The Kerberos protocol is analyzed, and there is guessing attack defects. DH key exchange algorithm and public-key cryptosystem are introduced to Kerberos authentication protocol. 对Kerberos协议分析指出,协议存在猜测攻击的缺陷,提出将DH密钥交换算法(KEA)和公钥密码体制引入到Kerberos认证协议中。
Describes the key exchange algorithm based on the discrete logarithm problem of elliptic curve over Galois Field Gives the conditions to construct a secure elliptic curve crypto-system after analyzing the crisis of this crypto-system. 分析了椭圆曲线密码的安全性,给出了构造安全椭圆曲线的条件。
Secondly, the principle of ECC, including the math foundation and basic conception are expounded. Data encryption algorithm, key exchange algorithm and digital signature algorithm based on the elliptic curve encrypt scheme are analyzed. 其次详细论述了椭圆曲线密码体制的原理,包括相关的数学基础知识、基本概念,以及基于椭圆曲线密码体制的密钥交换、数据加密、数字签名算法。
The use of graphical topology transformation, improved key exchange algorithm and homotopy projection mapping completed the initial key into a dynamic password. 4. 运用图形的拓扑变换、改进的密钥交换算法(KEA)以及同伦投影映射完成初始密钥转换成动态口令。
A new method for securing transmission by use of DH ( Diffie-Hellman ) key exchange algorithm and DES ( Data Encryption Standard ) algorithm to transfer the DH parameters directly is presented. 该方法以明文方式传送DH密钥交换的参数,客户端和服务器端利用这些参数计算共知的密钥,并用该密钥对希望加密的数据进行DES加密。