基于协议潜信道的密钥恢复机制及防范的分析-analysis of key recovery mechanism and prevention based on protocol latent channel.docxVIP
- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
基于协议潜信道的密钥恢复机制及防范的分析-analysis of key recovery mechanism and prevention based on protocol latent channel
AbstractSSL/TLSandSSHarecommonlyusedinsecurityfields,andtheyarethetwo mainsecurityprotocols.Butsomeonemaydoubtwhatsecurityleveltheprotocolcan be,whethertheyhaveaperfectdesign,whetherthesessionkeyusedforencryption andprotocolimplementationaresecure.Thesequestionsarethroughoutthispaper and act asan important clue.Firstly,Ihaveananalysis ofsecurityprotocol contents, thenaccordingto feathersshowninprotocol,IpresentmysolutiononhowtoimplementProtocol BasedHiddenKeyRecoveryandthisimplementationhasfourimportant characteristics: Unfilterable,inner-communication,real timerecovery,andhidden channels.Next,Iresearchanddiscussonthefeasibilityofthesolutions.Finallythe experimentresultsshowthere’sapossibilitythatthesessionkeyscanbeleaked throughthekeyrecovery,anditalsomeansthesesecurityprotocolimplementations arenotcreditable.Aftertheresearchonkeyrecoverysolutions,Imakeastudyof applicationproblemsbasedonthekeyrecovery.Ipresentthreewaysofhowtokeep awayfromkeyrecovery:ProxyBasedKeyRecoveryPrevention,OTPBasedKey RecoveryPrevention,and Protocol Feathers Based KeyRecoveryPrevention.Keywords:Protocol Based Hidden Key Key Recovery Unfilterable Real Time Key RecoveryPrevention目录目录第一章绪论..........................................................................................................11.1 引言.........................................................................................................11.2 研究背景.................................................................................................11.2.1 密钥托管技术介绍......................................................................11.2.2 密钥托管功能模块简介..............................................................21.2.3 密钥托管技术的应用..................................................................31.2.4 安全密钥托管的关键问题..........................................................31.3 研究意义.................................................................................................41.3.1 攻击者的威胁..............................................
您可能关注的文档
- 基于系统动力学的公租房融资风险评价及控制分析-risk assessment and control analysis of public rental housing financing based on system dynamics.docx
- 基于系统动力学的建筑节能市场分析及政策分析-market analysis and policy analysis of building energy conservation based on system dynamics.docx
- 基于系统动力学的酒店类上市公司经营预测分析-business forecasting analysis of listed hotel companies based on system dynamics.docx
- 基于系统动力学的和谐企业外部微观运行 机制研究---以邯钢为例-research on external micro-operation mechanism of harmonious enterprises based on system dynamics - taking handan iron and steel company as an example.docx
- 基于系统动力学的供应商粘性分析与应用-analysis and application of supplier's viscosity based on system dynamics.docx
- 基于系统动力学的矿区生态环境系统分析及应用-analysis and application of mining area ecological environment system based on system dynamics.docx
- 基于系统动力学的冷链物流库存控制模型分析-analysis of cold chain logistics inventory control model based on system dynamics.docx
- 基于系统动力学的煤炭项目经济评价系统动态仿真分析-dynamic simulation analysis of coal project economic evaluation system based on system dynamics.docx
- 基于系统动力学的民办高校财务预测仿真分析-simulation analysis of financial prediction in private colleges and universities based on system dynamics.docx
- 基于系统动力学的廉租住房运行机制仿真分析-simulation analysis of low-rent housing operation mechanism based on system dynamics.docx
- 基于协议隐马尔可夫模型的网络流量识别技术分析-analysis of network traffic identification technology based on protocol hidden markov model.docx
- 基于协整理论的r&d投入与经济增长之间协整关系研究-research on the cointegration relationship between r & d investment and economic growth based on cointegration theory.docx
- 基于协整模型的我国农产品期货市场价格发现功能分析-price discovery function analysis of agricultural products futures market in china based on cointegration model.docx
- 基于协整理论的内陆港口物流与经济增长关系分析——以重庆为例-analysis of the relationship between inland port logistics and economic growth based on cointegration theory - a case study of chongqing.docx
- 基于协整分析的地铁能源效率及其影响因素分析-analysis of subway energy efficiency and its influencing factors based on cointegration analysis.docx
- 基于协作分集的物理层网络编码技术分析-analysis of physical layer network coding technology based on cooperative diversity.docx
- 基于协作干扰的无线物理层安全传输策略分析-analysis of wireless physical layer secure transmission strategy based on cooperative interference.docx
- 基于协作学习的网络课程设计分析-analysis of online course design based on collaborative learning.docx
- 基于协作无线窃听信道安全通信与功率分配-secure communication and pow allocation based on cooperative wireless eavesdrop channel.docx
- 基于谐振式耦合无线电力传输系统分析-analysis of wireless pow transmission system based on resonant couple.docx
文档评论(0)