-symmetric-key

Description: 完成集中式对称密钥的分配工作 说明:作为通讯的双方A和B,都已经分别和KDC拥有会话密钥Ka和Kb,但A、B之间事先没有保密通道,需要依赖KDC为它们的会话分配临时密钥Ks。在完成会话密钥Ks的分配后,A利用Ks对特定文件(test-1.txt)进行加密,并发送给B;B利用Ks对密文进行解密,并对比解密后的明文信息同原来的文件是否一致。 要求: (1)JAVA语言编程实现,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一文本文件(test-1.txt); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上,KDC可以部署在其中一台主机上或第三台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于KDC的集中式密钥分配方案为参考,完成从步骤1到步骤5的全过程;-Complete centralized allocation symmetric key Description: As a communication between the parties A and B, respectively, and the KDC already has a session key Ka and Kb, but the A, B no secret passage between the advance, they need to rely on the KDC allocate temporary session key Ks. Upon completion of the session key Ks allocation, A Ks on the use of a specific file (test-1.txt) is encrypted and sent to B B use Ks decrypt the ciphertext, and compare the decrypted plaintext message with the original files are consistent. Requirements: (1) JAVA programming language, based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported) (2) the content of communications as a text file (test-1.txt) (3) complete network-based key distribution job (as the communication between the parties A, B should be deployed on both hosts, KDC can be deployed on one host or a third host) (4) are allocated once a secret symmetric key ra
Platform: | Size: 4096 | Author: 丁元元 | Hits:

[Crack HackSymmetric-key-cryptography

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程; -Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Platform: | Size: 45056 | Author: 丁元元 | Hits:

[Crack HackRSA-Symmetric-key

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;-Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Platform: | Size: 15360 | Author: 丁元元 | Hits:

[Program docSURVEY-AUTHENTICATION-AND-KEY-DISTRIBUTION-SCHEME

Description: it is a document that describe key management in wireless sensor network
Platform: | Size: 358400 | Author: ali | Hits:
« 12 3 4 5 6 7 »

CodeBus www.codebus.net