相关文章  
  • 应聘外企什么样的求职简历易通过
  • 如何打动HR
  • 先买后悔药:透视招聘经理如何筛选简历
  • 英文简历的种类和要领
  • Cisco接入点Web界面认证绕过漏洞
  • 从网吧ARP欺骗看局域网的安全管理
  • 你的家庭网络远离各种潜在危险
  • 密码破解速度全披露:千万别用6位密码
  • 失去、转变、得到
  • 简历中种种你想不到的“致命”细节
  •   推荐  
      科普之友首页   专利     科普      动物      植物        天文   考古   前沿科技
     您现在的位置在:  首页 >>文献 >>培训

    Security (IPSec) Encryption-CHS版5

    and keying material applied to a data flow. Both IKE and IPSec use SAs, although SAs are independent of one another. IPSec SAs are unidirectional and they are unique in each security protocol. A set of SAs are needed for a protected data pipe, one per direction per protocol. For example, if you have a pipe that supports ESP between peers, one ESP SA is required for each direction. SAs are uniquely identified by destination (IPSec endpoint) address, security protocol (AH or ESP), and security parameter index (SPI).

    IKE negotiates and establishes SAs on behalf of IPSec. A user can also establish IPSec SAs manually.

    An IKE SA is used by IKE only. Unlike the IPSec SA, it is bi-directional.

    Secure Hash Algorithm (SHA): A one way hash put forth by NIST. SHA is closely modeled after MD4 and produces a 160-bit digest. Because SHA produces a 160-bit digest, it is more resistant to brute-force attacks than 128-bit hashes (such as MD5), but it i

    页码:[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13]5页、共13页

         

          设为首页       |       加入收藏       |       广告服务       |       友情链接       |       版权申明      

    Copyriht 2007 - 2008 ©  科普之友 All right reserved