翻訳と辞書
Words near each other
・ "O" Is for Outlaw
・ "O"-Jung.Ban.Hap.
・ "Ode-to-Napoleon" hexachord
・ "Oh Yeah!" Live
・ "Our Contemporary" regional art exhibition (Leningrad, 1975)
・ "P" Is for Peril
・ "Pimpernel" Smith
・ "Polish death camp" controversy
・ "Pro knigi" ("About books")
・ "Prosopa" Greek Television Awards
・ "Pussy Cats" Starring the Walkmen
・ "Q" Is for Quarry
・ "R" Is for Ricochet
・ "R" The King (2016 film)
・ "Rags" Ragland
・ ! (album)
・ ! (disambiguation)
・ !!
・ !!!
・ !!! (album)
・ !!Destroy-Oh-Boy!!
・ !Action Pact!
・ !Arriba! La Pachanga
・ !Hero
・ !Hero (album)
・ !Kung language
・ !Oka Tokat
・ !PAUS3
・ !T.O.O.H.!
・ !Women Art Revolution


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

ECMQV : ウィキペディア英語版
MQV
MQV (Menezes–Qu–Vanstone) is an authenticated protocol for key agreement based on the Diffie–Hellman scheme. Like other authenticated Diffie-Hellman schemes, MQV provides protection against an active attacker. The protocol can be modified to work in an arbitrary finite group, and, in particular, elliptic curve groups, where it is known as elliptic curve MQV (ECMQV).
MQV was initially proposed by Menezes, Qu and Vanstone in 1995. It was modified with Law and Solinas in 1998. There are one-, two- and three-pass variants.
MQV is incorporated in the public-key standard IEEE P1363.
Some variants of MQV are claimed in patents assigned to Certicom.
MQV has some weaknesses that were fixed by HMQV in 2005. A few articles offered alternative viewpoint.
ECMQV has been dropped from the National Security Agency's Suite B set of cryptographic standards.
==Description==
Alice has a key pair (''A,a'') with ''A'' her public key and ''a'' her private key and Bob has the key pair (''B,b'') with ''B'' his public key and ''b'' his private key.
In the following \bar has the following meaning. Let R = (x,y) be a point on an elliptic curve. Then \bar = (x\, \bmod\, 2^L) + 2^L where L = \left \lceil \frac \right \rceil and ''n'' is the order of the used generator point ''P''. So \bar are the first ''L'' bits of the x coordinate of ''R''.
b and sends Y to Alice.
|-
| 5
| Alice calculates K = h \cdot S_a (Y + \barB) and Bob calculates K = h \cdot S_b (X + \barA) where ''h'' is the cofactor (see Elliptic curve cryptography: domain parameters).
|-
| 6
| The communication of secret K was successful. A key for a symmetric-key algorithm can be derived from ''K''.
|}
Note: for the algorithm to be secure some checks have to be performed. See Hankerson et al.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「MQV」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.