论文部分内容阅读
本文确定了一种适用于作为加密密钥管理系统基础的密钥分层体制。还叙述了用于美国政府的数据加密标准和取决于密钥分层的密钥管理体制。这种体制能有效地保护密钥而不依赖于各主端/终端或通信网各组成部份的安全保护。这种体制以在敌人包围的环境中工作为基准,其保密性仅仅依赖于(1)明密钥所托付给的最少的人的廉洁程度、(2)必须是物质上、电子及逻辑上保密的密码装置。本文还说明了怎样利用加密所特有的优点把系统改成适合于用来鉴定用户的身份。
This paper identifies a key hierarchy suitable for use as an encryption key management system. It also describes the data encryption standard used by the U.S. government and the key management system that depends on the key hierarchy. Such a system can effectively protect keys without relying on the security protection of the components of each master / terminal or communication network. This system is based on work in an environment surrounded by the enemy and its confidentiality depends only on (1) the degree of integrity of the least person entrusted to it by the key, (2) it must be material, electronic and logically confidential Password device. This article also shows how to use the benefits of encryption to adapt the system to be used to authenticate users.