Description: IPsec VPN的RFC文档集合:
RFC 2401 《Security Architecture for the Internet Protocol》
RFC 2402 《IP Authentication Header》
RFC 2406 《IP Encapsulating Security Payload (ESP)》
RFC 2407 《The Internet IP Security Domain of Interpretation for ISAKMP》
RFC 2408 《Internet Security Association and Key Management Protocol (ISAKMP)》
RFC 2409 《The Internet Key Exchange (IKE)》
RFC 3947 《Negotiation of NAT-Traversal in the IKE》
RFC 3948 《UDP Encapsulation of IPsec ESP Packets》
-IPsec VPN RFC documentation set : RFC 2401, "Security Architecture for the Internet Protocol" RFC 2402 "IP Authentication Header" RFC 2406, "IP VPN Security PayloadPlus (ESP)," RFC 2407, "The Internet IP Security Domain of Interpretation for ISAKMP" RFC 2408 "Internet Security Association and Key Management Protocol (ISAKMP)," RFC 2409, "The Internet Key Exchange (IKE)," RFC 3947 "Negotiation of NAT-Traversal in the IKE" RFC 3948 "UDP Encapsulation of IPsec ESP Packets" Platform: |
Size: 174094 |
Author:水易清 |
Hits:
Description: IPsec VPN的RFC文档集合:
RFC 2401 《Security Architecture for the Internet Protocol》
RFC 2402 《IP Authentication Header》
RFC 2406 《IP Encapsulating Security Payload (ESP)》
RFC 2407 《The Internet IP Security Domain of Interpretation for ISAKMP》
RFC 2408 《Internet Security Association and Key Management Protocol (ISAKMP)》
RFC 2409 《The Internet Key Exchange (IKE)》
RFC 3947 《Negotiation of NAT-Traversal in the IKE》
RFC 3948 《UDP Encapsulation of IPsec ESP Packets》
-IPsec VPN RFC documentation set : RFC 2401, "Security Architecture for the Internet Protocol" RFC 2402 "IP Authentication Header" RFC 2406, "IP VPN Security PayloadPlus (ESP)," RFC 2407, "The Internet IP Security Domain of Interpretation for ISAKMP" RFC 2408 "Internet Security Association and Key Management Protocol (ISAKMP)," RFC 2409, "The Internet Key Exchange (IKE)," RFC 3947 "Negotiation of NAT-Traversal in the IKE" RFC 3948 "UDP Encapsulation of IPsec ESP Packets" Platform: |
Size: 174080 |
Author:水易清 |
Hits:
Description: 中文摘要
通用串行总线USB 是PC 体系中的一套全新的工业标准它支持单
个主机与多个外设同时进行数据交换
论文首先会介绍USB 的体系结构和特点包括总线特征协议定义
传输方式和电源管理等等这部分内容会使USB 开发者和用户对USB 有一
个整体的认识
接下来论文会讨论USB 系统的一般开发方法和技术特点分设备端硬
件设备端软件和主机端软件三个部分
然后论文会介绍几个USB 项目的研发过程和技术细节包括USB 手写
识别输入系统USB 通用设备开发平台USB 安全钥和USB 在线编程设备等
等论文会详细介绍USB 设备的硬件和软件开发的技术细节包括USB 设
备协议栈的编写方法同时也会讨论在Windows 98 下开发USB 内核驱动程
序和用户应用程序的一般方法
论文最后还会介绍Motorola 的一些相关开发技术主要是在线编程技
术
论文对广大的USB 设备开发人员和技术人员具备较高的参考价值可
以帮助他们尽快掌握USB 设备的特点以及硬件电路设计和软件编程中的
注意事项
关键字通用串行总线 微控制器 协议栈 设备驱动程序 在线编
程-Abstract
The Universal Serial Bus USB is specified to be an industry standard
extension to the PC architecture. USB is a serial cable bus that supports data
exchange between a host computer and a wide range of simultaneously
accessible peripherals.
First, the thesis describes the architecture and features of USB, including
the bus attributes, the protocol definition, types of transactions, power
management, and so on. It tries to give developers and users a snapshot of
USB.
After that, the thesis will talk about how to develop the USB system,
including: device hardware, device software and host software.
