- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
外文翻译---NET Compact Framework嵌入式系统中的随机控制协议(CRP)
翻译部分英文原文Performance of the Controlled Randomness Protocol on .NET Compact Framework Embedded SystemsAbstract—The Controlled Randomness Protocol (CRP) for management of cryptographic keys is a method to improve the security level of secure communication protocols. We assess the performance of the CRP when implemented on embedded systems running the .NET Compact Framework. We present our findings from two different platforms: one smartphone running .NET Compact Framework 3.5 and one smartphone running .NET Compact Framework 4.0. Our assessment verifies that when implemented in the .NET Compact Framework, the controlled randomness protocol imposes a configurable and tolerable amount of overhead computation while it offers a significant security improvement compared to a conventional implementation of a key management protocol.I. INTRODUCTIONIn real world applications of cryptographic protocols, the key management problem refers to the life cycle management of cryptographic keys. It includes the necessary operations for key generation; distribution; storage; replacement and exchange; usage; and destruction [1]. In order to retain a specific security level, keys used in cryptographic algorithms and protocols must be periodically refreshed i.e., new keys are exchanged between communicating parties and old keys are replaced. These precautions ensure that only a specific amount of information is encrypted under the same key and thus, the exposure of information is minimized in case a key is leaked. Key agreement is the process by which two or more parties agree on a common cryptographic key for a specific timeframe. Key transport is the process by which the agreed key is transferred to the participants. In many scenarios, the two processes occur simultaneously: the participants exchange information by which they both set and exchange the key(s) to be used (or some parts of it). In many scenarios, the key agreement and transport occur as exchange of control messages through
您可能关注的文档
- 后张法预制箱梁施工质量控制要点 毕业论文.doc
- 同轴二级减速器课程设计----带式运输机传动装置设计.doc
- 后盖课程设计说明书.doc
- 吉林省松原市松原市宁江区同心医院建设项目.doc
- 吉林省松原市松原市中西医结合医院中医药传承创新工程建设项目.doc
- 后张法预留孔道灌浆材料性能的研究 毕业论文.doc
- 腔镜下手术医师的套路课件.ppt
- 吸血鬼文化 毕业论文.doc
- 后钢板弹簧吊耳毕业设计.doc
- 同城光电实习总结.doc
- 外文翻译---SQL服务器中的软件容错.doc
- 外文翻译---PLC变频调速的网络反馈系统的实现.doc
- 良性前列腺增生症及治疗 ppt课件.ppt
- 外文翻译---UC3879移相PWM控制器简化了零电压过渡全桥变换器的设计.docx
- 外文翻译---Ti6AL4V在挤压阶段的线性摩擦焊.doc
- 外文翻译---一种光伏系统最大功率点的控制系统.docx
- 外文翻译---一种基于Hibernate、Struts和Spring的J2EE应用开发框架.doc
- 外文翻译---一种基于带有特别的过滤和偏移调制的光栅投影的位移传感器.docx
- 外文翻译---一个逆变器在电梯门中控制两个永磁直线电动机.doc
- 外文翻译---一种新型使用永磁同步发电机和Z源逆变器的变速风力发电系统.doc
文档评论(0)