词条 | Dynamic secrets |
释义 |
Dynamic secrets can be applied to all bi-directional communication systems and some single-directional communication systems to improve their communication security. There are three main benefits: 1. the encryption and authentication keys are rapidly and automatically updated for any pair of communication devices 2. the key update process binds to the communication process and incurs negligible computing and bandwidth cost 3. Use a cloned key in either authentication or encrypted communication is guaranteed to be detected. the detection has no false alarms and does not cost any computing / networking resources. (dynamic secrets automatically break the secure communication when the clone key and the legitimate key co-exist. however, in order to find out who is the attacker, it takes further actions and consumes computing power and network bandwidth.) References1. ^http://infocom2010.ieee-infocom.org/ {{crypto-stub}}2. ^Xiao, Sheng, Weibo Gong, and Don Towsley. "[https://www.cs.nmsu.edu/~istrnad/cs579/presentations/SecureWirelessCommunicationWithDynamicSecretsInfocom2010.pdf Secure wireless communication with dynamic secrets]." INFOCOM, 2010 Proceedings IEEE. IEEE, 2010. 3. ^{{cite book|last1=Xiao|first1=Sheng|last2=Gong|first2=Weibo|last3=Towsley|first3=Don|title=Dynamic Secrets in Communication Security|date=August 22, 2013|publisher=Springer|isbn=978-1461478300|pages=150|url=https://www.amazon.com/Dynamic-Secrets-Communication-Security-Sheng/dp/1461478308/ref=sr_1_1?ie=UTF8&qid=1414677776&sr=8-1&keywords=dynamic+secrets%2C+sheng+xiao}} 2 : Access control|Key management |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。