Welcome![Sign In][Sign Up]
Location:
Search - key exchange protocol

Search list

[File Operateipsec vpn相关rfc集

Description: IPsec VPN的RFC文档集合: RFC 2401 《Security Architecture for the Internet Protocol》 RFC 2402 《IP Authentication Header》 RFC 2406 《IP Encapsulating Security Payload (ESP)》 RFC 2407 《The Internet IP Security Domain of Interpretation for ISAKMP》 RFC 2408 《Internet Security Association and Key Management Protocol (ISAKMP)》 RFC 2409 《The Internet Key Exchange (IKE)》 RFC 3947 《Negotiation of NAT-Traversal in the IKE》 RFC 3948 《UDP Encapsulation of IPsec ESP Packets》 -IPsec VPN RFC documentation set : RFC 2401, "Security Architecture for the Internet Protocol" RFC 2402 "IP Authentication Header" RFC 2406, "IP VPN Security PayloadPlus (ESP)," RFC 2407, "The Internet IP Security Domain of Interpretation for ISAKMP" RFC 2408 "Internet Security Association and Key Management Protocol (ISAKMP)," RFC 2409, "The Internet Key Exchange (IKE)," RFC 3947 "Negotiation of NAT-Traversal in the IKE" RFC 3948 "UDP Encapsulation of IPsec ESP Packets"
Platform: | Size: 174094 | Author: 水易清 | Hits:

[File Formatipsec vpn相关rfc集

Description: IPsec VPN的RFC文档集合: RFC 2401 《Security Architecture for the Internet Protocol》 RFC 2402 《IP Authentication Header》 RFC 2406 《IP Encapsulating Security Payload (ESP)》 RFC 2407 《The Internet IP Security Domain of Interpretation for ISAKMP》 RFC 2408 《Internet Security Association and Key Management Protocol (ISAKMP)》 RFC 2409 《The Internet Key Exchange (IKE)》 RFC 3947 《Negotiation of NAT-Traversal in the IKE》 RFC 3948 《UDP Encapsulation of IPsec ESP Packets》 -IPsec VPN RFC documentation set : RFC 2401, "Security Architecture for the Internet Protocol" RFC 2402 "IP Authentication Header" RFC 2406, "IP VPN Security PayloadPlus (ESP)," RFC 2407, "The Internet IP Security Domain of Interpretation for ISAKMP" RFC 2408 "Internet Security Association and Key Management Protocol (ISAKMP)," RFC 2409, "The Internet Key Exchange (IKE)," RFC 3947 "Negotiation of NAT-Traversal in the IKE" RFC 3948 "UDP Encapsulation of IPsec ESP Packets"
Platform: | Size: 174080 | Author: 水易清 | Hits:

[JSP/JavaDiffie-Hellman

Description: 用java写的Diffie-Hellman密钥交换协议-Using java to write the Diffie-Hellman key exchange protocol
Platform: | Size: 5120 | Author: 赵欢 | Hits:

[USB developUSB_system

Description: 中文摘要 通用串行总线USB 是PC 体系中的一套全新的工业标准它支持单 个主机与多个外设同时进行数据交换 论文首先会介绍USB 的体系结构和特点包括总线特征协议定义 传输方式和电源管理等等这部分内容会使USB 开发者和用户对USB 有一 个整体的认识 接下来论文会讨论USB 系统的一般开发方法和技术特点分设备端硬 件设备端软件和主机端软件三个部分 然后论文会介绍几个USB 项目的研发过程和技术细节包括USB 手写 识别输入系统USB 通用设备开发平台USB 安全钥和USB 在线编程设备等 等论文会详细介绍USB 设备的硬件和软件开发的技术细节包括USB 设 备协议栈的编写方法同时也会讨论在Windows 98 下开发USB 内核驱动程 序和用户应用程序的一般方法 论文最后还会介绍Motorola 的一些相关开发技术主要是在线编程技 术 论文对广大的USB 设备开发人员和技术人员具备较高的参考价值可 以帮助他们尽快掌握USB 设备的特点以及硬件电路设计和软件编程中的 注意事项 关键字通用串行总线 微控制器 协议栈 设备驱动程序 在线编 程-Abstract The Universal Serial Bus USB is specified to be an industry standard extension to the PC architecture. USB is a serial cable bus that supports data exchange between a host computer and a wide range of simultaneously accessible peripherals. First, the thesis describes the architecture and features of USB, including the bus attributes, the protocol definition, types of transactions, power management, and so on. It tries to give developers and users a snapshot of USB. After that, the thesis will talk about how to develop the USB system, including: device hardware, device software and host software. Then the thesis describes some development and technique details of several USB projects: USB tablet, USB univeral development tool, USB security key and USB ISP (In System Program) device. I will give you the details of the hardware and software design of device, including how to write USB device protocol stack, and talk about the kernel drivers and user program in Win
Platform: | Size: 991232 | Author: zhangheng | Hits:

[Crack Hackdiffie_hellman

Description: Diffie-Hellman 密钥交换协议算法。真实模拟,可以实际运行。-Diffie-Hellman key exchange protocol algorithm. The real simulation, can actually run.
Platform: | Size: 3072 | Author: dong | Hits:

[Windows DevelopDiffie-Hellman-Key-Exchange-Example

Description: DH密钥交换协议实现,完成建立相同密钥的过程-key exchange protocol implement
Platform: | Size: 2589696 | Author: runyeo | Hits:

[SCMrfc5106.txt

Description: This document specifies EAP-IKEv2, an Extensible Authentication Protocol (EAP) method that is based on the Internet Key Exchange (IKEv2) protocol. EAP-IKEv2 provides mutual authentication and session key establishment between an EAP peer and an EAP server. It supports authentication techniques that are based on passwords, high-entropy shared keys, and public key certificates. EAP-IKEv2 further provides support for cryptographic ciphersuite negotiation, hash function agility, identity confidentiality (in certain modes of operation), fragmentation, and an optional "fast reconnect" mode. Tschofenig, et al. Experimental [Page 1]
Platform: | Size: 37888 | Author: 歪歪 | Hits:

