- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
安全网关中密钥交换与3des加密算法实现研究密码学专业论文
AbstractAbstract
Abstract
Abstract
Now with the entry of information times,network has become a tie which closely links tens of thousands of people in every comer of the world.It extraordinary enables people to access network very soon at any place.The gradual fusion of heterogeneous
network has greatly promoted the introduction of IP technology into main part of GPRS
and UMTS,which not only marks the technology reform of packet switching,but also compels the whole network to be more open and accessible.In this condition,the entire network will suffer more risk of being attacked.Moreover it has affected the
development of e-commerce and urges the development of a service with higher safety. All in all,network safety is becoming worth paying more and more attention.
IP security(IPSec),one kind of very successful network security agreement,is under the IP level.Its union with IP protocol serves data Integrity,confidentiality, anti.replay attack,the authentication of data pool and SO on.It Can also assume
responsibility for the end—to—end IP safety Like other encryptions,it is indispensable for
IP Sec protocol to establish a sharing key between both sides in the period the data transmission.This establishment is subject to the definition of Internet key exchange in IP protoc01.Especially,3DES is defined as mandatory algorithm for data confidentiality.
3DES(Triple Data Encryption Standard),a group encryption algorithm,owns the
following merits:Its group length is 64bit,which Can effectively defense definite and exhaustive attack and make the next birthday with a group of ciphertext attack Success rate is only 0.5;The achievement of 1 68bit key length Can avoid the key’S exhaustive attack;It fully realizes infusion and mix of explicitness and key which Can offer resistance to the different and linear attack;Encryption and decryption operates simply, which is prone to be carried out by software and hardware;Data expansion is introduced
into homomorphism replacement and st
您可能关注的文档
- 复杂网壳结构静动力性能研究结构工程专业论文.docx
- 创业型企业高层管理团队行为整合与双元创新导向的关系研究企业管理专业论文.docx
- xbrl网络财务报告在我国应用存在的问题及对策探析会计学专业论文.docx
- 肺炎链球菌psaa抗原及其在结合疫苗中的应用微生物学专业论文.docx
- 高校心理咨询从业人员的胜任特征研究发展与教育心理学专业论文.docx
- 苯丙氨酸解氨酶传感器及检测系统研究测试计量技术及仪器专业论文.docx
- tl胶囊对中风后遗症的药效及机理研究中药学专业论文.docx
- 高职商务英语的需求分析外国语言文学;英语语言文学专业论文.docx
- 营改增对不同行业的影响研究会计专业论文.docx
- 高维数据挖掘中若干关键问题的分析计算机软件与理论专业论文.docx
- 基于写作风格特征的论文剽窃检查优化方法分析.docx
- 磁共振动脉自旋标记技术与动态对比增强技术对不同年龄肾功能肾脏形态学和血流量的评估影像医学与核医学专业论文.docx
- 从以线造型和以情运色看中国画的表现性美术学专业论文.docx
- 出口食品现代化管理系统的开发及应用研究软件工程专业论文.docx
- 使用与满足视角下的春雨医生app知识共享研究新闻与传播专业论文.docx
- 儿茶素类化合物高效可食载体的开发园艺专业论文.docx
- 北欧全纳教育的特色分析研究比较教育学专业论文.docx
- 法庭审判中模糊限制语的语用研究英语语言文学专业论文.docx
- uc安全多方计算模型及其典型应用研究计算机系统结构专业论文.docx
- 基金认购文件英译汉翻译实践报告英语笔译专业论文.docx
原创力文档


文档评论(0)