Diffie-Hellman 密钥必须在128和4096位之间。Diffie Hellman keys must be between 128 and 4096 bits. 静态RSA和Diffie-Hellman 密码套件已经被删除;. Diffie-hellman 是一个被普遍应用在密钥交换的公开密钥算法。Diffie-Hellman is a commonly used public-key algorithm for key exchange.在选择Diffie-Hellman 参数时,这个原理最为明显。 This principle is most evident when it comes to choosing Diffie-Hellman parameters. Diffie-Hellman 还要求参数具有某些其他数学属性。Diffie-Hellman also requires the parameters to have certain other mathematical properties.
我们需要生成Diffie-Hellman 参数;这可能需要几分钟的时间。 Now we need to generate the Diffie-Hellman parameter which will take several minutes. RSA和Diffie-Hellman 由于严格的安全认证而变得强大。 RSA and Diffie-Hellman were so powerful because they came with rigorous security proofs. 为了进一步提高安全性,您还应该生成一个强的Diffie-Hellman 组。 To further increase security, you should also generate a strong Diffie-Hellman group. 在Diffie-Hellman 中,客户端和服务器都从创建公钥-私钥对开始。 In Diffie-Hellman , the client and server both start by creating a public-private key pair. 为了进一步提高安全性,你也可以生成一个StrongDiffie-Hellman Group。 To further increase security, you should also generate a strong Diffie-Hellman group. 在Diffie-Hellman 模式下,服务器使用数字签名证明私钥的所有权。 In Diffie-Hellman mode, the server proves ownership of the private key using a digital signature. 该小组会议由PaulKocher主持,其开发的攻击可破解RSA和Diffie-Hellman 。 The panel is moderated by Paul Kocher, who developed attacks that can break RSA and Diffie-Hellman . 所有版本的nginx(如1.4.4)都依赖于OpenSSL给Diffie-Hellman (DH)的输入参数。 All versions of nginx as of 1.4.4 rely on OpenSSL for input parameters to Diffie-Hellman (DH). 例如,在基于Diffie-Hellman (DH)密码套件,该消息包含服务器的DH公钥。 For example, in cipher suites based on Diffie-Hellman (DH), this message contains the server's DH public key. 到1977年,这个新群体的三名成员发明了一套新算法,用来执行Diffie-Hellman 方案。 By 1977, three members of this new community created a set of algorithms that implemented the Diffie-Hellman scheme. TLS1.3采用固定路由,将Diffie-Hellman 参数限制为已知安全的参数。 TLS 1.3 takes the opinionated route, restricting the Diffie-Hellman parameters to ones that are known to be secure. Diffie-Hellman 的安全性取决于称为离散对数问题的特定数学问题的难度。The security of Diffie-Hellman depends on the difficulty of a specific mathematical problem called the discrete logarithm problem. 不过,那个后门好找得多,而且,不像Diffie-Hellman 或DSA,Dual_EC从未被广泛采纳。 However, that backdoor was much easier to find and, unlike Diffie-Hellman or DSA, Dual_EC never received widespread adoption. 对于SupersingularIsogenyDiffie-Hellman (SIDH)方案,私钥是一条由isogenies构成的链,公钥是曲线。 For the Supersingular Isogeny Diffie-Hellman (SIDH) scheme, secret keys are a chain of isogenies and public keys are curves. 支持哈希、使用DSS进行数据签名、生成Diffie-Hellman (D-H)密钥、交换D-H密钥以及导出D-H密钥。 Supports hashing, data signing with DSS, generating Diffie-Hellman (D-H) keys, exchanging D-H keys, and exporting a D-H key. Diffie-Hellman 秘钥交换:Alice和Bob可以"容易地"计算出共享秘钥,而中间人却需要解决"困难的"问题.The Diffie-Hellman key exchange: Alice and Bob can“easily” calculate the shared secret, the Man in the Middle has to solve a“hard” problem. 假如我们的猜想是正确的,情报机构已经掌控了弱Diffie-Hellman ,帮忙修正这个问题仅是小小的一步而已。 If our hypothesis is correct, the agency has been vigorously exploiting weak Diffie-Hellman , while taking only small steps to help fix the problem. Diffie-hellman 的存在大大增加了窃听者的负担,因为它会定期更改加密密钥来保护正在进行的通信。Diffie-Hellman significantly raises the burden on eavesdroppers because it regularly changes the encryption key protecting an ongoing communication. TLS工作组目前正在讨论MatthewGreen关于如何使用静态Diffie-Hellman 允许被动TLS解密的建议。 The TLS working group is currently debating a proposal by Matthew Green about how to use static Diffie-Hellman to allow passive TLS decryption. 它定义了八个Diffie-Hellman 分组,这些分组可以与IETF协议共同为互联网通讯提供安全珍爱。 This document describes eight Diffie-Hellman groups that can be used in conjunction with IETF protocols to provide security for Internet communications. 该题为《不完美前向保密:Diffie-Hellman 如何在实践中失效》的论文5月份首次发布时被媒体广泛报道过。 The paper, titled“Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice,” received extensive media coverage in May when the paper was first released. 此包包含Diffie-Hellman 公有和私钥的密钥规范,也包含DES、TripleDES以及PBE密钥的密钥规范。 This package contains key specifications for Diffie-Hellman public and private keys, as well as key specifications for DES, Triple DES, and PBE secret keys. 不幸的是,这意味着Diffie-Hellman Ephemeral(DHE)将使用OpenSSL的默认设置,包括一个用于密钥交换的1024位密钥。 Unfortunately, this means that Ephemeral Diffie-Hellman (DHE) will use OpenSSL's defaults, which include a 1024-bit key for the key-exchange. 通过删除Diffie-Hellman 和StaticRSA密码套件来维护转发保密,并且在服务器Hello步骤之后发送的所有消息都被加密。 Forwarded secrecy is maintained by the removal of Diffie-Hellman and Static RSA cipher suites, and all messages sent after the Server Hello step are encrypted.
Display more examples
Results: 29 ,
Time: 0.0177