您要查找的是不是:
- 通过使用基于HMACSHA1的伪随机数生成器,实现基于密码的密钥派生功能(PBKDF2)。Implements password-based key derivation functionality, PBKDF2, by using a pseudo-random number generator based on HMACSHA1.
- 在基于密码的密钥派生功能中,基本密钥是一个密码,其他参数是一个salt值和一个迭代次数。In a password-based key derivation function, the base key is a password and the other parameters are a salt value and an iteration count.
- 通过Internet激活时,您的产品ID(从安装产品密钥派生)将以加密传输的形式发送给Microsoft。When you activate via the Internet, your product ID (derived from the installation product key) is sent to Microsoft through an encrypted transfer.
- 派生函数generating function
- 密钥key
- 取得派生函数的数学过程。the mathematical process of obtaining the derivative of a function.
- 密thick
- 基于单向函数树的高效分布式组密钥管理方案Efficient distributed group key management scheme using a one-way function tree
- 公开密钥和秘密密钥是基于一对想截获报文的人不知道的非常大的素数。The public and private keys are based on a pair of very large prime numbers that are not known by anyone intercepting the message.
- 基于门限单向函数的组播密钥管理方案Key management scheme for secure multicast based on threshold and one-way function
- 但是,在传输小红的公钥期间,未经授权的代理可能截获该密钥。During the transmission of Alice's public key, however, an unauthorized agent might intercept the key.
- 利用40位密钥的RC2或RC4的多数应用获得出口许可证将没有多大困难。Most applications using RC2 or RC4 with a 40 bit key will receive an export license with little difficulty.
- 您可以将用于创建受信任公共证书的专用密钥存储在一个安全的中央位置。You can store the private key used to create trusted public certificates in a secure central location.
- IPSec安全协议共包括AH协议、ESP协议以及进行自动密钥交换的IKE协议(可选)。IPSec security protocols include AH protocol, ESP protocol and IKE protocol which can finish security key exchange automatically (optional). The contribution of the thesis involves:
- 使用该系统,未经授权的用户有可能知道的公共消息标头将无法用于对密钥进行反向工程。Using this system, common message headers that might be known to an unauthorized user cannot be used to reverse engineer a key.
- 基于双混沌系统的带秘密密钥散列函数构造Design keyed Hash function based on couple chaotic system
- 子密钥subkey
- 副密钥assistant key
- 密钥管理key management
- 密钥量size of key