A Public Key Infrastructure (PKI) binds CRYPTOgraphic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust anchors, and establish security services based on certificates that may be validated using one of their trust anchors.
标签: Infrastructure CRYPTOgraphic entities physical
上传时间: 2017-07-31
上传用户:561596
The use of FPGAs for CRYPTOgraphic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for CRYPTOgraphic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of CRYPTOgraphic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.
标签: CRYPTOgraphic applications attractive for
上传时间: 2013-12-07
上传用户:zhuimenghuadie
A thesis on developing multiple-precision integer libraries for CRYPTOgraphic and other uses.
标签: multiple-precision CRYPTOgraphic developing libraries
上传时间: 2014-01-10
上传用户:xiaohuanhuan
Sha256 Algorithm. The SHA hash functions are a set of CRYPTOgraphic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
标签: functions hash CRYPTOgraphic Algorithm
上传时间: 2014-11-09
上传用户:1109003457
Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, anddistributed control systems (DCSs), and then discusses security issues and remedies. This document alsoexplains the benefits and limitations of two CRYPTOgraphic solutions (digital signatures and encryption) andelaborates on the reasons for using security ICs in an ICS to support cryptography.
上传时间: 2013-10-09
上传用户:woshinimiaoye
Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wireless cards, automatic network IP block detection via UDP, ARP, and DHCP packets, Cisco equipment lists via Cisco Discovery Protocol, weak CRYPTOgraphic packet logging, and Ethereal and tcpdump compatible packet dump files. It also includes the ability to plot detected networks and estimated network ranges on downloaded maps or user supplied image files. Kismet是一个针对IEEE802.11b无线局域网的嗅探和包分析器,支持大多数无线网卡,支持自动检测UDP、ARP和DHCP的数据包,支持通过CDP协议检测思科网络设备,支持加密数据包记录,采用与Ethereal和Tcpdump兼容的的数据包记录文件,支持通过用户提供地图来检测和评估无线网络范围。
标签: network dissector sniffing capable
上传时间: 2014-11-26
上传用户:wweqas
Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, CRYPTOgraphic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.
标签: Programming developers for important
上传时间: 2015-09-03
上传用户:gundan
《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - CRYPTOgraphic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
上传时间: 2016-01-07
上传用户:zxc23456789
This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using CRYPTOgraphic hash functions. HMAC can be used with any iterative Approved CRYPTOgraphic hash function, in combination with a shared secret key. The CRYPTOgraphic strength of HMAC depends on the properties of the underlying hash function. The HMAC specification in this standard is a generalization of Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI X9.71, Keyed Hash Message Authentication Code.
标签: message authentication keyed-hash describes
上传时间: 2014-01-07
上传用户:凤临西北
The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required CRYPTOgraphic algorithm rather than having to hardcode a specific provider.
标签: Cryptography Generation framework Windows
上传时间: 2013-12-18
上传用户:semi1981