Diffie-Hellman 密钥必须在128和4096位之间。Diffie Hellman keys must be between 128 and 4096 bits. 静态RSA和Diffie-Hellman 密码套件已经被删除;. Diffie-hellman 是一个被普遍应用在密钥交换的公开密钥算法。Diffie-Hellman is a commonly used public-key algorithm for key exchange.在选择Diffie-Hellman 参数时,这个原理最为明显。 This principle is most evident when it comes to choosing Diffie-Hellman parameters. Diffie-Hellman 还要求参数具有某些其他数学属性。Diffie-Hellman also requires the parameters to have certain other mathematical properties.
我们需要生成Diffie-Hellman 参数;这可能需要几分钟的时间。 Now we need to generate the Diffie-Hellman parameter which will take several minutes. RSA和Diffie-Hellman 由于严格的安全认证而变得强大。 RSA and Diffie-Hellman were so powerful because they came with rigorous security proofs. 为了进一步提高安全性,您还应该生成一个强的Diffie-Hellman 组。 To further increase security, you should also generate a strong Diffie-Hellman group. 在Diffie-Hellman 中,客户端和服务器都从创建公钥-私钥对开始。 In Diffie-Hellman , the client and server both start by creating a public-private key pair. 为了进一步提高安全性,你也可以生成一个StrongDiffie-Hellman Group。 To further increase security, you should also generate a strong Diffie-Hellman group. 在Diffie-Hellman 模式下,服务器使用数字签名证明私钥的所有权。 In Diffie-Hellman mode, the server proves ownership of the private key using a digital signature. 该小组会议由PaulKocher主持,其开发的攻击可破解RSA和Diffie-Hellman 。 The panel is moderated by Paul Kocher, who developed attacks that can break RSA and Diffie-Hellman . 所有版本的nginx(如1.4.4)都依赖于OpenSSL给Diffie-Hellman (DH)的输入参数。 All versions of nginx as of 1.4.4 rely on OpenSSL for input parameters to Diffie-Hellman (DH). 例如,在基于Diffie-Hellman (DH)密码套件,该消息包含服务器的DH公钥。 For example, in cipher suites based on Diffie-Hellman (DH), this message contains the server's DH public key. 到1977年,这个新群体的三名成员发明了一套新算法,用来执行Diffie-Hellman 方案。 By 1977, three members of this new community created a set of algorithms that implemented the Diffie-Hellman scheme. TLS1.3采用固定路由,将Diffie-Hellman 参数限制为已知安全的参数。 TLS 1.3 takes the opinionated route, restricting the Diffie-Hellman parameters to ones that are known to be secure. Diffie-Hellman 的安全性取决于称为离散对数问题的特定数学问题的难度。The security of Diffie-Hellman depends on the difficulty of a specific mathematical problem called the discrete logarithm problem. 不过,那个后门好找得多,而且,不像Diffie-Hellman 或DSA,Dual_EC从未被广泛采纳。 However, that backdoor was much easier to find and, unlike Diffie-Hellman or DSA, Dual_EC never received widespread adoption. 对于SupersingularIsogenyDiffie-Hellman (SIDH)方案,私钥是一条由isogenies构成的链,公钥是曲线。 For the Supersingular Isogeny Diffie-Hellman (SIDH) scheme, secret keys are a chain of isogenies and public keys are curves. 支持哈希、使用DSS进行数据签名、生成Diffie-Hellman (D-H)密钥、交换D-H密钥以及导出D-H密钥。 Supports hashing, data signing with DSS, generating Diffie-Hellman (D-H) keys, exchanging D-H keys, and exporting a D-H key. Diffie-Hellman 秘钥交换:Alice和Bob可以"容易地"计算出共享秘钥,而中间人却需要解决"困难的"问题.The Diffie-Hellman key exchange: Alice and Bob can“easily” calculate the shared secret, the Man in the Middle has to solve a“hard” problem. 假如我们的猜想是正确的,情报机构已经掌控了弱Diffie-Hellman ,帮忙修正这个问题仅是小小的一步而已。 If our hypothesis is correct, the agency has been vigorously exploiting weak Diffie-Hellman , while taking only small steps to help fix the problem. Diffie-hellman 的存在大大增加了窃听者的负担,因为它会定期更改加密密钥来保护正在进行的通信。Diffie-Hellman significantly raises the burden on eavesdroppers because it regularly changes the encryption key protecting an ongoing communication. TLS工作组目前正在讨论MatthewGreen关于如何使用静态Diffie-Hellman 允许被动TLS解密的建议。 The TLS working group is currently debating a proposal by Matthew Green about how to use static Diffie-Hellman to allow passive TLS decryption. 它定义了八个Diffie-Hellman 分组,这些分组可以与IETF协议共同为互联网通讯提供安全珍爱。 This document describes eight Diffie-Hellman groups that can be used in conjunction with IETF protocols to provide security for Internet communications. 该题为《不完美前向保密:Diffie-Hellman 如何在实践中失效》的论文5月份首次发布时被媒体广泛报道过。 The paper, titled“Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice,” received extensive media coverage in May when the paper was first released. 此包包含Diffie-Hellman 公有和私钥的密钥规范,也包含DES、TripleDES以及PBE密钥的密钥规范。 This package contains key specifications for Diffie-Hellman public and private keys, as well as key specifications for DES, Triple DES, and PBE secret keys. 不幸的是,这意味着Diffie-Hellman Ephemeral(DHE)将使用OpenSSL的默认设置,包括一个用于密钥交换的1024位密钥。 Unfortunately, this means that Ephemeral Diffie-Hellman (DHE) will use OpenSSL's defaults, which include a 1024-bit key for the key-exchange. 通过删除Diffie-Hellman 和StaticRSA密码套件来维护转发保密,并且在服务器Hello步骤之后发送的所有消息都被加密。 Forwarded secrecy is maintained by the removal of Diffie-Hellman and Static RSA cipher suites, and all messages sent after the Server Hello step are encrypted.
Display more examples
Results: 29 ,
Time: 0.017
中文
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt