英語 での Authentication algorithm の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Authentication algorithm.
Use non standard authentication algorithm.
Authentication algorithm(%1)(phase 2): %2.
HMAC is a secret key authentication algorithm.
A"null" authentication algorithm may be used only for debugging.
OpenVPN auth: use special authentication algorithm: %1.
In most cases, an authentication algorithm will operate the same whether it is used for ESP or AH.
OpenVPN auth: do not use special authentication algorithm.
This is the message authentication algorithm with which all of your data is authenticated.
REQUIRED for ESP implementations o ESP authentication algorithm, keys, etc.
MD5 is an authentication algorithm, which has been proposed as one authentication option in IPv6[1].
Note that for an ESP SA, the encryption algorithm or the authentication algorithm could be"NULL".
MD5 is an authentication algorithm, which has been proposed as the default authentication option in IPv6.
For ESP, this is the encryption algorithm(including Null encryption) and for AH,this is the authentication algorithm.
Features of this authentication algorithm.. Mention of any availability issues such as Intellectual Property considerations.
For ESP, this is the encryption algorithm(including Null encryption) and for AH,this is the authentication algorithm.
Authentication Algorithm Description. General information on how this authentication algorithm is to be used with ESP and AH.
They typically include some sort of public key algorithm, a message authentication algorithm and a symmetric(block/stream) encryption algorithm. .
The authentication algorithm specification MUST specify the length of the ICV and the comparison rules and processing steps for validation.
The key management mechanism is used to negotiate a number of parameters for each"Security Association",including not only the keys but also other information(e.g., the authentication algorithm and mode) used by the communicating parties.
The authentication algorithm specification MUST specify the length of the ICV and the comparison rules and processing steps for validation.
Multiple senders to a multicast group SHOULD use a single Security Association(and hence Security Parameter Index)for all traffic to that group when a symmetric key encryption or authentication algorithm is employed.
The Encryption Algorithm and Authentication Algorithm documents are responsible for specifying the key sizes and strengths for each algorithm. .
To help eliminate some complexity involved with key management having to negotiate large numbers of algorithm-specific parameters,encryption and authentication algorithm documents will select fixed values for these parameters when it is deemed technically reasonable and feasible.
Each Encryption Algorithm and Authentication Algorithm document should specify their respective key attributes e.g. how to pad, location of parity bits, key order for multi-keyed algorithms, and length.
If an asymmetric authentication algorithm is used andthe routers are aware of the appropriate public keys and authentication algorithm, then the routers possessing the authentication public key could authenticate the traffic being handled without being able to forge or modify otherwise legitimate traffic.
As stated in[ESP], while the use of encryption algorithms and authentication algorithms are optional in ESP, it is imperative that an ESP SA specifies the use of at least one cryptographically strong encryption algorithm or one cryptographically strong authentication algorithm or one of each.
This may arise because: o the encryption algorithm uses multiple keys(e.g., triple DES)o the authentication algorithm uses multiple keys o both encryption and authentication algorithms are employed Kent& Atkinson Standards Track[Page 27] RFC 2401 Security Architecture for IP November 1998 The Key Management System may provide a separate string of bits for each key or it may generate one string of bits from which all of them are extracted.