[CA authNeedham

Description: Needham 协议 简单的公钥和私钥的交换以及authentication-Needham simple protocol exchange, and public and private key authentication
Platform: | Size: 25600 | Author: teddi | Hits:

[OS programathenasslciphercheck

Description: 用于探测网站是否使用了ssl协议,以及具体用到了哪种加密算法和密钥交换算法-Used to detect whether the site uses ssl protocol, as well as specific uses which encryption algorithms and key exchange algorithm
Platform: | Size: 30720 | Author: 张生 | Hits:

[Industry researchharaksingh

Description: The Diffie Hellman Key Exchange Protocol and its relationship to the Elliptic Curve Discrete Logarithm Problem
Platform: | Size: 197632 | Author: kairazor | Hits:

[Otherpriroot1

Description: 此为用C++实现的基于密钥交换协议先进行ECC签名认证,进而加入时间标签的程序。-This is a C++-based the first ECC signature verification key exchange protocol, and then added to the time stamp program
Platform: | Size: 3224576 | Author: wang | Hits:

[Crack HackDiffieHellman

Description: 理解 Diffie-Hellman 密钥交换协议的基本思想。了解Diffie-Hellman 密钥交换协议的基本步骤。模拟实现简单的Diffie-Hellman 密钥交换协议过程。 -Understanding Diffie-Hellman key exchange protocol the basic idea. Learn Diffie-Hellman key exchange protocols basic steps. Simulation to achieve a simple Diffie-Hellman key exchange protocol process.
Platform: | Size: 4018176 | Author: 陈烁 | Hits:

[Crack HackBSI_EAC-Worked-Example

Description: 口令认证密钥交换协议的一种扩展访问控制机制,包含详细的源码-An extended access control mechanisms password authentication key exchange protocol contains a detailed source
Platform: | Size: 1398784 | Author: 范春鹏 | Hits:

[JSP/JavaDHPrivateKey

Description: The interface for a private key in the Diffie-Hellman key exchange protocol.
Platform: | Size: 1024 | Author: difaoneng | Hits:

[JSP/JavaDHPublicKey

Description: The interface for a public key in the Diffie-Hellman key exchange protocol.
Platform: | Size: 9216 | Author: runruijai | Hits:

[OtherDH

Description: Diffie-Hellman:一种确保共享KEY安全穿越不安全网络的方法,它是OAKLEY的一个组成部分。Whitefield与Martin Hellman在1976年提出了一个奇妙的密钥交换协议,称为Diffie-Hellman密钥交换协议/算法(Diffie-Hellman Key Exchange/Agreement Algorithm).这个机制的巧妙在于需要安全通信的双方可以用这个方法确定对称密钥。然后可以用这个密钥进行加密和解密。但是注意,这个密钥交换协议/算法只能用于密钥的交换,而不能进行消息的加密和解密。双方确定要用的密钥后,要使用其他对称密钥操作加密算法实际加密和解密消息。-DH Protocol source code
Platform: | Size: 1024 | Author: jfj | Hits:

[Software EngineeringSM2_PART3

Description: SM2椭圆曲线公钥密码算法 第3部分:密钥交换协议-SM2 elliptic curve public key cryptography algorithm Part 3: Key Exchange Protocol
Platform: | Size: 330752 | Author: 章章 | Hits:

[Otherthe-original-root-

Description: 实验目的 原根与指标是解高次同余式的基础。在密码学中的Diffe-Hellman密钥交换协议、ElGamal公钥密码体制,以及其他许多密码协议和数字签名方案中都会用到原根及其性质。 实验内容与要求 求模n=43的最小原根,并建立其关于模43的指标表,将指标表写入g.txt中。 -Purpose and targets of the original root is the solution of high-order congruence basis. In cryptography Diffe-Hellman key exchange protocol, ElGamal public key cryptosystem, and many other cryptographic protocols and digital signature schemes will be used and the nature of the original root. Experimental content and requirements modulo n = minimum original root 43, and to establish its index table modulo 43, the index table in written g.txt.
Platform: | Size: 1024 | Author: lei | Hits:

[Program docpaper1

Description: 基于RSA的网关口令认证密钥交换协议的分析与改进-Analysis and improvement of the key exchange protocol based on RSA
Platform: | Size: 746496 | Author: xiaowang | Hits:

[CA authdiffie_hellman

Description: Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number mod p. Now generate A, which is g raised to the a power mod p i.e. A = (ga) mod p . 3. Do the step 2 for b and B. 4. A and B are public keys. Generate a session key with them set s1 to B raised to the a power mod p so s1 = (Ba) mod p. 5. Do the step 4 with A and b i.e. (Ab) mod p = s2. 6. check the correctness i.e. check whether you came up with the s1 == s2. (b) Write a program to demonstrate the man in the middle attack is possible using an example. You can perform set up as described in the above problem.-Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number mod p. Now generate A, which is g raised to the a power mod p i.e. A = (ga) mod p . 3. Do the step 2 for b and B. 4. A and B are public keys. Generate a session key with them set s1 to B raised to the a power mod p so s1 = (Ba) mod p. 5. Do the step 4 with A and b i.e. (Ab) mod p = s2. 6. check the correctness i.e. check whether you came up with the s1 == s2. (b) Write a program to demonstrate the man in the middle attack is possible using an example. You can perform set up as described in the above problem.
Platform: | Size: 1024 | Author: jitender grover | Hits:
« 12 »

CodeBus www.codebus.net