Then the thesis describes some development and technique details of
several USB projects: USB tablet, USB univeral development tool, USB
security key and USB ISP (In System Program) device. I will give you the
details of the hardware and software design of device, including how to write
USB device protocol stack, and talk about the kernel drivers and user program
in Win Platform: |
Size: 991232 |
Author:zhangheng |
Hits:
Description: This document specifies EAP-IKEv2, an Extensible Authentication
Protocol (EAP) method that is based on the Internet Key Exchange
(IKEv2) protocol. EAP-IKEv2 provides mutual authentication and
session key establishment between an EAP peer and an EAP server. It
supports authentication techniques that are based on passwords,
high-entropy shared keys, and public key certificates. EAP-IKEv2
further provides support for cryptographic ciphersuite negotiation,
hash function agility, identity confidentiality (in certain modes of
operation), fragmentation, and an optional "fast reconnect" mode.
Tschofenig, et al. Experimental [Page 1] Platform: |
Size: 37888 |
Author:歪歪 |
Hits:
Description: 用于探测网站是否使用了ssl协议,以及具体用到了哪种加密算法和密钥交换算法-Used to detect whether the site uses ssl protocol, as well as specific uses which encryption algorithms and key exchange algorithm Platform: |
Size: 30720 |
Author:张生 |
Hits:
Description: The Diffie Hellman Key Exchange Protocol and its relationship to the Elliptic Curve
Discrete Logarithm Problem Platform: |
Size: 197632 |
Author:kairazor |
Hits:
Description: 此为用C++实现的基于密钥交换协议先进行ECC签名认证,进而加入时间标签的程序。-This is a C++-based the first ECC signature verification key exchange protocol, and then added to the time stamp program Platform: |
Size: 3224576 |
Author:wang |
Hits:
Description: 实验目的
原根与指标是解高次同余式的基础。在密码学中的Diffe-Hellman密钥交换协议、ElGamal公钥密码体制,以及其他许多密码协议和数字签名方案中都会用到原根及其性质。
实验内容与要求
求模n=43的最小原根,并建立其关于模43的指标表,将指标表写入g.txt中。
-Purpose and targets of the original root is the solution of high-order congruence basis. In cryptography Diffe-Hellman key exchange protocol, ElGamal public key cryptosystem, and many other cryptographic protocols and digital signature schemes will be used and the nature of the original root. Experimental content and requirements modulo n = minimum original root 43, and to establish its index table modulo 43, the index table in written g.txt. Platform: |
Size: 1024 |
Author:lei |
Hits:
Description: 基于RSA的网关口令认证密钥交换协议的分析与改进-Analysis and improvement of the key exchange protocol based on RSA Platform: |
Size: 746496 |
Author:xiaowang |
Hits:
Description: Implement Diffie-Hellman Key exchange protocol and demonstrate that at the
end, both person will have a common Key.
Do the following:
1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5).
2. Generate a, a random number mod p. Now generate A, which is g raised to
the a power mod p i.e. A = (ga) mod p .
3. Do the step 2 for b and B.
4. A and B are public keys. Generate a session key with them set s1 to B raised
to the a power mod p so s1 = (Ba) mod p.
5. Do the step 4 with A and b i.e. (Ab) mod p = s2.
6. check the correctness i.e. check whether you came up with the s1 == s2.
(b) Write a program to demonstrate the man in the middle attack is possible using
an example. You can perform set up as described in the above problem.-Implement Diffie-Hellman Key exchange protocol and demonstrate that at the
end, both person will have a common Key.
Do the following:
1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5).
2. Generate a, a random number mod p. Now generate A, which is g raised to
the a power mod p i.e. A = (ga) mod p .
3. Do the step 2 for b and B.
4. A and B are public keys. Generate a session key with them set s1 to B raised
to the a power mod p so s1 = (Ba) mod p.
5. Do the step 4 with A and b i.e. (Ab) mod p = s2.
6. check the correctness i.e. check whether you came up with the s1 == s2.
(b) Write a program to demonstrate the man in the middle attack is possible using
an example. You can perform set up as described in the above problem. Platform: |
Size: 1024 |
Author:jitender grover |
Hits: